VIT Software, LLC

Displaying 1-40 of 44 results

  • White Papers // Apr 2014

    Efficient Data Sharing Techniques to Improve the Security Usingnetworks

    The present trends and spreads in data sharing in the internet and in social networks are unsecure. So now-a-days people demanding for security. In such case, this paper helps to share the data in a secure way by encrypting the data and decrypt it. Though it has several features in...

    Provided By VIT Software, LLC

  • White Papers // Feb 2014

    Cloud Architecture for Search Engine Application

    Cloud computing has become popular because of its on demand self services capability and business benefits. This paper presents design of search engine application developed and deployed using Google app engine. The application uses pattern-matching and regular expression language processing across millions of web document and returns the matching web...

    Provided By VIT Software, LLC

  • White Papers // Jan 2014

    Reliability Analysis of Link Stability in Secured Routing Protocols for MANETs

    The prime characteristics of Mobile Ad-hoc Network (MANET) are infrastructure free, absence of centralized authority and dynamic nature of nodes which are more vulnerable to security attacks. Reliability and security are prime issues to protect the information and nodes in a network during communication which has received more research interest...

    Provided By VIT Software, LLC

  • White Papers // Sep 2013

    Cryptography Based Biometric Technique to Provide Security Mechanism for the Transfer of Files

    Cryptography based biometric technique to provide security mechanism for the transfer of files is designed to provide security for the document distribution process using the biometrics characteristics. It is the computer-based validation of a person's identity, Biometrics are the only mechanism that are used to identify a person uniquely. It...

    Provided By VIT Software, LLC

  • White Papers // Aug 2013

    An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

    Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming...

    Provided By VIT Software, LLC

  • White Papers // May 2013

    Enhancing Security in Cyber Physical Systems Through Policy Based Trust Management Against Deception Attack

    The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only...

    Provided By VIT Software, LLC

  • White Papers // May 2013

    Intrusion Detection System against Blackhole Attack in Wireless Network

    Security is an essential requirement in wireless network to provide secure communication or to transfer data between nodes. Due to unique characteristics of wireless network, it creates number of challenges in its security design. To overcome this, the authors need to build a security solution (i.e.) Intrusion Detection System for...

    Provided By VIT Software, LLC

  • White Papers // May 2013

    Energy and Run Time Evaluation for Compiler Methods Using Dynamic Voltage-Frequency Scaling on XScale Architecture

    Energy Consumption is a key constraint in modern computing era. The consumption of energy should be ascertainable not only to Gate Level or Register Transfer (RT) Level but also to the System Level. There is a trade-off between energy consumption and run-time. Researchers are working on low power consumption techniques...

    Provided By VIT Software, LLC

  • White Papers // Apr 2013

    An Approach Secret Sharing Algorithm in Cloud Computing Security Over Single to Multi Clouds

    Now-a-day's rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost. So the cloud computing give the users lot of benefits with low cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Simulation and Comparison of Long Term Evolution (LTE) Schemes in Wireless Sensor Networks

    High speed data transmission has become one of key elements in wireless sensor systems. Power constraints of the sensor nodes should be accounted to deploy such high speed transmission techniques in to wireless sensor network. This paper mainly aims the fair allocation of both high speed and low power in...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

    Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be applied in cloud computing environment, but because of their unique characteristics, such as on-demand self service, rapid elasticity, etc., there is a need to develop a detection...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Securing Web Services Using XML Signature and XML Encryption

    This paper is aimed to evaluate the importance of XML Signature and XML Encryption for WS-Security. In today's e-business scenario, organizations are investing a huge amount of their resources in Web Services. Web Service Transactions are done mainly through plain-text XML formats like SOAP and WSDL, hence hacking them is...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Efficient Secure Group Communication in Cloud Computing Environment

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the authors' day today life they are using many web applications. Many of the users know to create web application which is very useful for their society. After creating their web application they don't know how to...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    A Survey of Latest Algorithms for Frequent Itemset Mining in Data Stream

    In a data mining process, it is a tedious task to find the frequent patterns that are extracted from the Data Warehouse. Patterns are the set of rules behind the Mining frequent pattern of data, which comprises of Frequent Item Set Mining, Frequent Sequence Mining, Frequent Tree Mining, and Frequent...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files

    In this paper, the authors propose an efficient partition technique for web based files (jsp, html, php), text (word, text files) and PDF files. They are working in the direction of attack time detection. For this motivation they are considering mainly two factors first in the direction of minimizing the...

    Provided By VIT Software, LLC

  • White Papers // Feb 2013

    A Secure Approach Towards Cloud Data Communication

    Cloud computing has been a centre of discussion from a long time. But it is a well-known fact that nearly every new technology has some problems related to it. Cloud computing is considered as an attractive service since the users' commitments for the operations and investments are reduced to a...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    Threat Analysis and Defence Mechanisms in VANET

    Vehicular Ad-hoc NETworks (VANET) are becoming more popular as the need for accessing and sharing data while on the move is increasing. Value-added applications such as online payment services, geographical location identification, etc. in VANET, improve driving safety, passenger comfort, offer great business opportunities, and attract more and more attention...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    LRUD Shift Based Encryption Method Using Matrices

    Encryption of text is not at all a modern concept but has been in use since ages. Encryption methods are usually application based. Highly confidential information requires highly reliable and secure encryption mechanism. The method described here is not intended to ensure integrity of the message but is only for...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    Secure Auction Command Mobile Environment Through Randomized Alphanumeric Cipher Algorithm

    Secure mobile auction bidding is a developing mechanism that may widely used by GPRS enabled mobile around the world. Many reliable models existing in internet enabled platform. The projected Auction Bidding Mobile application is basically based on Japanese auction, Double auction and English auction. Making the business model reliable, security...

    Provided By VIT Software, LLC

  • White Papers // Oct 2012

    New CMM-Quality Education (CMM-QE) Framework Using SEI-CMM Approach and Calibrating for Its Process Quality and Maturity Using Structural Equation Modeling - PLS Approach

    The software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, educational system engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential requirements and benefits of this engineering approach...

    Provided By VIT Software, LLC

  • White Papers // Oct 2012

    Business Metrics Based Analysis for SME's over Cloud Environment

    Cloud computing often refers to the use of IT technology for a variety of services. It is a way of computing in which resources are dynamically scalable and often virtualized assets are provided as a service over the internet. Users need not have familiarity, awareness, expertise in or domain over...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    A Defense Mechanism for Credit Card Fraud Detection

    Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion Detection Systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    An Amalgam Approach Using AES and RC4 Algorithms for Encryption and Decryption

    This paper aims at developing a new hybrid cipher by combining the characteristics of two ciphers namely AES(Advanced Encryption Standard) and Rc4(also known as ARC4). The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers is generated which is more secure...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    An Entropy Based Approach to Detect and Distinguish DDoS Attacks From Flash Crowds in VoIP Networks

    Voice over IP (VoIP) is a facility of providing voice ser-vices in accordance with IP (Internet Protocol) which provides better QoS (Quality of Service) than Public Switched Telephone Network (PSTN) at comparatively less cost. Since Internet suffers from various threats, VoIP, which uses IP for servicing the clients also, results...

    Provided By VIT Software, LLC

  • White Papers // Aug 2012

    A Study on Security Threats in Cloud

    Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use. The new paradigm freed the organizations from the burden...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Design and Modeling of a Web Portal on Private Cloud Using Open Source

    Today, cloud computing is the most buzzed word in IT Industry, Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Research Agenda on Secure High Performance Computing Facility in Cloud Environment

    Cloud computing is an on-demand service model often based on virtualization and distributed computing technologies. Cloud computing enhances collaboration, agility, scale, availability and provides the potential for cost reduction through optimized and efficient .In many cases, users can purchase cloud services with a credit card and begin to use them...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Multi Level Adaption for Efficient Workflow Management in Cloud Computing

    Scientific computations from various research and business endeavors are composed as workflows that access shared data, shared pool of resources on demand. Predicting the dynamic properties of the resources and coordinated control of resources and workflows is critical especially for deadline sensitive workflows. Existing approaches for executing workflows are mainly...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Dynamic Adaptive Workflow Scheduling for Instance Intensive Cloud Applications

    Large scale data intensive business and scientific computations from various scientific endeavors are composed as workflows that access shared data, shared pool of resources on demand. Predicting the dynamic properties of the resources and coordinated control of resources and workflows is critical especially selection of algorithms for scheduling cloud workflows...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    Optimization of Security Mechanism to Enhance Data Access Speed in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) are rapidly emerging as a promising complement to existing broad band access infrastructures; despite recent advances in wireless mesh networking, many research challenges still remain up in the air. WMNs are multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    A Survey on M-Learning

    Mobile phones have recently become more common in human's life. Mobile learning can be any time anywhere and any device access information. Mobile learning can be broadly defined as 'the exploring ubiquitous handheld technologies along with wireless and cellular networks, to provide, support, improve and extend the context of teaching...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    A Comprehensive Approach Towards Enhancing the Interface for Wedding Website Hosting

    In today's world the inception of an idea is what it takes to bring about changes and make improvements and if that idea is incepted properly into the people then one can accomplish their success. So the authors are bringing one such idea about wedding website hosting. There is hardly...

    Provided By VIT Software, LLC

  • White Papers // May 2012

    Automatic Campus Network Management Using GPS

    The Organization Network is the place where large number of attacks is happening. The attackers are using different methodologies to capture the information from the end user without the knowledge of the enduser. This paper introduces the concepts of Campus Management and Emergency log by using Medium Access Control (MAC)...

    Provided By VIT Software, LLC

  • White Papers // May 2012

    An Efficient Vertical Handoff Technique for Two-Tier Heterogeneous Networks

    Integration of cellular networks and Wireless Local Area Networks (WLANs) will be very useful for development of fourth generation communication technologies. The integration of two or more networks would be done by employing techniques of vertical handoff across different radio access networks. Internetworking system can offer users with ubiquitous connectivity...

    Provided By VIT Software, LLC

  • White Papers // Mar 2012

    Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography

    Increasing demand for cloud applications has led to an ever growing need for security mechanisms. Cloud computing is a technique to leverage on distributed computing resources one do not own using internet facility in pay per use strategy on demand. A user can access cloud services as a utility service...

    Provided By VIT Software, LLC

  • White Papers // Mar 2012

    A Survey of Workflow Management Tools for Grid Platform

    The wide range of scientific experiments such as bio-medical image processing, climate modeling, and neuroscience data analysis are usually computation intensive and data intensive scientific applications. These applications involve complex scientific computations that are represented in the form of workflows. The workflow representation greatly reduces the layout and number of...

    Provided By VIT Software, LLC

  • White Papers // Feb 2012

    A Survey on Business Management Tool in IT Sector for Digitizing Engineering Process Framework

    Engineering process framework is a mechanism for abstracting the organizational processes and various elements such as infrastructure, business function, software processes and so on. It composed of process definitions, governance, dependencies and architecture related to process which synchronizes various elements. Process Framework is an important entity in the field of...

    Provided By VIT Software, LLC

  • White Papers // Dec 2011

    A Survey of Current Trends in Cloud Computing

    Cloud computing is a virtualized image containing Internet based technology that has become an increasingly important rend, by offering the sharing resources that include infrastructures, software, applications and business processes to the market environment to match elastic demand and supply. In today's competitive environment, the service dynamism, elasticity, choices and...

    Provided By VIT Software, LLC

  • White Papers // May 2011

    Kerberos, Cryptography and Biometric based Remote Authentication Protocol

    The authors are looking for a very secure method of remote authentication. Biometrics authentication has become popular with the increase in infrastructure facilities and scope of sensor technologies. They are suited due to high security in applications like remote authentication. They are considering a provably secure and blind sort of...

    Provided By VIT Software, LLC

  • White Papers // Mar 2011

    A Study on Factors Influencing Power Consumption in Multithreaded and Multicore CPUs

    The ever-growing demand for computational power and high performance has led to a rapid growth in the semiconductor industry. This evolution has seen a continuous increase in CPU performance and the number of transistors on a chip has roughly doubled every two years - proving Moore's law. An inevitable consequence...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    A Defense Mechanism for Credit Card Fraud Detection

    Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion Detection Systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various...

    Provided By VIT Software, LLC

  • White Papers // Mar 2010

    Securing Internet Protocol (IP) Storage: A Case Study

    Storage networking technology has enjoyed strong growth in recent years, but security concerns and threats facing networked data have grown equally fast. Today, there are many potential threats that are targeted at storage networks, including data modification, destruction and theft, DoS attacks, malware, hardware theft and unauthorized access, among others....

    Provided By VIT Software, LLC

  • White Papers // Mar 2010

    Secure Key Exchange and Encryption Mechanism for Group Communication in Wireless Ad Hoc Networks

    Secured communication in ad hoc wireless networks is primarily important, because the communication signals are openly available as they propagate through air and are more susceptible to attacks ranging from passive eavesdropping to active interfering. The lack of any central coordination and shared wireless medium makes them more vulnerable to...

    Provided By VIT Software, LLC

  • White Papers // May 2010

    An Efficient and Secure Routing Protocol for Mobile Ad-Hoc Networks

    Efficiency and simplicity of random algorithms have made them a lucrative alternative for solving complex problems in the domain of communication networks. This paper presents a random algorithm for handling the routing problem in Mobile Ad hoc NETworks [MANETS].The performance of most existing routing protocols for MANETS degrades in terms...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    An Amalgam Approach Using AES and RC4 Algorithms for Encryption and Decryption

    This paper aims at developing a new hybrid cipher by combining the characteristics of two ciphers namely AES(Advanced Encryption Standard) and Rc4(also known as ARC4). The characteristics of both the ciphers are studied and a new cipher combining the characteristics of both the ciphers is generated which is more secure...

    Provided By VIT Software, LLC

  • White Papers // May 2013

    Enhancing Security in Cyber Physical Systems Through Policy Based Trust Management Against Deception Attack

    The World is moving towards invisible computers, Ubiquitous Computing (any information everywhere), Pervasive Computing (which combines current network technology with wireless computing), Ambient Intelligence (which refers to electronic environments that are sensitive and responsive to the presence of people), and Traditional Embedded System (which is a closed system, not only...

    Provided By VIT Software, LLC

  • White Papers // Aug 2012

    A Study on Security Threats in Cloud

    Cloud computing is now invading almost all IT industry and has become a rich area of research. It enables the users to share the resources which are done through resource virtualization and they have to pay only for what they use. The new paradigm freed the organizations from the burden...

    Provided By VIT Software, LLC

  • White Papers // May 2011

    Kerberos, Cryptography and Biometric based Remote Authentication Protocol

    The authors are looking for a very secure method of remote authentication. Biometrics authentication has become popular with the increase in infrastructure facilities and scope of sensor technologies. They are suited due to high security in applications like remote authentication. They are considering a provably secure and blind sort of...

    Provided By VIT Software, LLC

  • White Papers // Oct 2012

    Business Metrics Based Analysis for SME's over Cloud Environment

    Cloud computing often refers to the use of IT technology for a variety of services. It is a way of computing in which resources are dynamically scalable and often virtualized assets are provided as a service over the internet. Users need not have familiarity, awareness, expertise in or domain over...

    Provided By VIT Software, LLC

  • White Papers // Apr 2013

    An Approach Secret Sharing Algorithm in Cloud Computing Security Over Single to Multi Clouds

    Now-a-day's rapidly increased use of cloud computing in the many organization and IT industries and provides new software with low cost. So the cloud computing give the users lot of benefits with low cost and of data accessibility through Internet. The ensuring security risks of the cloud computing is the...

    Provided By VIT Software, LLC

  • White Papers // Oct 2012

    New CMM-Quality Education (CMM-QE) Framework Using SEI-CMM Approach and Calibrating for Its Process Quality and Maturity Using Structural Equation Modeling - PLS Approach

    The software product line engineering is an inter-disciplinary concept. It spans the dimensions of business, architecture, process, and the organization. Similarly, educational system engineering is also an inter-disciplinary concept, which spans the dimensions of academic, infrastructure, facilities, administration etc. Some of the potential requirements and benefits of this engineering approach...

    Provided By VIT Software, LLC

  • White Papers // May 2012

    Automatic Campus Network Management Using GPS

    The Organization Network is the place where large number of attacks is happening. The attackers are using different methodologies to capture the information from the end user without the knowledge of the enduser. This paper introduces the concepts of Campus Management and Emergency log by using Medium Access Control (MAC)...

    Provided By VIT Software, LLC

  • White Papers // May 2012

    An Efficient Vertical Handoff Technique for Two-Tier Heterogeneous Networks

    Integration of cellular networks and Wireless Local Area Networks (WLANs) will be very useful for development of fourth generation communication technologies. The integration of two or more networks would be done by employing techniques of vertical handoff across different radio access networks. Internetworking system can offer users with ubiquitous connectivity...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Simulation and Comparison of Long Term Evolution (LTE) Schemes in Wireless Sensor Networks

    High speed data transmission has become one of key elements in wireless sensor systems. Power constraints of the sensor nodes should be accounted to deploy such high speed transmission techniques in to wireless sensor network. This paper mainly aims the fair allocation of both high speed and low power in...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    A Comprehensive Approach Towards Enhancing the Interface for Wedding Website Hosting

    In today's world the inception of an idea is what it takes to bring about changes and make improvements and if that idea is incepted properly into the people then one can accomplish their success. So the authors are bringing one such idea about wedding website hosting. There is hardly...

    Provided By VIT Software, LLC

  • White Papers // Feb 2013

    A Secure Approach Towards Cloud Data Communication

    Cloud computing has been a centre of discussion from a long time. But it is a well-known fact that nearly every new technology has some problems related to it. Cloud computing is considered as an attractive service since the users' commitments for the operations and investments are reduced to a...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Securing Web Services Using XML Signature and XML Encryption

    This paper is aimed to evaluate the importance of XML Signature and XML Encryption for WS-Security. In today's e-business scenario, organizations are investing a huge amount of their resources in Web Services. Web Service Transactions are done mainly through plain-text XML formats like SOAP and WSDL, hence hacking them is...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    A Survey on M-Learning

    Mobile phones have recently become more common in human's life. Mobile learning can be any time anywhere and any device access information. Mobile learning can be broadly defined as 'the exploring ubiquitous handheld technologies along with wireless and cellular networks, to provide, support, improve and extend the context of teaching...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    Threat Analysis and Defence Mechanisms in VANET

    Vehicular Ad-hoc NETworks (VANET) are becoming more popular as the need for accessing and sharing data while on the move is increasing. Value-added applications such as online payment services, geographical location identification, etc. in VANET, improve driving safety, passenger comfort, offer great business opportunities, and attract more and more attention...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Efficient Secure Group Communication in Cloud Computing Environment

    Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. In the authors' day today life they are using many web applications. Many of the users know to create web application which is very useful for their society. After creating their web application they don't know how to...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Research Agenda on Secure High Performance Computing Facility in Cloud Environment

    Cloud computing is an on-demand service model often based on virtualization and distributed computing technologies. Cloud computing enhances collaboration, agility, scale, availability and provides the potential for cost reduction through optimized and efficient .In many cases, users can purchase cloud services with a credit card and begin to use them...

    Provided By VIT Software, LLC

  • White Papers // Jun 2012

    Optimization of Security Mechanism to Enhance Data Access Speed in Wireless Mesh Networks

    Wireless Mesh Networks (WMN) are rapidly emerging as a promising complement to existing broad band access infrastructures; despite recent advances in wireless mesh networking, many research challenges still remain up in the air. WMNs are multi-hop networks consisting of two types of nodes, Mesh Routers and Mesh Clients. Mesh Routers...

    Provided By VIT Software, LLC

  • White Papers // Mar 2012

    Enhanced Security Framework to Ensure Data Security in Cloud Computing Using Cryptography

    Increasing demand for cloud applications has led to an ever growing need for security mechanisms. Cloud computing is a technique to leverage on distributed computing resources one do not own using internet facility in pay per use strategy on demand. A user can access cloud services as a utility service...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Dynamic Adaptive Workflow Scheduling for Instance Intensive Cloud Applications

    Large scale data intensive business and scientific computations from various scientific endeavors are composed as workflows that access shared data, shared pool of resources on demand. Predicting the dynamic properties of the resources and coordinated control of resources and workflows is critical especially selection of algorithms for scheduling cloud workflows...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Design and Modeling of a Web Portal on Private Cloud Using Open Source

    Today, cloud computing is the most buzzed word in IT Industry, Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service...

    Provided By VIT Software, LLC

  • White Papers // Jul 2012

    Multi Level Adaption for Efficient Workflow Management in Cloud Computing

    Scientific computations from various research and business endeavors are composed as workflows that access shared data, shared pool of resources on demand. Predicting the dynamic properties of the resources and coordinated control of resources and workflows is critical especially for deadline sensitive workflows. Existing approaches for executing workflows are mainly...

    Provided By VIT Software, LLC

  • White Papers // Mar 2012

    A Survey of Workflow Management Tools for Grid Platform

    The wide range of scientific experiments such as bio-medical image processing, climate modeling, and neuroscience data analysis are usually computation intensive and data intensive scientific applications. These applications involve complex scientific computations that are represented in the form of workflows. The workflow representation greatly reduces the layout and number of...

    Provided By VIT Software, LLC

  • White Papers // Jul 2010

    An Implicit Token Scheme to Prevent DoS Attacks

    Denial of Service (DoS) attacks constitutes one of the major threats in today's internet. Of particular concern are Distributed Denial of Service (DDoS) attacks, whose impact can be proportionally severe. Because of the seriousness of the problem many defense mechanisms have been proposed to combat these attacks. This paper presents...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    Secure Auction Command Mobile Environment Through Randomized Alphanumeric Cipher Algorithm

    Secure mobile auction bidding is a developing mechanism that may widely used by GPRS enabled mobile around the world. Many reliable models existing in internet enabled platform. The projected Auction Bidding Mobile application is basically based on Japanese auction, Double auction and English auction. Making the business model reliable, security...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    A Survey of Latest Algorithms for Frequent Itemset Mining in Data Stream

    In a data mining process, it is a tedious task to find the frequent patterns that are extracted from the Data Warehouse. Patterns are the set of rules behind the Mining frequent pattern of data, which comprises of Frequent Item Set Mining, Frequent Sequence Mining, Frequent Tree Mining, and Frequent...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    An Efficient Partition Technique to reduce the Attack Detection Time with Web based Text and PDF files

    In this paper, the authors propose an efficient partition technique for web based files (jsp, html, php), text (word, text files) and PDF files. They are working in the direction of attack time detection. For this motivation they are considering mainly two factors first in the direction of minimizing the...

    Provided By VIT Software, LLC

  • White Papers // May 2013

    Intrusion Detection System against Blackhole Attack in Wireless Network

    Security is an essential requirement in wireless network to provide secure communication or to transfer data between nodes. Due to unique characteristics of wireless network, it creates number of challenges in its security design. To overcome this, the authors need to build a security solution (i.e.) Intrusion Detection System for...

    Provided By VIT Software, LLC

  • White Papers // Jan 2013

    LRUD Shift Based Encryption Method Using Matrices

    Encryption of text is not at all a modern concept but has been in use since ages. Encryption methods are usually application based. Highly confidential information requires highly reliable and secure encryption mechanism. The method described here is not intended to ensure integrity of the message but is only for...

    Provided By VIT Software, LLC

  • White Papers // Dec 2011

    A Survey of Current Trends in Cloud Computing

    Cloud computing is a virtualized image containing Internet based technology that has become an increasingly important rend, by offering the sharing resources that include infrastructures, software, applications and business processes to the market environment to match elastic demand and supply. In today's competitive environment, the service dynamism, elasticity, choices and...

    Provided By VIT Software, LLC

  • White Papers // Feb 2012

    A Survey on Business Management Tool in IT Sector for Digitizing Engineering Process Framework

    Engineering process framework is a mechanism for abstracting the organizational processes and various elements such as infrastructure, business function, software processes and so on. It composed of process definitions, governance, dependencies and architecture related to process which synchronizes various elements. Process Framework is an important entity in the field of...

    Provided By VIT Software, LLC

  • White Papers // Mar 2013

    Escape-on-Sight: An Efficient and Scalable Mechanism for Escaping DDoS Attacks in Cloud Computing Environment

    Availability is one of the primary security issues in Cloud computing environment. The existing solutions that address the availability related issues can be applied in cloud computing environment, but because of their unique characteristics, such as on-demand self service, rapid elasticity, etc., there is a need to develop a detection...

    Provided By VIT Software, LLC

  • White Papers // Aug 2013

    An Enhanced Entropy Approach to Detect and Prevent DDoS in Cloud Environment

    Distributed Denial of Service (DDoS) attack launched in Cloud computing environment resulted in loss of sensitive information, Data corruption and even rarely lead to service shutdown. Entropy based DDoS mitigation approach analyzes the heuristic data and acts dynamically according to the traffic behavior to effectively segregate the characteristics of incoming...

    Provided By VIT Software, LLC

  • White Papers // Sep 2013

    Cryptography Based Biometric Technique to Provide Security Mechanism for the Transfer of Files

    Cryptography based biometric technique to provide security mechanism for the transfer of files is designed to provide security for the document distribution process using the biometrics characteristics. It is the computer-based validation of a person's identity, Biometrics are the only mechanism that are used to identify a person uniquely. It...

    Provided By VIT Software, LLC

  • White Papers // Sep 2012

    An Entropy Based Approach to Detect and Distinguish DDoS Attacks From Flash Crowds in VoIP Networks

    Voice over IP (VoIP) is a facility of providing voice ser-vices in accordance with IP (Internet Protocol) which provides better QoS (Quality of Service) than Public Switched Telephone Network (PSTN) at comparatively less cost. Since Internet suffers from various threats, VoIP, which uses IP for servicing the clients also, results...

    Provided By VIT Software, LLC

  • White Papers // Jan 2014

    Reliability Analysis of Link Stability in Secured Routing Protocols for MANETs

    The prime characteristics of Mobile Ad-hoc Network (MANET) are infrastructure free, absence of centralized authority and dynamic nature of nodes which are more vulnerable to security attacks. Reliability and security are prime issues to protect the information and nodes in a network during communication which has received more research interest...

    Provided By VIT Software, LLC