Industrial control via application containers: Maintaining determinism in IAAS
نویسندگان
چکیده
منابع مشابه
Maintaining Industrial Competence
Poor quality software and projects that fail to deliver are a toofrequent occurrence. There is thus a clear need for greater professionalism throughout the sector and this must be supported by appropriate Continuous Professional Development (CPD). Details are presented of foundation work, undertaken since 2000, relevant to the on-going professional development of IT practitioners. Information i...
متن کاملMobile RFID Management - An Application Scenario on the Handling of Industrial Liquid Containers
This paper deals with concepts, challenges and design alternatives for the application of RFID technology within an industry context. We are especially interested in the combination of RFID technology with positioning information and mobile networks. To discuss these topics, we introduce an application scenario concerning the handling of industrial liquid containers along an integrated supply c...
متن کاملConstraints for Attribute Based Access Control with Application in Cloud Iaas Approved by Supervising Committee:
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iv List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Mo...
متن کاملSPEAKER: Split-Phase Execution of Application Containers
Linux containers have recently gained more popularity as an operating system level virtualization approach for running multiple isolated OS distros on a control host or deploying large scale microservicebased applications in the cloud environment. The wide adoption of containers as an application deployment platform also attracts attackers’ attention. Since the system calls are the entry points...
متن کاملAdopting Provenance-Based Access Control in OpenStack Cloud IaaS
Provenance-based Access Control (PBAC) has recently risen as an effective access control approach that can utilize readily provided history information of underlying systems to enhance various aspects of access control in a computing environment. The adoption of PBAC capabilities to the authorization engine of a multi-tenant cloud Infrastructure-as-a-Service (IaaS) such as OpenStack can enhance...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Systems Engineering
سال: 2021
ISSN: 1098-1241,1520-6858
DOI: 10.1002/sys.21590