TY - JOUR AB - We present a privacy-friendly architecture for a future cloud computing scenario where software licensing and software payment plays a major role. We show how digital rights management as a technical solution for software licensing can be achieved in a privacy-friendly manner. In our scenario, users who buy software from software providers and execute it at computing centres stay anonymous. At the same time, our approach guarantees that software licenses are bound to users and that their validity is checked before execution. Thus, DRM constitutes an incentive for software providers to take part in such a future cloud computing scenario. We employ a software re-encryption scheme so that computing centres are not able to build profiles of their users – not even under a pseudonym. We make sure that malicious users are unable to relay software to others. AU - Petrlic, Ronald AU - Sekula, Stephan AU - Sorge, Christoph ID - 561 IS - 4 JF - International Journal of Grid and Utility Computing TI - A privacy-friendly Architecture for future Cloud Computing ER - TY - CONF AB - In Distributed Cloud Computing, applications are deployed across many data centres at topologically diverse locations to improved network-related quality of service (QoS). As we focus on interactive applications, we minimize the latency between users and an application by allocating Cloud resources nearby the customers. Allocating resources at all locations will result in the best latency but also in the highest expenses. So we need to find an optimal subset of locations which reduces the latency but also the expenses – the facility location problem (FLP). In addition, we consider resource capacity restrictions, as a resource can only serve a limited amount of users. An FLP can be globally solved. Additionally, we propose a local, distributed heuristic. This heuristic is running within the network and does not depend on a global component. No distributed, local approximations for the capacitated FLP have been proposed so far due to the complexity of the problem. We compared the heuristic with an optimal solution obtained from a mixed integer program for different network topologies. We investigated the influence of different parameters like overall resource utilization or different latency weights. AU - Keller, Matthias AU - Pawlik, Stefan AU - Pietrzyk, Peter AU - Karl, Holger ID - 562 T2 - Proceedings of the 6th International Conference on Utility and Cloud Computing (UCC) workshop on Distributed cloud computing TI - A Local Heuristic for Latency-Optimized Distributed Cloud Deployment ER - TY - CONF AB - Dominating set based virtual backbones are used for rou-ting in wireless ad-hoc networks. Such backbones receive and transmit messages from/to every node in the network. Existing distributed algorithms only consider undirected graphs, which model symmetric networks with uniform transmission ranges. We are particularly interested in the well-established disk graphs, which model asymmetric networks with non-uniform transmission ranges. The corresponding graph theoretic problem seeks a strongly connected dominating-absorbent set of minimum cardinality in a digraph. A subset of nodes in a digraph is a strongly connected dominating-absorbent set if the subgraph induced by these nodes is strongly connected and each node in the graph is either in the set or has both an in-neighbor and an out-neighbor in it. We introduce the first distributed algorithm for this problem in disk graphs. The algorithm gives an O(k^4) -approximation ratio and has a runtime bound of O(Diam) where Diam is the diameter of the graph and k denotes the transmission ratio r_{max}/r_{min} with r_{max} and r_{min} being the maximum and minimum transmission range, respectively. Moreover, we apply our algorithm on the subgraph of disk graphs consisting of only bidirectional edges. Our algorithm gives an O(ln k) -approximation and a runtime bound of O(k^8 log^∗ n) , which, for bounded k , is an optimal approximation for the problem, following Lenzen and Wattenhofer’s Ω(log^∗ n) runtime lower bound for distributed constant approximation in disk graphs. AU - Markarian, Christine AU - Meyer auf der Heide, Friedhelm AU - Schubert, Michael ID - 563 T2 - Proceedings of the 9th International Symposium on Algorithms and Experiments for Sensor Systems, Wireless Networks and Distributed Robotics (ALGOSENSORS) TI - A Distributed Approximation Algorithm for Strongly Connected Dominating-Absorbent Sets in Asymmetric Wireless Ad-Hoc Networks ER - TY - JOUR AU - Schryen, Guido ID - 5637 IS - 2 JF - European Journal of Information Systems (EJIS) TI - Revisiting IS Business Value Research: What we already know, what we still need to know, and how we can get there VL - 22 ER - TY - CONF AB - We consider the problem of resource discovery in distributed systems. In particular we give an algorithm, such that each node in a network discovers the add ress of any other node in the network. We model the knowledge of the nodes as a virtual overlay network given by a directed graph such that complete knowledge of all nodes corresponds to a complete graph in the overlay network. Although there are several solutions for resource discovery, our solution is the first that achieves worst-case optimal work for each node, i.e. the number of addresses (O(n)) or bits (O(nlogn)) a node receives or sendscoincides with the lower bound, while ensuring only a linearruntime (O(n)) on the number of rounds. AU - Kniesburges, Sebastian AU - Koutsopoulos, Andreas AU - Scheideler, Christian ID - 564 T2 - Proceedings of 20th International Colloqium on Structural Information and Communication Complexity (SIROCCO) TI - A Deterministic Worst-Case Message Complexity Optimal Solution for Resource Discovery ER - TY - CHAP AU - Higham, J. J. S. AU - Kremer, H.-Hugo AU - Yeomans, D. ED - Deitmer, L. ED - Hauschildt, U. ED - Rauner, F. ED - Zelloth, H. ID - 6456 T2 - The Architecture of Innovative Apprenticeship TI - Exploring Intermediate Vocational Education and Training for 16-19 Year-olds in Germany and England ER - TY - CHAP AU - Kremer, H.-Hugo AU - Beutner, Marc AU - Wirth, W. ED - Kremer, H.-H. ED - Beutner, M. ED - Wirth, W. ID - 6457 T2 - Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug TI - Lernen im Justizvollzug. Vorstellung und Grundidee des Modellprojektes TANDEM ER - TY - CHAP AU - Kremer, H.-Hugo AU - Beutner, Marc ID - 6458 T2 - Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug TI - Berufsorientierung im Jungtätervollzug - Rahmenkonzept und übergreifenden Prinzipien ER - TY - CHAP AU - Gebbe, M. AU - Kremer, H.-Hugo ED - Kremer, H.-H. ED - Beutner, M. ED - Wirth, W. ID - 6459 T2 - Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug TI - myflux.eu - Ein Instrument zur Förderung von Zielorientierung, Reflexion und Verantwortung im Berufsorientierungsprozess von Jungtätern ER - TY - CHAP AU - Kremer, H.-Hugo AU - Knust, S. ED - Kremer, H.-H. ED - Beutner, M. ED - Wirth, W. ID - 6461 T2 - Berufsorientierung, Gewaltsensibilisierung und Kompetenzentwicklung - Konzepte zur beruflichen Bildung im Jungtätervollzug TI - Stärkenbasierte Berufsorientierung im Jungtätervollzug ER -