scispace - formally typeset
Search or ask a question

Answers from top 14 papers

More filters
Papers (14)Insight
Software necessary to make it work resides on the server, and the end‐user does not have to worry about it.
Extensive simulation results show the advantage of strategies that make scheduling decisions on the basis of the domain that originates the client requests and limited server state information (e. g., whether a server is overloaded or not).
Proceedings ArticleDOI
Shigeya Suzuki, Jun Murai 
04 Jul 2017
42 Citations
However, logging on server-side do not provide strict means of auditing, since the server can be tampered with attackers, and also anybody who has permission to write can modify the log.
Our proposal extends OSGi Remote Service Admin Specification to add load balancing capability, so that service developers can use it as a system service, i. e., without knowing the internal details.
System administrators have the same capabilities as simple users but additionally, they can process or delete users, view, edit and delete all of the saved areas and tours, and make another user an admin.
At the same time, edge server nodes can freely make their own decisions on serving, which end user's task.
This system is able to provide convenience during student registration and make it easier for admin in data management.
Because the web-based, this archive application has the ability, can be accessed anywhere, admin can manage with user login so that can do add, edit, delete and save incoming and outgoing mail, can do incoming mail and outbound mail based on sender and subject, print a report.
Open accessBook ChapterDOI
Sam Scholefield, Lynsay A. Shepherd 
26 Jul 2019
31 Citations
However, users often do not know how to make their online interactions secure, which demonstrates an educational need in this area.
This system will benefit for both the admin and the staff.
This scenario when coupled with growing servers population has inevitably adds complexity and creates ambiguity in defining server, consequently it becomes increasingly difficult for network admin to be aware of server’s information if they are configuration-less; especially when the potential server’s type has grown beyond the scope of admin knowledge for manual identification.
In turn, this has empowered me to find ways through which I can use my agency to make changes to align my values and practice.
This selection of secured admin nodes results in mitigation of various threats.
We develop new solutions for the single-server i. e., non-interactive and multiple-server settings that use significantly different techniques.