Industrial control via application containers: Maintaining determinism in IAAS

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Maintaining Industrial Competence

Poor quality software and projects that fail to deliver are a toofrequent occurrence. There is thus a clear need for greater professionalism throughout the sector and this must be supported by appropriate Continuous Professional Development (CPD). Details are presented of foundation work, undertaken since 2000, relevant to the on-going professional development of IT practitioners. Information i...

متن کامل

Mobile RFID Management - An Application Scenario on the Handling of Industrial Liquid Containers

This paper deals with concepts, challenges and design alternatives for the application of RFID technology within an industry context. We are especially interested in the combination of RFID technology with positioning information and mobile networks. To discuss these topics, we introduce an application scenario concerning the handling of industrial liquid containers along an integrated supply c...

متن کامل

Constraints for Attribute Based Access Control with Application in Cloud Iaas Approved by Supervising Committee:

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Mo...

متن کامل

SPEAKER: Split-Phase Execution of Application Containers

Linux containers have recently gained more popularity as an operating system level virtualization approach for running multiple isolated OS distros on a control host or deploying large scale microservicebased applications in the cloud environment. The wide adoption of containers as an application deployment platform also attracts attackers’ attention. Since the system calls are the entry points...

متن کامل

Adopting Provenance-Based Access Control in OpenStack Cloud IaaS

Provenance-based Access Control (PBAC) has recently risen as an effective access control approach that can utilize readily provided history information of underlying systems to enhance various aspects of access control in a computing environment. The adoption of PBAC capabilities to the authorization engine of a multi-tenant cloud Infrastructure-as-a-Service (IaaS) such as OpenStack can enhance...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Systems Engineering

سال: 2021

ISSN: 1098-1241,1520-6858

DOI: 10.1002/sys.21590