|
||||
Tutorial 1 Tutorial 2
DESCRIPTIONS Tutorial 1 The goal of this tutorial is to provide attendees a working knowledge of the threats and vulnerabilities to telecom and networking infrastructure, and how to assess and improve the level of protection afforded these infrastructures. Wireline, wireless, cable and satellite architectures, and their unique vulnerabilities, will be presented and discussed. The role of RAMS (reliability, availability, maintainability, and survivability) in infrastructure protection is covered, and the empirical techniques of assessing and forecasting protection levels are provided. Ample examples of vulnerabilities and real outage data will be used in the presentation examples. Tutorial 2 This tutorial describes our experience with a private cloud, and discusses the design and implementation of a Private Cloud Monitoring System (PCMONS) and its application via a case study for the proposed architecture. The objective of this tutorial is also to provide identity management, based on digital identity federation, with authentication and authorization mechanisms for access control in cloud computing environments. Green cloud computing aims at a processing infrastructure that combines flexibility, quality of services, and reduced energy utilization. This tutorial also introduces the system management model, analyses the system’s behavior, describes the operation principles, and presents a case study scenario and some results for green clouds. |
||||
Copyright (c) 2006-2013, IARIA