By the adoption of architecture as a means for communication and discourse between the architect and the recipient, yet current arguments took the conscious of local architect away from the uniqueness and the concerns...By the adoption of architecture as a means for communication and discourse between the architect and the recipient, yet current arguments took the conscious of local architect away from the uniqueness and the concerns of the society, as well. It also dominated its creative and educational capabilities through making him distracted in formal non-rational overestimated compositions without dealing with the concerns and needs of the society and sympathize with its affection that led to the appearance of an intellectual crisis resulted from the loss of design strategy in the current trends among some Jordanian architects. As such, not only substantial amount of the leading architectural intellect had deteriorated to formal practices but also it took another approach, becoming incomplete intellectual isolation practicing an overestimated architecture that satisfies free markets requirements which appeared along with the globalization economy. This study attempts to comparatively investigate the variation in some architectural practices as a methodology based on design readings of the previous issues which were characterized of architectural uniqueness and current issues that lack of the existing intellectual references.展开更多
Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated ...Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.展开更多
文摘By the adoption of architecture as a means for communication and discourse between the architect and the recipient, yet current arguments took the conscious of local architect away from the uniqueness and the concerns of the society, as well. It also dominated its creative and educational capabilities through making him distracted in formal non-rational overestimated compositions without dealing with the concerns and needs of the society and sympathize with its affection that led to the appearance of an intellectual crisis resulted from the loss of design strategy in the current trends among some Jordanian architects. As such, not only substantial amount of the leading architectural intellect had deteriorated to formal practices but also it took another approach, becoming incomplete intellectual isolation practicing an overestimated architecture that satisfies free markets requirements which appeared along with the globalization economy. This study attempts to comparatively investigate the variation in some architectural practices as a methodology based on design readings of the previous issues which were characterized of architectural uniqueness and current issues that lack of the existing intellectual references.
基金supported by the Fundamental Research funds for the central Universities of China (No. K15JB00190)the Ph.D. Programs Foundation of Ministry of Education of China (No. 20120009120010)the Program for Innovative Research Team in University of Ministry of Education of China (IRT201206)
文摘Separation issue is one of the most important problems about cloud computing security. Tenants should be separated from each other based on cloud infrastructure and different users from one tenant should be separated from each other with the constraint of security policies. Learning from the notion of trusted cloud computing and trustworthiness in cloud, in this paper, a multi-level authorization separation model is formally described, and a series of rules are proposed to summarize the separation property of this model. The correctness of the rules is proved. Furthermore, based on this model, a tenant separation mechanism is deployed in a real world mixed-critical information system. Performance benchmarks have shown the availability and efficiency of this mechanism.