首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
ACaaS: Access Control as a Service for IaaS Cloud ACaaS: IaaS云的访问控制即服务
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.66
Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie
Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and fine-grained access control mechanism, in order to meet dynamic, extensible, and highly configurable security requirements of these cloud consumers. However, existing security mechanisms provided by IaaS cloud providers do not satisfy these requirements. To address such an emergent demand, we propose a new cloud service called access control as a service (ACaaS), a service-oriented architecture in cloud to support multiple access control models, with the spirit of plug gable access control modules in modern operating systems. As a proof-of-concept reference prototype, we design and implement ACaaS_RBAC to provide role-based access control (RBAC) for Amazon Web Services (AWS), where cloud customers can easily integrate the service into enterprise applications in order to extend RBAC policy enforcement in AWS.
组织和企业已经将其计算、存储和工作流外包给基于基础设施即服务(IaaS)的云平台。IaaS云环境的异构性和高度多样性,需要一种全面、细粒度的访问控制机制,以满足这些云消费者动态、可扩展、高度可配置的安全需求。然而,IaaS云提供商提供的现有安全机制并不能满足这些需求。为了满足这种需求,我们提出了一种新的云服务——访问控制即服务(ACaaS),这是一种面向服务的云架构,支持多种访问控制模型,具有现代操作系统中插拔式访问控制模块的精神。作为概念验证参考原型,我们设计并实现了ACaaS_RBAC,为Amazon Web Services (AWS)提供基于角色的访问控制(RBAC),云客户可以轻松地将该服务集成到企业应用程序中,以便在AWS中扩展RBAC策略的实施。
{"title":"ACaaS: Access Control as a Service for IaaS Cloud","authors":"Ruoyu Wu, Xinwen Zhang, Gail-Joon Ahn, Hadi Sharifi, Haiyong Xie","doi":"10.1109/SocialCom.2013.66","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.66","url":null,"abstract":"Organizations and enterprises have been outsourcing their computation, storage, and workflows to Infrastructure-as-a-Service (IaaS) based cloud platforms. The heterogeneity and high diversity of IaaS cloud environment demand a comprehensive and fine-grained access control mechanism, in order to meet dynamic, extensible, and highly configurable security requirements of these cloud consumers. However, existing security mechanisms provided by IaaS cloud providers do not satisfy these requirements. To address such an emergent demand, we propose a new cloud service called access control as a service (ACaaS), a service-oriented architecture in cloud to support multiple access control models, with the spirit of plug gable access control modules in modern operating systems. As a proof-of-concept reference prototype, we design and implement ACaaS_RBAC to provide role-based access control (RBAC) for Amazon Web Services (AWS), where cloud customers can easily integrate the service into enterprise applications in order to extend RBAC policy enforcement in AWS.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123058322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
In Guards We Trust: Security and Privacy in Operating Systems Revisited 《我们信任的守卫:操作系统中的安全和隐私重访》
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.87
Michael Hanspach, J. Keller
With the rise of formally verified micro kernels, we finally have a trusted platform for secure IPC and rigorous enforcement of our mandatory access control policy. But, not every problem in computer security and privacy could possibly be solved by a trusted micro kernel, because we have higher level security and privacy concepts like packet filtering, data encryption and partitioning of shared hardware devices, which we also need to trust. Numerous authors have described the need for a trusted middleware, fulfilling these higher level security and privacy goals, but detailed requirements for the different security and privacy goals are still missing. We provide a collection of output filters that can be applied to trusted operating system components to enforce higher level security goals. We further provide a typology of operating system guards, which are essentially trusted components utilizing different compilations of input and output filters. The storage guard, the audio filtering guard and the sequencing guard are specifically targeted at providing solutions to three common security and privacy problems in component-based operating systems. Finally, we develop a guard reference architecture and present the concept of a guard construction kit for the development of new types of operating system guards, enabling operating system developers to build their own guard components for both component-based and commodity operating systems.
随着正式验证微内核的兴起,我们终于有了一个可靠的安全IPC平台,并严格执行我们的强制访问控制策略。但是,并不是所有的计算机安全和隐私问题都可以通过一个可信的微内核来解决,因为我们有更高层次的安全和隐私概念,比如包过滤、数据加密和共享硬件设备的分区,这些我们也需要信任。许多作者已经描述了对可信中间件的需求,以实现这些更高级别的安全和隐私目标,但是仍然缺少对不同安全和隐私目标的详细需求。我们提供了一组输出过滤器,可将其应用于受信任的操作系统组件,以实现更高级别的安全目标。我们进一步提供了一种操作系统守卫的类型,这些守卫本质上是利用输入和输出过滤器的不同编译的可信组件。存储保护、音频过滤保护和排序保护专门针对基于组件的操作系统中三个常见的安全和隐私问题提供解决方案。最后,我们开发了一个保护参考体系结构,并提出了用于开发新型操作系统保护的保护构建工具包的概念,使操作系统开发人员能够为基于组件的和商用操作系统构建自己的保护组件。
{"title":"In Guards We Trust: Security and Privacy in Operating Systems Revisited","authors":"Michael Hanspach, J. Keller","doi":"10.1109/SocialCom.2013.87","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.87","url":null,"abstract":"With the rise of formally verified micro kernels, we finally have a trusted platform for secure IPC and rigorous enforcement of our mandatory access control policy. But, not every problem in computer security and privacy could possibly be solved by a trusted micro kernel, because we have higher level security and privacy concepts like packet filtering, data encryption and partitioning of shared hardware devices, which we also need to trust. Numerous authors have described the need for a trusted middleware, fulfilling these higher level security and privacy goals, but detailed requirements for the different security and privacy goals are still missing. We provide a collection of output filters that can be applied to trusted operating system components to enforce higher level security goals. We further provide a typology of operating system guards, which are essentially trusted components utilizing different compilations of input and output filters. The storage guard, the audio filtering guard and the sequencing guard are specifically targeted at providing solutions to three common security and privacy problems in component-based operating systems. Finally, we develop a guard reference architecture and present the concept of a guard construction kit for the development of new types of operating system guards, enabling operating system developers to build their own guard components for both component-based and commodity operating systems.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Creating Semantic Data from Relational Database 从关系数据库创建语义数据
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.174
Chang-Hoo Jeong, Sung-Pil Choi, Sungho Shin, Seungwoo Lee, Hanmin Jung, Soon-Young Kim, Pyung Kim
The semantic web technology contributes to finding accurate information on the basis of the meaning of words or improving access capabilities to information through inference between meanings. However, the reason that the semantic service is not spreading is that the semantic technology is not yet settled for practical use. Another reason is that it is not easy to build ontology which is used as a knowledge representation model for providing the semantic service. Previous studies have concentrated on the process of automatically creating ontology in a RDB (Relational Database), or automatically converting it to instances. This study focuses on allocating a unique identifier to the existing DB data through entity identification to enable more accurate services to be provided in the process of converting the RDBMS data to ontology instances. Besides, this study extracts triple data including important entities and their relationships from unstructured texts stored in BLOB (Binary Large Object) format by using text mining technology, and makes them ontology instances. The DB-to-OWL converting system (Onto URI) uses a mapping rule between the DB schema and the ontology schema, an identification rule for identifying entities, text mining for extracting semantic triple, and the authority data in order to effectively support automatic creation of ontology instances with DB data. As a result, the proposed system contributes to creating semantic data automatically from relational database through URI allocation and identification.
语义网技术有助于根据词的含义找到准确的信息,或通过意义之间的推理提高对信息的访问能力。然而,语义服务没有得到推广的原因是语义技术还没有得到实际应用。另一个原因是本体不容易建立,本体作为提供语义服务的知识表示模型。以往的研究主要集中在RDB(关系型数据库)中本体的自动创建过程,或者将本体自动转换为实例。本研究的重点是通过实体识别为现有的DB数据分配一个唯一的标识符,以便在将RDBMS数据转换为本体实例的过程中提供更准确的服务。此外,利用文本挖掘技术从存储于BLOB (Binary Large Object,二进制大对象)格式的非结构化文本中提取包含重要实体及其关系的三重数据,并将其作为本体实例。数据库到owl的转换系统(Onto URI)使用数据库模式和本体模式之间的映射规则、标识实体的标识规则、提取语义三元组的文本挖掘和权威数据,有效地支持用DB数据自动创建本体实例。通过URI分配和标识,实现了从关系数据库中自动生成语义数据的功能。
{"title":"Creating Semantic Data from Relational Database","authors":"Chang-Hoo Jeong, Sung-Pil Choi, Sungho Shin, Seungwoo Lee, Hanmin Jung, Soon-Young Kim, Pyung Kim","doi":"10.1109/SocialCom.2013.174","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.174","url":null,"abstract":"The semantic web technology contributes to finding accurate information on the basis of the meaning of words or improving access capabilities to information through inference between meanings. However, the reason that the semantic service is not spreading is that the semantic technology is not yet settled for practical use. Another reason is that it is not easy to build ontology which is used as a knowledge representation model for providing the semantic service. Previous studies have concentrated on the process of automatically creating ontology in a RDB (Relational Database), or automatically converting it to instances. This study focuses on allocating a unique identifier to the existing DB data through entity identification to enable more accurate services to be provided in the process of converting the RDBMS data to ontology instances. Besides, this study extracts triple data including important entities and their relationships from unstructured texts stored in BLOB (Binary Large Object) format by using text mining technology, and makes them ontology instances. The DB-to-OWL converting system (Onto URI) uses a mapping rule between the DB schema and the ontology schema, an identification rule for identifying entities, text mining for extracting semantic triple, and the authority data in order to effectively support automatic creation of ontology instances with DB data. As a result, the proposed system contributes to creating semantic data automatically from relational database through URI allocation and identification.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125888276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bayesian Security Games for Controlling Contagion 控制传染的贝叶斯安全博弈
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.11
J. Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe
Influence blocking games have been used to model adversarial domains with a social component, such as counterinsurgency. In these games, a mitigator attempts to minimize the efforts of an influencer to spread his agenda across a social network. Previous work has assumed that the influence graph structure is known with certainty by both players. However, in reality, there is often significant information asymmetry between the mitigator and the influencer. We introduce a model of this information asymmetry as a two-player zero-sum Bayesian game. Nearly all past work in influence maximization and social network analysis suggests that graph structure is fundamental in strategy generation, leading to an expectation that solving the Bayesian game exactly is crucial. Surprisingly, we show through extensive experimentation on synthetic and real-world social networks that many common forms of uncertainty can be addressed near optimally by ignoring the vast majority of it and simply solving an abstracted game with a few randomly chosen types. This suggests that optimal strategies of games that do not model the full range of uncertainty in influence blocking games are typically robust to uncertainty about the influence graph structure.
影响力阻断游戏已经被用来模拟带有社会成分的对抗领域,比如反叛乱。在这些游戏中,缓和者试图将影响者通过社交网络传播其议程的努力最小化。先前的研究假设影响图结构是双方都知道的。然而,在现实中,缓解者和影响者之间往往存在显著的信息不对称。我们将这种信息不对称的模型描述为一个二人零和贝叶斯博弈。过去几乎所有关于影响力最大化和社交网络分析的研究都表明,图结构是策略生成的基础,这导致人们期望准确地解决贝叶斯博弈是至关重要的。令人惊讶的是,我们通过在合成和现实社交网络上的大量实验表明,通过忽略绝大多数不确定性,简单地用一些随机选择的类型来解决抽象游戏,许多常见的不确定性形式都可以得到接近最佳的解决。这表明,在影响阻塞博弈中,没有对所有不确定性进行建模的博弈的最优策略通常对影响图结构的不确定性具有鲁棒性。
{"title":"Bayesian Security Games for Controlling Contagion","authors":"J. Tsai, Yundi Qian, Yevgeniy Vorobeychik, Christopher Kiekintveld, Milind Tambe","doi":"10.1109/SocialCom.2013.11","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.11","url":null,"abstract":"Influence blocking games have been used to model adversarial domains with a social component, such as counterinsurgency. In these games, a mitigator attempts to minimize the efforts of an influencer to spread his agenda across a social network. Previous work has assumed that the influence graph structure is known with certainty by both players. However, in reality, there is often significant information asymmetry between the mitigator and the influencer. We introduce a model of this information asymmetry as a two-player zero-sum Bayesian game. Nearly all past work in influence maximization and social network analysis suggests that graph structure is fundamental in strategy generation, leading to an expectation that solving the Bayesian game exactly is crucial. Surprisingly, we show through extensive experimentation on synthetic and real-world social networks that many common forms of uncertainty can be addressed near optimally by ignoring the vast majority of it and simply solving an abstracted game with a few randomly chosen types. This suggests that optimal strategies of games that do not model the full range of uncertainty in influence blocking games are typically robust to uncertainty about the influence graph structure.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"71 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123251310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering 构建前的预处理:引入隐私需求工程框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.85
Peter J. Radics, D. Gračanin, D. Kafura
With the increased ubiquity of technology comes the challenge of addressing the privacy concerns of the intended users. Privacy is an extremely complex social phenomenon with myriads of variations. Difficulty in designing privacy-aware applications, however, do not stem from a lack of models or design frameworks. Rather, it stems from the gap between the two, the lack of guidance in eliciting privacy requirements. To address this issue, we introduce the Preprocess, a methodological framework for privacy requirements engineering, and demonstrate its power through an application example.
随着技术的日益普及,解决目标用户隐私问题的挑战也随之而来。隐私是一个极其复杂的社会现象,有着千变万化的特点。然而,设计隐私感知应用程序的困难并不源于缺乏模型或设计框架。相反,它源于两者之间的差距,即在引出隐私要求方面缺乏指导。为了解决这个问题,我们介绍了Preprocess,这是一个用于隐私需求工程的方法学框架,并通过一个应用程序示例展示了它的强大功能。
{"title":"Preprocess before You Build: Introducing a Framework for Privacy Requirements Engineering","authors":"Peter J. Radics, D. Gračanin, D. Kafura","doi":"10.1109/SocialCom.2013.85","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.85","url":null,"abstract":"With the increased ubiquity of technology comes the challenge of addressing the privacy concerns of the intended users. Privacy is an extremely complex social phenomenon with myriads of variations. Difficulty in designing privacy-aware applications, however, do not stem from a lack of models or design frameworks. Rather, it stems from the gap between the two, the lack of guidance in eliciting privacy requirements. To address this issue, we introduce the Preprocess, a methodological framework for privacy requirements engineering, and demonstrate its power through an application example.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Modeling Attrition in Organizations from Email Communication 基于电子邮件沟通的组织人员流失建模
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.52
Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, J. Hanley
Modeling people's online behavior in relation to their real-world social context is an interesting and important research problem. In this paper, we present our preliminary study of attrition behavior in real-world organizations based on two online datasets: a dataset from a small startup (40+ users) and a dataset from one large US company (3600+ users). The small startup dataset is collected using our privacy-preserving data logging tool, which removes personal identifiable information from content data and extracts only aggregated statistics such as word frequency counts and sentiment features. The privacy-preserving measures have enabled us to recruit participants to support this study. Correlation analysis over the startup dataset has shown that statistically there is often a change point in people's online behavior, and data exhibits weak trends that may be manifestation of real-world attrition. Same findings are also verified in the large company dataset. Furthermore, we have trained a classifier to predict real-world attrition with a moderate accuracy of 60-65% on the large company dataset. Given the incompleteness and noisy nature of data, the accuracy is encouraging.
将人们的网络行为与他们的现实社会环境相关联是一个有趣而重要的研究问题。在本文中,我们基于两个在线数据集介绍了我们对现实世界组织中人员流失行为的初步研究:一个数据集来自一家小型初创公司(40+用户),另一个数据集来自一家大型美国公司(3600+用户)。小型创业公司数据集是使用我们的隐私保护数据记录工具收集的,该工具从内容数据中删除个人身份信息,仅提取汇总统计信息,如词频计数和情感特征。隐私保护措施使我们能够招募参与者来支持本研究。对创业公司数据集的相关分析表明,在统计上,人们的在线行为往往存在一个变化点,数据显示出的微弱趋势可能是现实世界人员流失的表现。同样的发现也在大型公司数据集中得到了验证。此外,我们已经训练了一个分类器来预测现实世界的人员流失,在大型公司数据集上的准确度为60-65%。考虑到数据的不完整性和嘈杂性,其准确性是令人鼓舞的。
{"title":"Modeling Attrition in Organizations from Email Communication","authors":"Akshay Patil, Juan Liu, Jianqiang Shen, Oliver Brdiczka, Jie Gao, J. Hanley","doi":"10.1109/SocialCom.2013.52","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.52","url":null,"abstract":"Modeling people's online behavior in relation to their real-world social context is an interesting and important research problem. In this paper, we present our preliminary study of attrition behavior in real-world organizations based on two online datasets: a dataset from a small startup (40+ users) and a dataset from one large US company (3600+ users). The small startup dataset is collected using our privacy-preserving data logging tool, which removes personal identifiable information from content data and extracts only aggregated statistics such as word frequency counts and sentiment features. The privacy-preserving measures have enabled us to recruit participants to support this study. Correlation analysis over the startup dataset has shown that statistically there is often a change point in people's online behavior, and data exhibits weak trends that may be manifestation of real-world attrition. Same findings are also verified in the large company dataset. Furthermore, we have trained a classifier to predict real-world attrition with a moderate accuracy of 60-65% on the large company dataset. Given the incompleteness and noisy nature of data, the accuracy is encouraging.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115581252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Semantic Framework for Content-Based Access Controls 基于内容访问控制的语义框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.94
Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, J. Pato
Social networking sites provide role-or group-based access controls to help users specify their privacy settings. However, information posted on these sites is often intentionally or unintentionally leaked and has caused harm or distress to users. In this paper, we investigate possible improvements to existing implementations by introducing content-based access control policies using Linked Data. Users are able to specify the type of content in the form of tags or keywords in order to indicate which information they wish to protect from certain roles (for example employment), groups or individuals. Providing all possible keywords matching a specific topic may be too time consuming and prone to error for users. Hence using Linked Data we enrich the provided keywords by identifying other meaningful and related concepts. This paper presents the implementation and challenges of developing such a semantic framework. We have qualitatively evaluated this framework using 23 participants. Feedback from participants suggests that such a framework will help ease privacy concerns while posting and sharing social network content.
社交网站提供基于角色或组的访问控制,帮助用户指定他们的隐私设置。然而,在这些网站上发布的信息往往有意或无意地泄露,并对用户造成伤害或困扰。在本文中,我们研究了通过使用关联数据引入基于内容的访问控制策略对现有实现的可能改进。用户能够以标签或关键字的形式指定内容的类型,以便表明他们希望保护哪些信息不受某些角色(例如就业)、团体或个人的影响。对于用户来说,提供与特定主题匹配的所有可能的关键字可能太耗时,而且容易出错。因此,使用关联数据,我们通过识别其他有意义和相关的概念来丰富所提供的关键字。本文介绍了开发这种语义框架的实现和挑战。我们使用23名参与者对该框架进行了定性评估。参与者的反馈表明,这样的框架将有助于缓解在发布和分享社交网络内容时对隐私的担忧。
{"title":"A Semantic Framework for Content-Based Access Controls","authors":"Sharon Paradesi, Ilaria Liccardi, Lalana Kagal, J. Pato","doi":"10.1109/SocialCom.2013.94","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.94","url":null,"abstract":"Social networking sites provide role-or group-based access controls to help users specify their privacy settings. However, information posted on these sites is often intentionally or unintentionally leaked and has caused harm or distress to users. In this paper, we investigate possible improvements to existing implementations by introducing content-based access control policies using Linked Data. Users are able to specify the type of content in the form of tags or keywords in order to indicate which information they wish to protect from certain roles (for example employment), groups or individuals. Providing all possible keywords matching a specific topic may be too time consuming and prone to error for users. Hence using Linked Data we enrich the provided keywords by identifying other meaningful and related concepts. This paper presents the implementation and challenges of developing such a semantic framework. We have qualitatively evaluated this framework using 23 participants. Feedback from participants suggests that such a framework will help ease privacy concerns while posting and sharing social network content.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129943065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Human Activity Recognition Based on 3D Mesh MoSIFT Feature Descriptor 基于三维网格MoSIFT特征描述符的人体活动识别
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.151
Yue Ming
The times of Big Data promotes increasingly higher demands for information processing. The rapid development of 3D digital capturing devices prompts the traditional behavior analysis towards fine motion recognition, such as hands and gesture. In this paper, a complete framework of 3D human activity recognition is presented for the behavior analysis of hands and gesture. First, the improved graph cuts method is introduced to hand segmentation and tracking. Then, combined with 3D geometric characteristics and human behavior prior information, 3D Mesh MoSIFT feature descriptor is proposed to represent the discriminant property of human activity. Simulation orthogonal matching pursuit (SOMP) is used to encode the visual code words. Experiments, based on a RGB-D video dataset and ChaLearn gesture dataset, show the improved accuracy of human activity recognition.
大数据时代对信息处理提出了越来越高的要求。三维数字捕捉设备的快速发展促使传统的行为分析转向精细动作识别,如手部和手势。本文提出了一个完整的三维人体活动识别框架,用于手部和手势的行为分析。首先,将改进的图割方法引入到手部分割和跟踪中。然后,结合三维几何特征和人类行为先验信息,提出三维网格MoSIFT特征描述符来表示人类活动的判别性。采用仿真正交匹配追踪(SOMP)对视觉码字进行编码。基于RGB-D视频数据集和ChaLearn手势数据集的实验表明,该方法提高了人体活动识别的准确性。
{"title":"Human Activity Recognition Based on 3D Mesh MoSIFT Feature Descriptor","authors":"Yue Ming","doi":"10.1109/SocialCom.2013.151","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.151","url":null,"abstract":"The times of Big Data promotes increasingly higher demands for information processing. The rapid development of 3D digital capturing devices prompts the traditional behavior analysis towards fine motion recognition, such as hands and gesture. In this paper, a complete framework of 3D human activity recognition is presented for the behavior analysis of hands and gesture. First, the improved graph cuts method is introduced to hand segmentation and tracking. Then, combined with 3D geometric characteristics and human behavior prior information, 3D Mesh MoSIFT feature descriptor is proposed to represent the discriminant property of human activity. Simulation orthogonal matching pursuit (SOMP) is used to encode the visual code words. Experiments, based on a RGB-D video dataset and ChaLearn gesture dataset, show the improved accuracy of human activity recognition.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128633342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour? 隐私和社交网络:关注是意图和行为的有效指标吗?
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.140
T. Hughes-Roberts
End-user privacy is a well-defined problem in Social Networks such as Facebook. Users have stated concern for their privacy yet display behaviour to the contrary within the system, a phenomenon known as the privacy paradox. There is an assumption that high levels of concern for one's privacy should lead to a reluctance to disclose information and to an acceptance of highly protective measures within the network. Few works have studied this paradox in its entirety, each taking differing views of it and using a variety of measures. Furthermore, evidence for the paradox has been found between varying conceptual elements of it and hence, there is a need for a holistic study of this phenomenon in order to identify where the paradox manifests. This work implements a survey instrument aimed at examining if concern should be used as an indicator of intention and action as it is assumed in past literature. Results show that users of social networks desire a benchmark of privacy that is consistent across measures of concern. A survey instrument examining general statements of concern would appear to inadequate in exploring the complex nature of privacy in social networks.
在Facebook等社交网络中,终端用户隐私是一个定义明确的问题。用户表示关心自己的隐私,但在系统内却表现出相反的行为,这种现象被称为隐私悖论。有一种假设认为,对个人隐私的高度关注应该导致人们不愿披露信息,并接受网络内的高度保护措施。很少有作品从整体上研究这个悖论,每个作品都对它采取不同的观点,并使用各种方法。此外,在它的不同概念元素之间发现了悖论的证据,因此,有必要对这一现象进行全面研究,以确定悖论的表现。这项工作实施了一项调查工具,旨在检查是否应该像过去文献中假设的那样,将关注用作意图和行动的指标。结果表明,社交网络的用户希望在关注的措施中有一个一致的隐私基准。一项审查一般关注声明的调查工具似乎不足以探索社交网络中隐私的复杂性。
{"title":"Privacy and Social Networks: Is Concern a Valid Indicator of Intention and Behaviour?","authors":"T. Hughes-Roberts","doi":"10.1109/SocialCom.2013.140","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.140","url":null,"abstract":"End-user privacy is a well-defined problem in Social Networks such as Facebook. Users have stated concern for their privacy yet display behaviour to the contrary within the system, a phenomenon known as the privacy paradox. There is an assumption that high levels of concern for one's privacy should lead to a reluctance to disclose information and to an acceptance of highly protective measures within the network. Few works have studied this paradox in its entirety, each taking differing views of it and using a variety of measures. Furthermore, evidence for the paradox has been found between varying conceptual elements of it and hence, there is a need for a holistic study of this phenomenon in order to identify where the paradox manifests. This work implements a survey instrument aimed at examining if concern should be used as an indicator of intention and action as it is assumed in past literature. Results show that users of social networks desire a benchmark of privacy that is consistent across measures of concern. A survey instrument examining general statements of concern would appear to inadequate in exploring the complex nature of privacy in social networks.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129249894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness 儿童接触手机应用内广告:内容适当性分析
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.36
Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou
There is a rising concern among parents that mobile advertisements may contain violent and sexual content even when the app itself is safe for children. Because mobile advertisements are not controlled by the content rating of apps, unexpected objectionable contents may occur and be harmful to children's mental health. This study is the first to explore the content appropriateness of the in-app advertisements on mobile devices from children's online safety perspective. We find in-app advertisements are common in the free apps designed for children on smart platforms. Experimental results show that a large percent of the in-app advertisements carry inappropriate contents for children. Unfortunately, neither mobile platforms nor advertising networks provide maturity policies to restrict the content appropriateness of the in-app advertisements. This research suggests that these challenges cannot easily be tackled by one entity. Instead, advertisement providers, advertising networks, app developers, and mobile platforms should collaborate in developing policies and mechanisms to monitor the content appropriateness of the in-app advertisements.
家长们越来越担心手机广告可能包含暴力和性内容,即使应用程序本身对孩子来说是安全的。由于移动广告不受应用程序内容评级的控制,可能会出现意想不到的不良内容,对儿童的心理健康有害。本研究首次从儿童网络安全的角度探讨移动设备上应用内广告的内容适宜性。我们发现,在智能平台上为儿童设计的免费应用中,应用内广告很常见。实验结果表明,很大比例的应用内广告含有不适合儿童的内容。不幸的是,手机平台和广告网络都没有提供成熟的政策来限制应用内广告的内容适当性。这项研究表明,这些挑战不可能由一个实体轻易解决。相反,广告提供商、广告网络、应用开发商和移动平台应该合作制定政策和机制,以监控应用内广告的内容适当性。
{"title":"Children's Exposure to Mobile In-App Advertising: An Analysis of Content Appropriateness","authors":"Ying Chen, Sencun Zhu, Heng Xu, Yilu Zhou","doi":"10.1109/SocialCom.2013.36","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.36","url":null,"abstract":"There is a rising concern among parents that mobile advertisements may contain violent and sexual content even when the app itself is safe for children. Because mobile advertisements are not controlled by the content rating of apps, unexpected objectionable contents may occur and be harmful to children's mental health. This study is the first to explore the content appropriateness of the in-app advertisements on mobile devices from children's online safety perspective. We find in-app advertisements are common in the free apps designed for children on smart platforms. Experimental results show that a large percent of the in-app advertisements carry inappropriate contents for children. Unfortunately, neither mobile platforms nor advertising networks provide maturity policies to restrict the content appropriateness of the in-app advertisements. This research suggests that these challenges cannot easily be tackled by one entity. Instead, advertisement providers, advertising networks, app developers, and mobile platforms should collaborate in developing policies and mechanisms to monitor the content appropriateness of the in-app advertisements.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126350893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1