Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Operations and Reports (0704-0188), 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. PLEASE DO NOT RETURN YOUR FORM TO THE ABOVE ADDRESS.
Abstract-Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources but also poses risks for data privacy. A single breach can cause significant loss. The heterogeneity of "users" represents a danger of multiple, collaborative threats.In cloud computing, entities may have multiple accounts associated with a single or multiple service providers (SPs). Sharing sensitive identity information (that is, Personally Identifiable information or PII) along with associated attributes of the same entity across services can lead to mapping of the identities to the entity, tantamount to privacy loss.Identity management (IDM) is one of the core components in cloud privacy and security and can help alleviate some of the problems associated with cloud computing. Available solutions use trusted third party (TTP) in identifying entities to SPs. The solution providers do not recommend the usage of their solutions on untrusted hosts.We propose an approach for IDM, which is independent of TTP and has the ability to use identity data on untrusted hosts. The approach is based on the use of predicates over encrypted data and multi-party computing for negotiating a use of a cloud service. It uses active bundle-which is a middleware agent that includes PII data, privacy policies, a virtual machine that enforces the policies, and has a set of protection mechanisms to protect itself. An active bundle interacts on behalf of a user to authenticate to cloud services using user's privacy policies.
Standard Form 298 (Rev. 8-98)Prescribed by ANSI Std. Z39.18Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing this collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden to Department of Defense, Washington Headquarters Services, Directorate for Information Complex mission plans may need to incorporate information from various sources and domains to achieve a task. This information is available through a variety of web services in the Service-Oriented Architecture (SOA), but the ability to automatically compose them into a single coherent task is not readily available. Traditional composition approaches require human-intensive involvement, making them time-consuming and error prone. Therefore, the ability to automatically or semi-automatically orchestrate web services in a short timeframe is highly desirable. SPONSOR / MONITOR'S ACRONYM(S) 9. SPONSORING / MONITORING AGENCY NAME(S) AND ADDRESS(ES) SPONSOR / MONITOR'S REPORT NUMBER(S)Recent works in the area of automatic web service composition produced a plethora of automation approaches with different degrees of automation. Different situations call for different composition approaches. However, there is a lack of guidance regarding what approaches are appropriate for a particular situation. In this paper, we examine the various approaches and develop a general-purpose framework for automatic service composition. Within the framework, we outline the common steps in the various composition processes and review the options available at each step. We also provide guidelines for choosing a composition approach within the framework for the geospatial planning domain. 30-04-2009Memorandum Report 0602435NFebruary AbstractComplex mission plans may need to incorporate information from various sources and domains to achieve a task. This information is available through a variety of web services in the Service-Oriented Architecture (SOA), but the ability to automatically compose them into a single coherent task is not readily available. Traditional composition approaches require human-intensive involvement, making them time-consuming and error prone. Therefore, the ability to automatically or semi-automatically orchestrate web services in a short timeframe is highly desirable.Recent works in the area of automatic web service composition produced a plethora of automation approaches with different degrees of automation. Different situations call for different composition approaches. However, there is a lack of guidance regarding what approaches are appropriate for a particular situation. In this paper, we examine the various approaches and develop a general-purpose framework for automatic service composition. Within the framework, we outline the common s...
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.