2007
DOI: 10.1007/978-3-540-76890-6_27
|View full text |Cite
|
Sign up to set email alerts
|

Peer Enterprises: Possibilities, Challenges and Some Ideas Towards Their Realization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
10
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 15 publications
(11 citation statements)
references
References 9 publications
1
10
0
Order By: Relevance
“…We then passed the output of this dense layer into another dense layer with 64 units and used a dropout layer with the dropout rate as 0.15. Finally, the output of this dense layer was passed to a final dense layer with units as 1 and activation as sigmoid to get output as 0 or 1, which indicated the prediction of our model [23]. We then compiled our model using Adam as the optimizer and binary cross entropy as loss.…”
Section: Training Modelmentioning
confidence: 99%
“…We then passed the output of this dense layer into another dense layer with 64 units and used a dropout layer with the dropout rate as 0.15. Finally, the output of this dense layer was passed to a final dense layer with units as 1 and activation as sigmoid to get output as 0 or 1, which indicated the prediction of our model [23]. We then compiled our model using Adam as the optimizer and binary cross entropy as loss.…”
Section: Training Modelmentioning
confidence: 99%
“…Figures 2 and 3 provide the security policies on Secure Linux for a remote user and remote application, respectively. The syntax and semantics of security policies for SE Linux are available in Gupta & Awasthi, 2007. It is assumed that the relevant P2P middleware shall place the remote application in the remote_user's home directory and assign the ownership of the remote application to "remote_user."…”
Section: Se Linux Security Policymentioning
confidence: 99%
“…The model uses the fine-grained privileges and rule-based access control mechanisms provided by Secure Linux (Linux SE, http://www.nsa.gov/selinux/info/docs.cfm) and a custom-built remote application monitor (RAM) to create a secure computing environment for cyclestealing P2P applications, without having to pay the overheads of managing trust and reputation values. This work is part of a bigger effort to enable secure P2P interactions across organizations and some of the issues addressed are due to specific requirements of the architecture proposed in (Gupta & Awasthi, 2007) by the authors.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Peer Enterprises (PE) [9], is a multi-level peer-to-peer network which facilitates cross-organizational interactions allowing compute resources, content and expert human knowledge to be shared and utilized seamlessly. This research paper showcases the PE concept and positions it as a lowercost and lower-energy alternative to cloud computing, which can possibly cater to similar computing requirements as cloud computing.…”
Section: Introductionmentioning
confidence: 99%