Time filter

Source Type

Newport Beach, CA, United States

Liang Q.,Cloud Security | Rubin S.H.,Systems Center Pacific Pacific
International Journal of Information and Decision Sciences | Year: 2012

This paper applies randomisation theory to the problem of selecting software test cases for software systems and applications in order to overcome the high costs incurred in testing componentised systems of systems (SoS). We have used a corner point semantics, which can approximate a proof of correctness – termed a pseudo-proof of correctness. Test cases for each component are designed to be mutually orthogonal, or randomised. Integration testing is performed through a composition of the test cases for components with some value-added test cases to cover integration aspects of the system. Integration testing is also designed in such a way that the testing algorithm is written in randomised form. In this paper, we present a theoretical framework for randomising test design for component and integration testing. We also show a meta heuristic algorithm based on the framework to be used with test design methodologies that are randomisation-friendly. The advantages offered by such randomisation are ever present in the algorithm, programming language, integration, and workflow design. © 2012 Inderscience Enterprises Ltd. Source

Pearson S.,Cloud Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2013

In conjunction with regulation, information security technology is expected to play a critical role in enforcing the right for privacy and data protection. The role of security in privacy by design is discussed in this paper, as well as the relationship of these to accountability. The focus within these discussions is on technological methods to support privacy and data protection in cloud scenarios. © 2013 Springer-Verlag. Source

Papanikolaou N.,Cloud Security
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2012

We discuss ongoing work on developing tools and techniques for understanding natural-language descriptions of security and privacy rules, particularly in the context of cloud computing services. In particular, we present a three-part toolkit for analyzing and processing texts, and enforcing privacy and security rules extracted from those texts. We are interested in developing efficient, accurate technologies to reduce the time spent analyzing and reasoning about new privacy laws and security rules within the enterprise. We describe the tools we have developed for semantic annotation, and also for information extraction - these are specifically intended for analysis of cloud terms of service, and therefore designed to help with self-compliance; however, the techniques involved should be generalizable to other relevant texts, esp. rules and regulations for data protection. © 2012 Springer-Verlag. Source

Pearson S.,Cloud Security
HP Laboratories Technical Report | Year: 2012

In this paper it is considered how meeting privacy requirements can be challenging for global organisations, particularly where future Internet service provision models are involved. Approaches will be explained that can be used to help address these issues, with a focus on some of the innovative solutions that the author has been involved in developing in HP Labs that are currently being used, rolled out or are the subjects of further research. © 2012 Copyright Springer. Source

Cloud Security | Date: 2014-04-25

The present invention relates to a camera device, wherein the camera device comprising a base with a fillister; a body with a spherical unit and a neck; and a camera configured onto the body. The spherical unit fits the fillister to form a joint allowing a wide range of rotation in all direction. The base further comprises a first fixing unit and a second fixing unit. Therefore, the camera device is able to be easily mounted onto a targeted surface; and, the camera field of view is able to be rapidly optimized toward a specific direction.

Discover hidden collaborations