Providing Security to the Architecture of Presence Servers
نویسندگان
چکیده
Mobile cloud Computing is a new emerging technology. This technology supports many applications and one such application is presence enabled application. Mobile presence server is the main component in presence enabled applications and they provide presence services to all mobile users in the network. As number of mobile user increases to a great extent there arises buddy list search problem. In-order to solve this problem a scalable server architecture called presence cloud has been introduced. To provide security to the above server architecture SSL protocol is used. The performance is evaluated by using the parameters such as search latency and response time. SSL protocol involves determination and exchange of keys which increases buddy list search delay and response time. Therefore SSL session resumption is used to decrease this searching time and response time.
منابع مشابه
Exploring the role of architectural design in creating a sense of security and residential satisfaction in affordable residential complexes for young Iranian low-income families
The most important requirement of the family after food and clothing is housing. It also plays an important role in providing safety and security etc. for the family. Security is important therefore it is placed among other human physiological needs like food, shelter and sanitation. Security feeling is one of the main factorsin stability of urban spaces. It can be said that secure enviro...
متن کاملچند پخشی اطلاعات ویدئویی کدشده باH.264 درشبکه های ناهمگن مبتنی بر کدینگ منابع چند پایانه ای
In MTSC, correlated sources are separately encoded but jointly decoded. With appropriate modeling of all kinds of correlation among three non binary correlated sources, in this paper we propose a method for performing IMTSC among three sources. Due to the possibility of providing an approach for practical code design for more than two correlated sources in IMTSC/CEO setup, the multicast system ...
متن کاململزومات امنیتی پیادهسازی IMS SIP سرور امن
IMS (IP Multimedia Subsystem) network is considered as an NGN (Next Generation Network) core networks by ETSI. Decomposition of IMS core network has resulted in a rapid increase of control and signaling message that makes security a required capability for IMS commercialization. The control messages are transmitted using SIP (Session Initiation Protocol) which is an application layer protocol. ...
متن کاملExplaining and Evaluating the Effective Factors in Improving the Quality of Children’s Playgrounds in Cities with an Emphasis on Safety and Security Aspects of Children from Parents’ Viewpoint; Case study: Koodak Park of Isfahan
Abstract Childhood games are essential for the development of cognitive, psychological, and physical skills. Playgrounds are spaces that provide the required opportunity to develop the fundamental skills and needs of children, such as connections with nature, games, activities, and so forth. Therefore, the presence of children in these areas requires the provision of a safe and secure environm...
متن کاملM M m K Queue With Additional Servers and Discouragement (RESEARCH NOTE)
Waiting in long queue is undesirable due to which in some practical situations customers become impatient and leave the system. In such cases providing additional servers can reduce long queue. This investigation deals with multi-server queueing system with additional servers and discouragement. The customers arrive in poisson fashion and are served exponentially by a pool of permanent and addi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015