scispace - formally typeset
Search or ask a question
Topic

Shared resource

About: Shared resource is a research topic. Over the lifetime, 7536 publications have been published within this topic receiving 123491 citations. The topic is also known as: network share.


Papers
More filters
Journal ArticleDOI
TL;DR: A method to derive adequate estimators for the resource consumption of a customer-oriented service can then provide a basis for cost allocation keys, and how the estimation can be integrated into existing IT service management processes is illustrated.
Abstract: IT infrastructure, such as servers and networking equipment, accounts for a large proportion of the IT costs in modern organizations. Typically, this IT infrastructure is shared among multiple applications and customers. Cost allocation of shared IT infrastructure is difficult and regularly based on biased cost allocation keys, which often causes free-rider problems. Measuring usage is technically difficult and incurs high costs. In this paper we propose a method to derive adequate estimators for the resource consumption of a customer-oriented service. These so-called resource profiles can then provide a basis for cost allocation keys. The estimators are derived from a series of load tests, as they are typically done before an application is launched in larger organizations. Such profiles need to be unbiased and precise even in cases of varying workloads and in rather heterogeneous environments. We describe the results of a set of experiments in an infrastructure provided by the BMW Group, and illustrate how the estimation can be integrated into existing IT service management processes. In our experiments we use Queuing Networks to validate the estimated resource profiles under different workloads.

42 citations

Patent
29 Feb 2008
TL;DR: In this paper, the authors present a method and system for controlling application access to a shared resource in a runtime environment, where the shared resource is owned by a remote resource owner.
Abstract: Method and system for controlling application access to a shared resource in a runtime environment. The shared resource is owned by a remote resource owner. An access control ticket including a permission for the shared resource, a cryptographically verifiable remote resource owner identifier and a cryptographically verifiable application owner identifier are generated. The access control ticket is approved and signed by the remote resource owner, and transmitted to the runtime environment. The application, when executed in the runtime environment, accesses the resource based on the permission.

42 citations

Patent
23 Jul 2014
TL;DR: In this article, a control processing method and system based on multiple accounts and multiple target devices was proposed. But the authors did not reveal the details of the control process and system.
Abstract: The invention discloses a control processing method and system based on multiple accounts and multiple target devices The method includes the steps that an intelligent terminal requests a sever to establish an administrator account through the MAC address of the intelligent terminal, the server end automatically generates the administrator account corresponding to the MAC address of the intelligent terminal according to the request, and a plurality of ordinary accounts used for logging on for browsing by different users are established through distribution of the administrator account; the intelligent terminal of the administrator account is logged on, resource sharing two-dimension codes of the intelligent with resource sharing are scanned, and the two-dimension codes are bound to the intelligent terminal with resource sharing to share resources; an intelligent terminal bound to the intelligent with resource sharing for the first time is set to have the authority of a super administrator so that resource sharing between the intelligent terminal and other intelligent terminals can be controlled Through the control processing method and system, different programs can be recommended through different accounts, convenience is provided for the users, resources can be shared by different devices, operation is safer, and safety is improved

42 citations

Journal ArticleDOI
TL;DR: A formal access model is designed to analyze the translating an authorization policy into an equivalent encryption policy and the effect of role hierarchy structure in the authorization process is investigated.
Abstract: Data outsourcing is a major component for cloud computing because data owners are able to distribute resources to external services for sharing with users and organizations A crucial problem for owners is how to secure sensitive information accessed by legitimate users only using the trusted services We address the problem with access control methods to enforce selective access to outsourced data without involving the owner in authorization The basic idea is to combine cryptography with authorizations, and data owners assign keys to roles that will enforce access via encryption A formal access model is designed to analyze the translating an authorization policy into an equivalent encryption policy The paper also investigates the effect of role hierarchy structure in the authorization process The role-based access management methods are implemented with XACML by using WSO Identity Server The comparisons with other related work are presented Finally, the future work is introducedCopyright © 2014 John Wiley & Sons, Ltd

41 citations

Patent
12 Mar 2010
TL;DR: In this paper, a computer implemented method, and computer program product for requesting resources is described, and the computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network.
Abstract: A computer implemented method, and computer program product for requesting resources. The computer receives an assignment of an Internet protocol address. The computer compares a computer context of a client computer with an intranet access criterion to form a comparison result. The computer selects at least one preferred uniform resource identifier based on the comparison result, indicating the intranet is accessible. The computer transmits a request to a server using at least one preferred uniform resource identifier using a packet network.

41 citations


Network Information
Related Topics (5)
The Internet
213.2K papers, 3.8M citations
84% related
Information system
107.5K papers, 1.8M citations
83% related
Software
130.5K papers, 2M citations
80% related
Network packet
159.7K papers, 2.2M citations
78% related
Wireless network
122.5K papers, 2.1M citations
78% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
202381
2022194
2021223
2020298
2019381
2018373