Panimalar Engineering College

Displaying 1-16 of 16 results

  • White Papers // Jun 2011

    Secure Role Based Data Access Control in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers,...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Stretching Site Resources in Cloud Computing

    A stretchy site mechanism is to solve the allocation of resources problem of computation capacity in the environment of cloud computing is proposed here. In this paper, the authors investigate the benefits that organizations can reap by using "Cloud Computing" providers to augment the computing capacity of their local infrastructure....

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Grid Infrastructure for HealthCare Web Services

    HealthGrids are Grid infrastructures comprising applications, services or middleware components that deal with the specific problems arising in the processing of biomedical data. Resources in HealthGrids are databases, computing power, medical expertise and even medical devices. Health Grids are thus closely related to e-Health. Although the ultimate goal for e-Health...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Centralized Authentication Services

    Centralized Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. Single sign-on allows...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

    Watermarking embeds ownership information in digital content. Watermark describes information that can be used to prove the ownership of relational database. Here the embedding is hidden that the presence of watermarking is invisible to the user. The proposed approach permits them to successfully combine the secure embedding of client side...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    An Enhanced Geocast for Portable Ad-Hoc Networks

    Addressing of packets within the mobile network which makes this as novel application which enables this as a real time usage in the emergency places where the authors can seek immediate help from in and around the area where the help is to be seeked. It can also be used...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Highlight and Thwark the Issues of Web Services Over Telecommunication

    The current service-oriented solutions are often not as dynamic and adaptable as intended. The publish-find-bind-execute cycle of the Service-Oriented Architecture triangle is not entirely realized. This paper highlights some issue of current web service technologies, with a special emphasis on service metadata, Quality of Service, service querying, dynamic binding, and...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Provide Secure Authenticity for Propagating Information

    The data transfers using internet via E-mail is rapidly growing. So many business people and individuals using internet to transfer the documents (e.g., letters, certificates etc.). Security is an important issue while transferring data using E-mail because any unauthorized person can hack the data. Consider a method for preventing E-fraud...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Improving Delivery Ratio for Application - Layer Multicast Using IRP

    Reliability of tree-like multicast overlays caused by nodes' abrupt failures is considered as one of the major problems for the Internet application-layer media streaming service. The previous technologies have some drawbacks. In this paper, the authors address this problem by designing a distributed and lightweighted protocol named the Instantaneous Reliability...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Cell Phones the Primary Personal Mobile Computing Devices

    Increases in the computational power of mobile processors, improvements in mobile operating systems, and the popularity of mobile broadband make cell phones the best candidate for sophisticated mobile computing devices. Learn about potential applications and their corresponding challenges. Mobile network Computing aims at enabling the users of the mobile to...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    An Approach for Secured Data Storage Using Cloud Computing

    Cloud Computing has been envisioned as the next generation Architecture of IT venture. In contrast to conventional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the Application software and databases to the large data centers, where the administration of the data and...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Pioneer DTV System Under Cloud Computing Environment

    A wide deployment of Internet Protocol TeleVision (IPTV), CAble TeleVision (CATV), Internet, User Created Contents (UCC), and Digital TeleVision (DTV) enabled the rapid increase of channels and programs which can be selected by consumers. This was not expected when, the authors consider the conventional television program technologies and policies. Due...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Trust Management for Mobile Ad Hoc Networks Using Recommendation Exchange Protocol

    Mobile Ad hoc NETwork (MANETs) is a Collection of mobile nodes connected with wireless links MANET has no fixed topology as the nodes are moving constantly form one place to another place. All the nodes must co-operate with each other in order to route the packets. Cooperating nodes must trust...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Location-Based Services Routing in Networks

    Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations,...

    Provided By Panimalar Engineering College

  • White Papers // Apr 2011

    A Cost-Efficient Approach for Dynamic and Geographically-Diverse Replication of Components in Cloud Computing

    A cost-efficient approach for dynamic and geographically-diverse replication of components in a cloud computing infrastructure that effectively adapts to load variations and offers service availability guarantees. In the authors' approach, inter-dependencies(traffic and workflow) among components, their processing overhead and server capabilities are implicitly taken into account by means of server...

    Provided By Panimalar Engineering College

  • White Papers // Apr 2011

    Multitask Application Scheduling With Queries and Parallel Processing

    The proper scheduling algorithms are implemented to divert the flow so that the faster response can be obtained from the huge data repository where several lakhs of records are maintained. The objective is to minimize the maximum stretch, i.e., the maximum ratio between the actual time an application has spent...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Secure Role Based Data Access Control in Cloud Computing

    Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. As promising as it is, this paradigm also brings forth many new challenges for data security and access control when users outsource sensitive data for sharing on cloud servers,...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Stretching Site Resources in Cloud Computing

    A stretchy site mechanism is to solve the allocation of resources problem of computation capacity in the environment of cloud computing is proposed here. In this paper, the authors investigate the benefits that organizations can reap by using "Cloud Computing" providers to augment the computing capacity of their local infrastructure....

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Grid Infrastructure for HealthCare Web Services

    HealthGrids are Grid infrastructures comprising applications, services or middleware components that deal with the specific problems arising in the processing of biomedical data. Resources in HealthGrids are databases, computing power, medical expertise and even medical devices. Health Grids are thus closely related to e-Health. Although the ultimate goal for e-Health...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Centralized Authentication Services

    Centralized Authentication Service (CAS) is a single sign-on protocol for the web. Its purpose is to permit a user to log into multiple applications simultaneously and automatically. It also allows web applications to authenticate users without gaining access to a user's security credentials, such as a password. Single sign-on allows...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications

    Watermarking embeds ownership information in digital content. Watermark describes information that can be used to prove the ownership of relational database. Here the embedding is hidden that the presence of watermarking is invisible to the user. The proposed approach permits them to successfully combine the secure embedding of client side...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    An Enhanced Geocast for Portable Ad-Hoc Networks

    Addressing of packets within the mobile network which makes this as novel application which enables this as a real time usage in the emergency places where the authors can seek immediate help from in and around the area where the help is to be seeked. It can also be used...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Highlight and Thwark the Issues of Web Services Over Telecommunication

    The current service-oriented solutions are often not as dynamic and adaptable as intended. The publish-find-bind-execute cycle of the Service-Oriented Architecture triangle is not entirely realized. This paper highlights some issue of current web service technologies, with a special emphasis on service metadata, Quality of Service, service querying, dynamic binding, and...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Provide Secure Authenticity for Propagating Information

    The data transfers using internet via E-mail is rapidly growing. So many business people and individuals using internet to transfer the documents (e.g., letters, certificates etc.). Security is an important issue while transferring data using E-mail because any unauthorized person can hack the data. Consider a method for preventing E-fraud...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Improving Delivery Ratio for Application - Layer Multicast Using IRP

    Reliability of tree-like multicast overlays caused by nodes' abrupt failures is considered as one of the major problems for the Internet application-layer media streaming service. The previous technologies have some drawbacks. In this paper, the authors address this problem by designing a distributed and lightweighted protocol named the Instantaneous Reliability...

    Provided By Panimalar Engineering College

  • White Papers // Apr 2011

    A Cost-Efficient Approach for Dynamic and Geographically-Diverse Replication of Components in Cloud Computing

    A cost-efficient approach for dynamic and geographically-diverse replication of components in a cloud computing infrastructure that effectively adapts to load variations and offers service availability guarantees. In the authors' approach, inter-dependencies(traffic and workflow) among components, their processing overhead and server capabilities are implicitly taken into account by means of server...

    Provided By Panimalar Engineering College

  • White Papers // Apr 2011

    Multitask Application Scheduling With Queries and Parallel Processing

    The proper scheduling algorithms are implemented to divert the flow so that the faster response can be obtained from the huge data repository where several lakhs of records are maintained. The objective is to minimize the maximum stretch, i.e., the maximum ratio between the actual time an application has spent...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Cell Phones the Primary Personal Mobile Computing Devices

    Increases in the computational power of mobile processors, improvements in mobile operating systems, and the popularity of mobile broadband make cell phones the best candidate for sophisticated mobile computing devices. Learn about potential applications and their corresponding challenges. Mobile network Computing aims at enabling the users of the mobile to...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    An Approach for Secured Data Storage Using Cloud Computing

    Cloud Computing has been envisioned as the next generation Architecture of IT venture. In contrast to conventional solutions, where the IT services are under proper physical, logical and personnel controls, Cloud Computing moves the Application software and databases to the large data centers, where the administration of the data and...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Pioneer DTV System Under Cloud Computing Environment

    A wide deployment of Internet Protocol TeleVision (IPTV), CAble TeleVision (CATV), Internet, User Created Contents (UCC), and Digital TeleVision (DTV) enabled the rapid increase of channels and programs which can be selected by consumers. This was not expected when, the authors consider the conventional television program technologies and policies. Due...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Trust Management for Mobile Ad Hoc Networks Using Recommendation Exchange Protocol

    Mobile Ad hoc NETwork (MANETs) is a Collection of mobile nodes connected with wireless links MANET has no fixed topology as the nodes are moving constantly form one place to another place. All the nodes must co-operate with each other in order to route the packets. Cooperating nodes must trust...

    Provided By Panimalar Engineering College

  • White Papers // Jun 2011

    Location-Based Services Routing in Networks

    Due to the nature of spatial queries, an LBS needs the user position in order to process her requests. On the other hand, revealing exact user locations to a (potentially untrusted) LBS may pinpoint their identities and breach their privacy. To address this issue, spatial anonymity techniques obfuscate user locations,...

    Provided By Panimalar Engineering College