Explore chapters and articles related to this topic
Security-Enhanced Cloud for Serverless Computing and Its Applications
Published in T. Ananth Kumar, T. S. Arun Samuel, R. Dinesh Jackson Samuel, M. Niranjanamurthy, Privacy and Security Challenges in Cloud Computing, 2022
L. Jerart Julus, Krishnan Ayyappan
Recalling through the authentic background of large business figuring, everything started with the concentrated PC and fundamental clients reliant on the video terminal or visual showcase unit (VDU). More modest centralized servers (the minicomputer) were created to suit the requirements of medium-sized organizations, and afterward, IBM dispatched the PC. It allowed even the most diminutive business to make capable-looking correspondence and to run accounts programming. As the costs of the work territory PC dropped to insignificant more than the work territories they sat on, business customers mentioned a comparable UI as the PC [22]. A genuine model is the word processor. Simultaneously, it empowered the client to be more inventive with their design. This capacity to offer additional opportunities stretches out to asset management. The centralized server management system mostly deals with the complex structure of asset management. The DAM has two elements: file processing and creative processing. There is a lot of data processing, identifying with metadata inquiries and updates. Three layers are present in the structure: the presentation layer, business layer, and data layer. The layer has no incredible issue to work and keep up because there is only a web worker. The design of the DAM can be split into a different pack known as business rationale [23]. The standards designed for controlling the information, and the associations with outsider applications, would all be able to dwell on a different server application that runs the center asset management software.
Role and Development of Security Architecture and Models in Software Systems
Published in Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain, Mohammad Zubair Khan, Advancing Computational Intelligence Techniques for Security Systems Design, 2023
Other concepts related to security include layering, data hiding and abstraction. These concepts are used to protect the subjects and objects and are the foundation of a security model. Layering separates processes and resources and provides modularity to the system. The layers communicate through interfaces. Sometimes it is not required for a process to communicate with other processes in other layers. In that case no interfaces are provided for interaction. This is termed “data hiding.” To make the management of objects easier, they are classified, and specific permissions and acceptable activities for the class are defined. This is called “abstraction.”
Controlled System
Published in Christos N. Houmkozlis, George A. Rovithakis, End-to-End Adaptive Congestion Control in TCP/IP Networks, 2017
Christos N. Houmkozlis, George A. Rovithakis
To reduce the design complexity, most networks are organized hierarchically as a stack of layers called levels, where each layer is built upon the one below it. The number of layers, the name of each layer, as well as its contents and functionalities, differ from network to network. The purpose of each layer is to offer certain services to the higher level layers, shielding those layers from the underlined details of how the offered services are actually implemented. In a sense, each layer is a kind of virtual machine, offering certain services to the layer above it.
Virtual earth cloud: a multi-cloud framework for enabling geosciences digital ecosystems
Published in International Journal of Digital Earth, 2023
Mattia Santoro, Paolo Mazzetti, Stefano Nativi
Figure 2 depicts the high-level system architecture of the Virtual Earth Cloud framework. Based on the well-known layered architecture style (Richards 2015), the architecture includes three functional layers (which can be implemented as a three-tiers architecture): Presentation layer – that is responsible for handling all user interface components (i.e. Client Applications). The Virtual Earth Cloud does not provide any user interface for end-users, instead it provides APIs which can be invoked by user interfaces for exploiting its functionalities (see section Use-cases).Business Logic layer – that is responsible for implementing all necessary functionalities to satisfy requests from Client Applications, exploiting the available digital resources shared by the enterprise systems, which belong to the ecosystem. This layer provides the actual Multi-Cloud Framework functionalities and is comprised of several components (see section Main Components of the Virtual Cloud), which form a Virtual Earth Cloud. This, based on the virtual cloud paradigm (An et al. 2017), creates another level of abstraction providing users (Client Applications) with a unified perspective on services from a range of heterogeneous providers (the enterprise systems constituting the ecosystem).Digital Resources: – that provides all the required resources to define and execute scientific models (see section Geosciences Digital Ecosystem Resources). Different and autonomous enterprise systems (represented by different colors) contribute their resources. The set of contributing enterprise systems is dynamic; i.e. it is possible for new enterprise systems to join the Virtual Earth Cloud (providing their resources) as well as for contributing enterprise systems to leave the Virtual Earth Cloud.
Blockchain-enabled digital twin collaboration platform for heterogeneous socialized manufacturing resource management
Published in International Journal of Production Research, 2023
Ming Li, Yelin Fu, Qiqi Chen, Ting Qu
The presentation layer is designed to show information to the user and interpret the user's commands. It could be implemented for web, desktop, mobile or any presentation technology via APIs. The separation of this layer makes a radical change in the user interface have a minimal or controlled impact on the rest of the platform.
Application of Human-Computer Interaction Technology in Remote Language Learning Platform
Published in International Journal of Human–Computer Interaction, 2023
① Presentation layer. The presentation layer is the interface layer contacted by users, whose main functions are to display the system interface, process user interaction requests, and display processing results. The system interface displays the requirements for interface switching in multiple languages.