首页 > 最新文献

2013 International Conference on Social Computing最新文献

英文 中文
Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices 基于智能设备上承载的数据和应用程序活动检测的安全执行上下文强制框架
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.95
Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos
A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.
考虑到智能设备上一组交互资源上独立管理实体的安全需求组合的机制需要能够提供某种类型的执行上下文控制。建议的框架由体系结构和策略模型组成。该体系结构检测不同的事件和活动(即用户、系统、应用程序),并基于它们实施适用的策略,并约束给定资源集的执行上下文。策略模型提供了一种方法,通过组合不同实体在受保护资源上发布的不同类型的策略(例如访问、使用、执行)来动态创建安全执行上下文。
{"title":"Secure Execution Context Enforcement Framework Based on Activity Detection on Data and Applications Hosted on Smart Devices","authors":"Yair Diaz-Tellez, E. Bodanese, F. El-Moussa, T. Dimitrakos","doi":"10.1109/SocialCom.2013.95","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.95","url":null,"abstract":"A mechanism that takes into account the combination of security requirements from independent administrative entities over a set of interacting resources on a smart device requires the ability to provide some sort of execution context control. The proposed framework consists of an architecture and a policy model. The architecture detects different events and activities (i.e. user, system, applications) and based on them enforces applicable policies and constrains the execution context for a given set of resources. The policy model offers a method to dynamically create a secure execution context by combining different types of policies (e.g. access, usage, execution) issued by different entities on protected resources.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fast Information Retrieval and Social Network Mining via Cosine Similarity Upper Bound 基于余弦相似度上界的快速信息检索与社会网络挖掘
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.147
Weizhong Zhao, M. VenkataSwamy, Gang Chen, Xiaowei Xu
Similarity search is a key function for many applications including databases, pattern recognition and recommendation systems to name a few. In this paper, we first propose ε-query, a similarity search based on the popular cosine similarity for information retrieval and social network analysis. In contrast to traditional similarity search ε-query returns results whose cosine similarities with the query are larger than a threshold ε. The major contribution of this paper is an efficient ε-query processing algorithm by using an upper bound for binary data. Our evaluation using two of the largest publicly available real datasets, ClueWeb09 and Twitter, demonstrated that the proposed method could achieve several orders of magnitude speedup in comparison with the traditional approach. Last but not least, we applied the proposed method for information retrieval from ClueWeb and finding community structures from Twitter. The outcome further proved the effectiveness of the proposed method.
相似性搜索是许多应用程序的关键功能,包括数据库、模式识别和推荐系统等等。本文首先提出了一种基于流行余弦相似度的相似性搜索方法ε-query,用于信息检索和社会网络分析。与传统的相似度搜索相比,ε-query返回的结果与查询的余弦相似度大于阈值ε。本文的主要贡献是一种利用二进制数据上界的高效ε-查询处理算法。我们使用两个最大的公开可用的真实数据集(ClueWeb09和Twitter)进行评估,结果表明,与传统方法相比,所提出的方法可以实现几个数量级的加速。最后,我们将该方法应用于ClueWeb的信息检索和Twitter的社区结构查找。实验结果进一步证明了该方法的有效性。
{"title":"Fast Information Retrieval and Social Network Mining via Cosine Similarity Upper Bound","authors":"Weizhong Zhao, M. VenkataSwamy, Gang Chen, Xiaowei Xu","doi":"10.1109/SocialCom.2013.147","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.147","url":null,"abstract":"Similarity search is a key function for many applications including databases, pattern recognition and recommendation systems to name a few. In this paper, we first propose ε-query, a similarity search based on the popular cosine similarity for information retrieval and social network analysis. In contrast to traditional similarity search ε-query returns results whose cosine similarities with the query are larger than a threshold ε. The major contribution of this paper is an efficient ε-query processing algorithm by using an upper bound for binary data. Our evaluation using two of the largest publicly available real datasets, ClueWeb09 and Twitter, demonstrated that the proposed method could achieve several orders of magnitude speedup in comparison with the traditional approach. Last but not least, we applied the proposed method for information retrieval from ClueWeb and finding community structures from Twitter. The outcome further proved the effectiveness of the proposed method.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115523223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Real-Time Data Streaming Architecture and Intelligent Workflow Management for Processing Massive Ecological Videos 面向海量生态视频处理的实时数据流架构与智能工作流管理
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.173
G. Nadarajan, Cheng-Lin Yang, Y. Chen-Burger, Yu-Jung Cheng, S. Lin, Fang-Pang Lin
We present data collection and storage utilities and a workflow management system for handling the processing of large volumes of videos collected from an ecological source over several years and still growing. They lie in the heart of an integrated system that brings together expertise from various disciplines, including marine science, image processing, high performance computing and user interface. A real-time data streaming architecture was developed for efficient collection and storage of videos. In the analysis part, a workflow management system with two main components was deployed, i) a workflow engine and ii) a workflow monitor. The workflow engine deals with on-demand user queries and batch queries, selection of suitable computing platform and invocation of optimal software modules, while the workflow monitor handles the seamless execution and intelligent error handling of workflow jobs on a heterogeneous computing platform. We discuss the challenges that lie ahead for the workflow system such as the demand for more sophisticated scheduling and monitoring.
我们提出了数据收集和存储实用程序,以及一个工作流管理系统,用于处理从生态来源收集的大量视频的处理,这些视频已经收集了几年,并且仍在增长。它们位于一个综合系统的核心,该系统汇集了来自各个学科的专业知识,包括海洋科学、图像处理、高性能计算和用户界面。为了实现视频的高效采集和存储,提出了一种实时数据流架构。在分析部分,部署了一个工作流管理系统,该系统由工作流引擎和工作流监视器两个主要组件组成。工作流引擎处理按需用户查询和批量查询,选择合适的计算平台和调用最优软件模块,工作流监视器处理工作流作业在异构计算平台上的无缝执行和智能错误处理。我们讨论了工作流系统面临的挑战,例如对更复杂的调度和监控的需求。
{"title":"Real-Time Data Streaming Architecture and Intelligent Workflow Management for Processing Massive Ecological Videos","authors":"G. Nadarajan, Cheng-Lin Yang, Y. Chen-Burger, Yu-Jung Cheng, S. Lin, Fang-Pang Lin","doi":"10.1109/SocialCom.2013.173","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.173","url":null,"abstract":"We present data collection and storage utilities and a workflow management system for handling the processing of large volumes of videos collected from an ecological source over several years and still growing. They lie in the heart of an integrated system that brings together expertise from various disciplines, including marine science, image processing, high performance computing and user interface. A real-time data streaming architecture was developed for efficient collection and storage of videos. In the analysis part, a workflow management system with two main components was deployed, i) a workflow engine and ii) a workflow monitor. The workflow engine deals with on-demand user queries and batch queries, selection of suitable computing platform and invocation of optimal software modules, while the workflow monitor handles the seamless execution and intelligent error handling of workflow jobs on a heterogeneous computing platform. We discuss the challenges that lie ahead for the workflow system such as the demand for more sophisticated scheduling and monitoring.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122723620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Understanding Information Credibility on Twitter 理解Twitter上的信息可信度
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.9
Sujoy Sikdar, Byungkyu Kang, J. O'Donovan, Tobias Höllerer, Sibel Adali
Increased popularity of microblogs in recent years brings about a need for better mechanisms to extract credible or otherwise useful information from noisy and large data. While there are a great number of studies that introduce methods to find credible data, there is no accepted credibility benchmark. As a result, it is hard to compare different studies and generalize from their findings. In this paper, we argue for a methodology for making such studies more useful to the research community. First, the underlying ground truth values of credibility must be reliable. The specific constructs used to define credibility must be carefully defined. Secondly, the underlying network context must be quantified and documented. To illustrate these two points, we conduct a unique credibility study of two different data sets on the same topic, but with different network characteristics. We also conduct two different user surveys, and construct two additional indicators of credibility based on retweet behavior. Through a detailed statistical study, we first show that survey based methods can be extremely noisy and results may vary greatly from survey to survey. However, by combining such methods with retweet behavior, we can incorporate two signals that are noisy but uncorrelated, resulting in ground truth measures that can be predicted with high accuracy and are stable across different data sets and survey methods. Newsworthiness of tweets can be a useful frame for specific applications, but it is not necessary for achieving reliable credibility ground truth measurements.
近年来,微博越来越受欢迎,需要更好的机制从嘈杂的大数据中提取可信或有用的信息。虽然有大量的研究介绍了寻找可信数据的方法,但没有公认的可信度基准。因此,很难比较不同的研究并从他们的发现中得出结论。在本文中,我们提出了一种使此类研究对研究界更有用的方法。首先,可信度的基础真理值必须是可靠的。必须仔细定义用于定义可信度的具体结构。其次,必须对潜在的网络环境进行量化和记录。为了说明这两点,我们对同一主题的两个不同数据集进行了独特的可信度研究,但具有不同的网络特征。我们还进行了两次不同的用户调查,并基于转发行为构建了两个额外的可信度指标。通过详细的统计研究,我们首先表明,基于调查的方法可能非常嘈杂,结果可能因调查而有很大差异。然而,通过将这些方法与转发行为相结合,我们可以将两个有噪声但不相关的信号结合起来,从而得到可以高精度预测的地面真值测量,并且在不同的数据集和调查方法中都是稳定的。推文的新闻价值可以成为特定应用的有用框架,但它不是实现可靠可信度的必要条件。
{"title":"Understanding Information Credibility on Twitter","authors":"Sujoy Sikdar, Byungkyu Kang, J. O'Donovan, Tobias Höllerer, Sibel Adali","doi":"10.1109/SocialCom.2013.9","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.9","url":null,"abstract":"Increased popularity of microblogs in recent years brings about a need for better mechanisms to extract credible or otherwise useful information from noisy and large data. While there are a great number of studies that introduce methods to find credible data, there is no accepted credibility benchmark. As a result, it is hard to compare different studies and generalize from their findings. In this paper, we argue for a methodology for making such studies more useful to the research community. First, the underlying ground truth values of credibility must be reliable. The specific constructs used to define credibility must be carefully defined. Secondly, the underlying network context must be quantified and documented. To illustrate these two points, we conduct a unique credibility study of two different data sets on the same topic, but with different network characteristics. We also conduct two different user surveys, and construct two additional indicators of credibility based on retweet behavior. Through a detailed statistical study, we first show that survey based methods can be extremely noisy and results may vary greatly from survey to survey. However, by combining such methods with retweet behavior, we can incorporate two signals that are noisy but uncorrelated, resulting in ground truth measures that can be predicted with high accuracy and are stable across different data sets and survey methods. Newsworthiness of tweets can be a useful frame for specific applications, but it is not necessary for achieving reliable credibility ground truth measurements.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125377406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 51
A Job Interview Simulation: Social Cue-Based Interaction with a Virtual Character 工作面试模拟:与虚拟角色的社会线索互动
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.39
Tobias Baur, Ionut Damian, Patrick Gebhard, K. Porayska-Pomsta, E. André
This paper presents an approach that makes use of a virtual character and social signal processing techniques to create an immersive job interview simulation environment. In this environment, the virtual character plays the role of a recruiter which reacts and adapts to the user's behavior thanks to a component for the automatic recognition of social cues (conscious or unconscious behavioral patterns). The social cues pertinent to job interviews have been identified using a knowledge elicitation study with real job seekers. Finally, we present two user studies to investigate the feasibility of the proposed approach as well as the impact of such a system on users.
本文提出了一种利用虚拟人物和社交信号处理技术来创建沉浸式求职面试模拟环境的方法。在这种环境中,虚拟角色扮演招聘人员的角色,通过自动识别社交线索(有意识或无意识的行为模式)的组件,对用户的行为做出反应和适应。通过对真实求职者的知识启发研究,确定了与求职面试相关的社交线索。最后,我们提出了两个用户研究,以调查所提出的方法的可行性以及这样一个系统对用户的影响。
{"title":"A Job Interview Simulation: Social Cue-Based Interaction with a Virtual Character","authors":"Tobias Baur, Ionut Damian, Patrick Gebhard, K. Porayska-Pomsta, E. André","doi":"10.1109/SocialCom.2013.39","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.39","url":null,"abstract":"This paper presents an approach that makes use of a virtual character and social signal processing techniques to create an immersive job interview simulation environment. In this environment, the virtual character plays the role of a recruiter which reacts and adapts to the user's behavior thanks to a component for the automatic recognition of social cues (conscious or unconscious behavioral patterns). The social cues pertinent to job interviews have been identified using a knowledge elicitation study with real job seekers. Finally, we present two user studies to investigate the feasibility of the proposed approach as well as the impact of such a system on users.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Social Welfare and Inequality in a Networked Resource Game with Human Players 人类参与的网络资源博弈中的社会福利与不平等
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.153
Bowen Ni, Yu-Han Chang, R. Maheswaran
This paper introduces the networked resource game with human players, implemented by a graphical online game where players can play their cards and accumulate rewards. We analyze social welfare and inequality through human players experiments, and show how these relate to the results of simulations using algorithms and robots.
本文介绍了一种由图形化的网络游戏实现的有人参与的网络资源游戏。我们通过人类玩家实验来分析社会福利和不平等,并展示这些与使用算法和机器人的模拟结果之间的关系。
{"title":"Social Welfare and Inequality in a Networked Resource Game with Human Players","authors":"Bowen Ni, Yu-Han Chang, R. Maheswaran","doi":"10.1109/SocialCom.2013.153","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.153","url":null,"abstract":"This paper introduces the networked resource game with human players, implemented by a graphical online game where players can play their cards and accumulate rewards. We analyze social welfare and inequality through human players experiments, and show how these relate to the results of simulations using algorithms and robots.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127270134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Spatio-temporal Signal Recovery from Political Tweets in Indonesia 印尼政治推文的时空信号恢复
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.46
Anisha Mazumder, Arun Das, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, H. Davulcu
Online social network community now provides an enormous volume of data for analyzing human sentiment about people, places, events and political activities. It is becoming increasingly clear that analysis of such data can provide great insights on the social, political and cultural aspects of the participants of these networks. As part of the Minerva project, currently underway at Arizona State University, we have analyzed a large volume of Twitter data to understand radical political activity in the provinces of Indonesia. Based on analysis of radical/counter radical sentiments expressed in tweets by Twitter users, we create a Heat Map of Indonesia which visually demonstrates the degree of radical activities in various provinces of Indonesia. We create the Heat Map of Indonesia by computing (i) the Radicalization Index and (ii) the Location Index of each Twitter user from Indonesia, who has expressed some radical sentiment in her tweets. The conclusions derived from our analysis matches significantly with the analysis of Wahid Institute, a leading political think tank of Indonesia, thus validating our results.
在线社交网络社区为分析人类对人物、地点、事件、政治活动的情感提供了大量数据。越来越清楚的是,对这些数据的分析可以提供对这些网络参与者的社会、政治和文化方面的深刻见解。作为Minerva项目的一部分,目前正在亚利桑那州立大学进行,我们分析了大量Twitter数据,以了解印度尼西亚各省的激进政治活动。基于对Twitter用户在推特上表达的激进/反激进情绪的分析,我们制作了一张印尼的热图,直观地展示了印尼各省激进活动的程度。我们通过计算(i)激进化指数(Radicalization Index)和(ii)每一位在推文中表达激进情绪的印尼推特用户的位置指数(Location Index)来绘制印尼热点地图。我们的分析得出的结论与印尼主要政治智库瓦希德研究所的分析结果非常吻合,从而验证了我们的结果。
{"title":"Spatio-temporal Signal Recovery from Political Tweets in Indonesia","authors":"Anisha Mazumder, Arun Das, Nyunsu Kim, Sedat Gokalp, Arunabha Sen, H. Davulcu","doi":"10.1109/SocialCom.2013.46","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.46","url":null,"abstract":"Online social network community now provides an enormous volume of data for analyzing human sentiment about people, places, events and political activities. It is becoming increasingly clear that analysis of such data can provide great insights on the social, political and cultural aspects of the participants of these networks. As part of the Minerva project, currently underway at Arizona State University, we have analyzed a large volume of Twitter data to understand radical political activity in the provinces of Indonesia. Based on analysis of radical/counter radical sentiments expressed in tweets by Twitter users, we create a Heat Map of Indonesia which visually demonstrates the degree of radical activities in various provinces of Indonesia. We create the Heat Map of Indonesia by computing (i) the Radicalization Index and (ii) the Location Index of each Twitter user from Indonesia, who has expressed some radical sentiment in her tweets. The conclusions derived from our analysis matches significantly with the analysis of Wahid Institute, a leading political think tank of Indonesia, thus validating our results.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131283205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI 个性化可信CA集的潜力:Web PKI中CA失效的防御
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.90
Johannes Braun, Gregor Rynkowski
The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, has grown extremely large and complex. Herein, each CA is a single point of failure, leading to an attack surface, the size of which is hardly assessable. This paper approaches the issue if and how the attack surface can be reduced in order to minimize the risk of relying on a malicious certificate. In particular, we consider the individualization of the set of trusted CAs. We present a tool called Rootopia, which allows to individually assess the respective part of the Web PKI relevant for a user. Our analysis of browser histories of 22 Internet users reveals, that the major part of the PKI is completely irrelevant to a single user. On a per user level, the attack surface can be reduced by more than 90%, which shows the potential of the individualization of the set of trusted CAs. Furthermore, all the relevant CAs reside within a small set of countries. Our findings confirm that we unnecessarily trust in a huge number of CAs, thus exposing ourselves to unnecessary risks. Subsequently, we present an overview on our approach to realize the possible security gains.
大多数Internet应用程序的安全性依赖于底层的公钥基础设施(pki),因此依赖于证书颁发机构(ca)的生态系统。负责颁发和维护SSL证书的PKI池(称为Web PKI)已经变得极其庞大和复杂。在这里,每个CA都是一个单点故障,导致攻击面,其大小难以评估。本文探讨了是否以及如何减少攻击面,以最大限度地减少依赖恶意证书的风险。特别地,我们考虑了可信ca集的个性化。我们提供了一个叫做Rootopia的工具,它允许单独评估与用户相关的Web PKI的各个部分。我们对22个互联网用户的浏览器历史分析表明,PKI的主要部分与单个用户完全无关。在每个用户级别上,攻击面可以减少90%以上,这显示了可信ca集个性化的潜力。此外,所有相关的核证机关都位于少数国家。我们的研究结果证实,我们不必要地信任大量的ca,从而使自己面临不必要的风险。随后,我们将概述实现可能的安全收益的方法。
{"title":"The Potential of an Individualized Set of Trusted CAs: Defending against CA Failures in the Web PKI","authors":"Johannes Braun, Gregor Rynkowski","doi":"10.1109/SocialCom.2013.90","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.90","url":null,"abstract":"The security of most Internet applications relies on underlying public key infrastructures (PKIs) and thus on an ecosystem of certification authorities (CAs). The pool of PKIs responsible for the issuance and the maintenance of SSL certificates, called the Web PKI, has grown extremely large and complex. Herein, each CA is a single point of failure, leading to an attack surface, the size of which is hardly assessable. This paper approaches the issue if and how the attack surface can be reduced in order to minimize the risk of relying on a malicious certificate. In particular, we consider the individualization of the set of trusted CAs. We present a tool called Rootopia, which allows to individually assess the respective part of the Web PKI relevant for a user. Our analysis of browser histories of 22 Internet users reveals, that the major part of the PKI is completely irrelevant to a single user. On a per user level, the attack surface can be reduced by more than 90%, which shows the potential of the individualization of the set of trusted CAs. Furthermore, all the relevant CAs reside within a small set of countries. Our findings confirm that we unnecessarily trust in a huge number of CAs, thus exposing ourselves to unnecessary risks. Subsequently, we present an overview on our approach to realize the possible security gains.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Novel Group Recommendation Algorithm with Collaborative Filtering 一种新的协同过滤群推荐算法
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.138
Yang Song, Zheng Hu, Haifeng Liu, Yu Shi, Hui Tian
Traditional recommender systems are designed to provide suggestions for individuals. However, there are scenarios in which groups of people are in need of decision support. For example, a group of friends want to choose a restaurant to have a dinner or to watch a movie together. In this paper, we propose a novel group recommendation algorithm for providing suggestions to groups. The proposed algorithm can be divided into two steps: the first step is to predict the preference of the unwatched items for each group members, which is a personalized prediction progress, then, it provides the recommendations for the group by aggregating group members' preferences, which mainly concerns the preferences of members who haven't seen the items. Without complex computation, the proposed algorithm can make accurate predictions of each item for group members. We demonstrate our algorithm on a famous dataset called Movie Lens and use the recall, the precision metrics and a combination of them to evaluate its performance. The experimental results show that the proposed algorithm can provide high quality group recommendations.
传统的推荐系统旨在为个人提供建议。然而,在某些情况下,一群人需要决策支持。例如,一群朋友想要选择一家餐厅吃饭或一起看电影。本文提出了一种新的群体推荐算法,用于向群体提供建议。本文提出的算法分为两步:第一步是预测每个群体成员对未观看项目的偏好,这是一个个性化的预测过程,然后,通过汇总群体成员的偏好来为群体提供推荐,这些偏好主要涉及未看到项目的成员的偏好。该算法不需要复杂的计算,可以对群体成员的每个项目进行准确的预测。我们在一个名为Movie Lens的著名数据集上演示了我们的算法,并使用召回率、精度指标及其组合来评估其性能。实验结果表明,该算法能够提供高质量的群组推荐。
{"title":"A Novel Group Recommendation Algorithm with Collaborative Filtering","authors":"Yang Song, Zheng Hu, Haifeng Liu, Yu Shi, Hui Tian","doi":"10.1109/SocialCom.2013.138","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.138","url":null,"abstract":"Traditional recommender systems are designed to provide suggestions for individuals. However, there are scenarios in which groups of people are in need of decision support. For example, a group of friends want to choose a restaurant to have a dinner or to watch a movie together. In this paper, we propose a novel group recommendation algorithm for providing suggestions to groups. The proposed algorithm can be divided into two steps: the first step is to predict the preference of the unwatched items for each group members, which is a personalized prediction progress, then, it provides the recommendations for the group by aggregating group members' preferences, which mainly concerns the preferences of members who haven't seen the items. Without complex computation, the proposed algorithm can make accurate predictions of each item for group members. We demonstrate our algorithm on a famous dataset called Movie Lens and use the recall, the precision metrics and a combination of them to evaluate its performance. The experimental results show that the proposed algorithm can provide high quality group recommendations.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":" 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113949889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The Privacy Problem in Big Bata Applications: An Empirical Study on Facebook 大数据应用中的隐私问题:基于Facebook的实证研究
Pub Date : 2013-09-08 DOI: 10.1109/SocialCom.2013.150
Jerzy Surma
When using mobile phones, credit cards, electronic mail, browsing social networks etc., contemporary consumers leave behind thousands of digital footprints. Each footprint reflects actual actions that we take in given place and time. The analysis of thousands of such footprints conducted among large groups of people allows us to examine human behaviour on a scale that has never been imagined in scientific studies concerning psychology and sociology. The results of those analyses already have a significant influence on contemporary management, especially when it comes to new business opportunities in companies that employ business models based on the one-to-one relations with their customers. Nevertheless, this outstanding opportunity implies an enormous privacy problem. We will illustrate this issue by an empirical research based on the data gathered from Facebook, where users are using privacy controls that allow displaying their content only to a selected group of people. Users of such controls will likely continue positing more, even as their network grows or becomes sparser. We test these predictions using a dataset from Facebook gathered from a sample of college students and find statistical support for them. Our conclusions are that individuals are relatively prudent and are actually very aware of the social norms.
在使用手机、信用卡、电子邮件、浏览社交网络等过程中,当代消费者留下了成千上万的数字足迹。每个足迹都反映了我们在特定地点和时间采取的实际行动。对在一大群人中进行的数千个这样的脚印的分析,使我们能够在心理学和社会学的科学研究中从未想象过的范围内研究人类行为。这些分析的结果已经对当代管理产生了重大影响,特别是当涉及到采用基于与客户一对一关系的商业模式的公司的新商业机会时。然而,这个绝佳的机会意味着巨大的隐私问题。我们将通过一项基于从Facebook收集的数据的实证研究来说明这个问题,Facebook用户使用隐私控制,只允许向选定的一组人显示他们的内容。这些控制的用户可能会继续设置更多,即使他们的网络增长或变得稀疏。我们使用从Facebook收集的大学生样本数据集来测试这些预测,并为它们找到统计支持。我们的结论是,个人相对谨慎,实际上非常了解社会规范。
{"title":"The Privacy Problem in Big Bata Applications: An Empirical Study on Facebook","authors":"Jerzy Surma","doi":"10.1109/SocialCom.2013.150","DOIUrl":"https://doi.org/10.1109/SocialCom.2013.150","url":null,"abstract":"When using mobile phones, credit cards, electronic mail, browsing social networks etc., contemporary consumers leave behind thousands of digital footprints. Each footprint reflects actual actions that we take in given place and time. The analysis of thousands of such footprints conducted among large groups of people allows us to examine human behaviour on a scale that has never been imagined in scientific studies concerning psychology and sociology. The results of those analyses already have a significant influence on contemporary management, especially when it comes to new business opportunities in companies that employ business models based on the one-to-one relations with their customers. Nevertheless, this outstanding opportunity implies an enormous privacy problem. We will illustrate this issue by an empirical research based on the data gathered from Facebook, where users are using privacy controls that allow displaying their content only to a selected group of people. Users of such controls will likely continue positing more, even as their network grows or becomes sparser. We test these predictions using a dataset from Facebook gathered from a sample of college students and find statistical support for them. Our conclusions are that individuals are relatively prudent and are actually very aware of the social norms.","PeriodicalId":129308,"journal":{"name":"2013 International Conference on Social Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127961096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 International Conference on Social Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1