Topic
Shared resource
About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: A method to derive adequate estimators for the resource consumption of a customer-oriented service can then provide a basis for cost allocation keys, and how the estimation can be integrated into existing IT service management processes is illustrated.
Abstract: IT infrastructure, such as servers and networking equipment, accounts for a large proportion of the IT costs in modern organizations. Typically, this IT infrastructure is shared among multiple applications and customers. Cost allocation of shared IT infrastructure is difficult and regularly based on biased cost allocation keys, which often causes free-rider problems. Measuring usage is technically difficult and incurs high costs. In this paper we propose a method to derive adequate estimators for the resource consumption of a customer-oriented service. These so-called resource profiles can then provide a basis for cost allocation keys. The estimators are derived from a series of load tests, as they are typically done before an application is launched in larger organizations. Such profiles need to be unbiased and precise even in cases of varying workloads and in rather heterogeneous environments. We describe the results of a set of experiments in an infrastructure provided by the BMW Group, and illustrate how the estimation can be integrated into existing IT service management processes. In our experiments we use Queuing Networks to validate the estimated resource profiles under different workloads.
42 citations
•
29 Feb 2008TL;DR: In this paper, the authors present a method and system for controlling application access to a shared resource in a runtime environment, where the shared resource is owned by a remote resource owner.
Abstract: Method and system for controlling application access to a shared resource in a runtime environment. The shared resource is owned by a remote resource owner. An access control ticket including a permission for the shared resource, a cryptographically verifiable remote resource owner identifier and a cryptographically verifiable application owner identifier are generated. The access control ticket is approved and signed by the remote resource owner, and transmitted to the runtime environment. The application, when executed in the runtime environment, accesses the resource based on the permission.
42 citations
•
23 Jul 2014
TL;DR: In this article, a control processing method and system based on multiple accounts and multiple target devices was proposed. But the authors did not reveal the details of the control process and system.
Abstract: The invention discloses a control processing method and system based on multiple accounts and multiple target devices The method includes the steps that an intelligent terminal requests a sever to establish an administrator account through the MAC address of the intelligent terminal, the server end automatically generates the administrator account corresponding to the MAC address of the intelligent terminal according to the request, and a plurality of ordinary accounts used for logging on for browsing by different users are established through distribution of the administrator account; the intelligent terminal of the administrator account is logged on, resource sharing two-dimension codes of the intelligent with resource sharing are scanned, and the two-dimension codes are bound to the intelligent terminal with resource sharing to share resources; an intelligent terminal bound to the intelligent with resource sharing for the first time is set to have the authority of a super administrator so that resource sharing between the intelligent terminal and other intelligent terminals can be controlled Through the control processing method and system, different programs can be recommended through different accounts, convenience is provided for the users, resources can be shared by different devices, operation is safer, and safety is improved
42 citations
••
TL;DR: A formal access model is designed to analyze the translating an authorization policy into an equivalent encryption policy and the effect of role hierarchy structure in the authorization process is investigated.
Abstract: Data outsourcing is a major component for cloud computing because data owners are able to distribute resources to external services for sharing with users and organizations A crucial problem for owners is how to secure sensitive information accessed by legitimate users only using the trusted services We address the problem with access control methods to enforce selective access to outsourced data without involving the owner in authorization The basic idea is to combine cryptography with authorizations, and data owners assign keys to roles that will enforce access via encryption A formal access model is designed to analyze the translating an authorization policy into an equivalent encryption policy The paper also investigates the effect of role hierarchy structure in the authorization process The role-based access management methods are implemented with XACML by using WSO Identity Server The comparisons with other related work are presented Finally, the future work is introducedCopyright © 2014 John Wiley & Sons, Ltd
41 citations
•
IBM1
TL;DR: In this paper, a computer implemented method, and computer program product for requesting resources is described, and the computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network.
Abstract: A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context of a client computer with an intranet access criterion to form a comparison result. The computer selects at least one preferred uniform resource identifier based on the comparison result, indicating the intranet is accessible. The computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network.
41 citations