首页 > 最新文献

6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)最新文献

英文 中文
CAEVA: A customizable and adaptive event aggregation framework for collaborative broker overlays CAEVA:用于协作代理覆盖的可定制和自适应事件聚合框架
Jianxia Chen, Lakshmish Ramaswamy, D. Lowenthal, S. Kalyanaraman
The publish-subscribe (pub-sub) paradigm is maturing and integrating into community-oriented collaborative applications. Because of this, pub-sub systems are faced with an event stream that may potentially contain large numbers of redundant and partial messages. Most pub-sub systems view partial and redundant messages as unique, which wastes resources not only at routers, but also at possibly resource constrained subscribers. In this paper, we present Caeva, a customizable and adaptive event aggregation framework. The design of Caeva exhibits three novel features. First, the tasks of merging messages and eliminating redundancies are shared among multiple, physically distributed brokers called aggregators. Second, we design a decentralized aggregator placement scheme that continuously adapts to decrease messaging overheads in the face of changing event publishing patterns. Third, we allow subscribers to choose a notification schedule that meets their specific needs. Results of extensive experiments show that Caeva is quite effective in providing flexibility and efficiency.
发布-订阅(发布-订阅)范式正在成熟并集成到面向社区的协作应用程序中。因此,发布-子系统面临着可能包含大量冗余和部分消息的事件流。大多数发布-子系统将部分和冗余的消息视为唯一的,这不仅浪费了路由器的资源,也浪费了可能资源受限的订阅者的资源。在本文中,我们提出了Caeva,一个可定制和自适应的事件聚合框架。卡耶娃的设计有三个新颖的特点。首先,合并消息和消除冗余的任务在称为聚合器的多个物理分布式代理之间共享。其次,我们设计了一个分散的聚合器放置方案,该方案在面对不断变化的事件发布模式时不断适应以减少消息传递开销。第三,我们允许订阅者选择满足其特定需求的通知时间表。大量的实验结果表明,Caeva在提供灵活性和效率方面相当有效。
{"title":"CAEVA: A customizable and adaptive event aggregation framework for collaborative broker overlays","authors":"Jianxia Chen, Lakshmish Ramaswamy, D. Lowenthal, S. Kalyanaraman","doi":"10.4108/ICST.COLLABORATECOM.2010.34","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.34","url":null,"abstract":"The publish-subscribe (pub-sub) paradigm is maturing and integrating into community-oriented collaborative applications. Because of this, pub-sub systems are faced with an event stream that may potentially contain large numbers of redundant and partial messages. Most pub-sub systems view partial and redundant messages as unique, which wastes resources not only at routers, but also at possibly resource constrained subscribers. In this paper, we present Caeva, a customizable and adaptive event aggregation framework. The design of Caeva exhibits three novel features. First, the tasks of merging messages and eliminating redundancies are shared among multiple, physically distributed brokers called aggregators. Second, we design a decentralized aggregator placement scheme that continuously adapts to decrease messaging overheads in the face of changing event publishing patterns. Third, we allow subscribers to choose a notification schedule that meets their specific needs. Results of extensive experiments show that Caeva is quite effective in providing flexibility and efficiency.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133521995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing personalized ranking quality through multidimensional modeling of inter-item competition 通过项目间竞争的多维建模,提升个性化排名质量
Qinyuan Feng, Ling Liu, Y. Sun, Ting Yu, Yafei Dai
This paper presents MAPS — a personalized Multi-Attribute Probabilistic Selection framework — to estimate the probability of an item being a user's best choice and rank the items accordingly. The MAPS framework makes three original contributions in this paper. First, we capture the inter-attribute tradeoff by a visual angle model which maps multi-attribute items into points (stars) in a multidimensional space (sky). Second, we model the inter-item competition using the dominating areas of the stars. Third, we capture the user's personal preferences by a density function learned from his/her history. The MAPS framework carefully combines all three factors to estimate the probability of an item being a user's best choice, and produces a personalized ranking accordingly. We evaluate the accuracy of MAPS through extensive simulations. The results show that MAPS significantly outperforms existing multi-attribute ranking algorithms.
本文提出了一种个性化的多属性概率选择框架MAPS来估计一个项目成为用户最佳选择的概率,并据此对项目进行排序。MAPS框架在本文中有三个原创性贡献。首先,我们通过一个视角模型捕获属性间的权衡,该模型将多属性项目映射到多维空间(天空)中的点(星星)。其次,我们利用明星的主导区域对项目间竞争进行建模。第三,我们通过从他/她的历史中学习的密度函数来捕获用户的个人偏好。MAPS框架仔细地结合了这三个因素,以估计某项成为用户最佳选择的可能性,并相应地产生个性化排名。我们通过大量的模拟来评估MAPS的准确性。结果表明,MAPS显著优于现有的多属性排序算法。
{"title":"Enhancing personalized ranking quality through multidimensional modeling of inter-item competition","authors":"Qinyuan Feng, Ling Liu, Y. Sun, Ting Yu, Yafei Dai","doi":"10.4108/ICST.COLLABORATECOM.2010.14","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.14","url":null,"abstract":"This paper presents MAPS — a personalized Multi-Attribute Probabilistic Selection framework — to estimate the probability of an item being a user's best choice and rank the items accordingly. The MAPS framework makes three original contributions in this paper. First, we capture the inter-attribute tradeoff by a visual angle model which maps multi-attribute items into points (stars) in a multidimensional space (sky). Second, we model the inter-item competition using the dominating areas of the stars. Third, we capture the user's personal preferences by a density function learned from his/her history. The MAPS framework carefully combines all three factors to estimate the probability of an item being a user's best choice, and produces a personalized ranking accordingly. We evaluate the accuracy of MAPS through extensive simulations. The results show that MAPS significantly outperforms existing multi-attribute ranking algorithms.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128052329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A collaborative framework for privacy protection in online social networks 在线社交网络中隐私保护的协作框架
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn
With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that only users who can satisfy the associate security policy can derive the key to access the data. However, the key management policies of existing schemes may grant access to unaurhorized users and cannot efficiently determine authorized users. In this paper, we propose a collaborative framework which enforces access control for OSN through an innovative key management focused on communities. This framework introduces a community key management based on a new group-oriented convergence cryptosystem, as well as provides an efficient privacy preservation needed in a private OSN. To prove the feasibility of our approach, we also discuss a proof-of-concept implementation of our framework. Experimental results show that our construction can achieve the identified design goals for OSNs with the acceptable performance.
随着在线社交网络的广泛使用,数据隐私问题引起了人们的广泛关注。已经提出了几种方法来解决这个问题。其中一种针对OSN的隐私管理方法是利用密钥管理技术,允许用户简单地发布加密的内容,只有满足关联安全策略的用户才能获得访问数据的密钥。但是,现有方案的密钥管理策略可能会将访问权限授予未授权的用户,并且无法有效地确定授权用户。在本文中,我们提出了一个协作框架,该框架通过创新的以社区为中心的密钥管理来加强对OSN的访问控制。该框架引入了一种基于新的面向组的收敛密码系统的社区密钥管理,为私有OSN提供了有效的隐私保护。为了证明我们方法的可行性,我们还讨论了我们框架的概念验证实现。实验结果表明,我们的结构可以达到既定的设计目标,并具有可接受的性能。
{"title":"A collaborative framework for privacy protection in online social networks","authors":"Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn","doi":"10.4108/ICST.COLLABORATECOM.2010.52","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.52","url":null,"abstract":"With the wide use of online social networks (OSNs), the problem of data privacy has attracted much attention. Several approaches have been proposed to address this issue. One of privacy management approaches for OSN leverages a key management technique to enable a user to simply post encrypted contents so that only users who can satisfy the associate security policy can derive the key to access the data. However, the key management policies of existing schemes may grant access to unaurhorized users and cannot efficiently determine authorized users. In this paper, we propose a collaborative framework which enforces access control for OSN through an innovative key management focused on communities. This framework introduces a community key management based on a new group-oriented convergence cryptosystem, as well as provides an efficient privacy preservation needed in a private OSN. To prove the feasibility of our approach, we also discuss a proof-of-concept implementation of our framework. Experimental results show that our construction can achieve the identified design goals for OSNs with the acceptable performance.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122348853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 42
Information flow control in cloud computing 云计算中的信息流控制
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, M. Singhal
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. A fundamental problem is the existence of insecure information flows due to the fact that a service provider can access multiple virtual machines in clouds. Sensitive information may be leaked to unauthorized customers and such critical information flows could raise conflict-of-interest issues in cloud computing. In this paper, we propose an approach to enforce the information flow policies at Infrastructure-as-a-Service (IaaS) layer in a cloud computing environment. Especially, we adopt Chinese Wall policies to address the problems of insecure information flow. We implement a proof-of-concept prototype system based on Eucalyptus open source packages to show the feasibility of our approach. This system facilitates the cloud management modules to resolve the conflict-of-interest issues for service providers in clouds.
云计算是一种新兴的计算范式,其中计算资源作为服务通过Internet提供,同时驻留在大型数据中心中。尽管它使我们能够动态地为服务器提供满足广泛需求的能力,但由于用户将其敏感数据外包给云,因此这种模式为数据安全和访问控制带来了许多新的挑战,因为云超出了与数据所有者相同的可信域。一个基本问题是存在不安全的信息流,因为服务提供者可以访问云中的多个虚拟机。敏感信息可能会泄露给未经授权的客户,这种关键信息流可能会引发云计算领域的利益冲突问题。在本文中,我们提出了一种在云计算环境中在基础设施即服务(IaaS)层强制执行信息流策略的方法。特别是,我们采取了中国墙政策来解决信息流不安全的问题。我们实现了一个基于Eucalyptus开放源码包的概念验证原型系统,以展示我们方法的可行性。该系统便于云管理模块解决云服务提供商的利益冲突问题。
{"title":"Information flow control in cloud computing","authors":"Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, M. Singhal","doi":"10.4108/ICST.TRUSTCOL.2010.1","DOIUrl":"https://doi.org/10.4108/ICST.TRUSTCOL.2010.1","url":null,"abstract":"Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds, which are beyond the same trusted domain as data owners. A fundamental problem is the existence of insecure information flows due to the fact that a service provider can access multiple virtual machines in clouds. Sensitive information may be leaked to unauthorized customers and such critical information flows could raise conflict-of-interest issues in cloud computing. In this paper, we propose an approach to enforce the information flow policies at Infrastructure-as-a-Service (IaaS) layer in a cloud computing environment. Especially, we adopt Chinese Wall policies to address the problems of insecure information flow. We implement a proof-of-concept prototype system based on Eucalyptus open source packages to show the feasibility of our approach. This system facilitates the cloud management modules to resolve the conflict-of-interest issues for service providers in clouds.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"4 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126529290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Supporting evidence-based Software Engineering with collaborative information retrieval 支持基于证据的软件工程与协同信息检索
H. Ramampiaro, D. Cruzes, R. Conradi, Manoel G. Mendonça
The number of scientific publications is constantly increasing, and the results published on Empirical Software Engineering are growing even faster. Some software engineering publishers have began to collaborate with research groups to make available repositories of software engineering empirical data. However, these initiatives are limited due to issues related to the available search tools. As a result, many researchers in the area have adopted a semi-automated approach for performing searches for systematic reviews as a mean to extract empirical evidence from published material. This makes this activity labor intensive and error prone. In this paper, we argue that the use of techniques from information retrieval, as well as text mining, can support systematic reviews and improve the creation of repositories of SE empirical evidence.
科学出版物的数量在不断增加,而发表在Empirical Software Engineering上的结果增长得更快。一些软件工程出版商已经开始与研究小组合作,以提供软件工程经验数据的可用存储库。然而,由于与可用的搜索工具相关的问题,这些举措受到了限制。因此,该领域的许多研究人员采用了半自动化的方法来执行系统评论的搜索,作为从已发表材料中提取经验证据的一种手段。这使得该活动是劳动密集型的,并且容易出错。在本文中,我们认为信息检索技术的使用,以及文本挖掘,可以支持系统评论和改进SE经验证据库的创建。
{"title":"Supporting evidence-based Software Engineering with collaborative information retrieval","authors":"H. Ramampiaro, D. Cruzes, R. Conradi, Manoel G. Mendonça","doi":"10.4108/ICST.COLLABORATECOM.2010.9","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.9","url":null,"abstract":"The number of scientific publications is constantly increasing, and the results published on Empirical Software Engineering are growing even faster. Some software engineering publishers have began to collaborate with research groups to make available repositories of software engineering empirical data. However, these initiatives are limited due to issues related to the available search tools. As a result, many researchers in the area have adopted a semi-automated approach for performing searches for systematic reviews as a mean to extract empirical evidence from published material. This makes this activity labor intensive and error prone. In this paper, we argue that the use of techniques from information retrieval, as well as text mining, can support systematic reviews and improve the creation of repositories of SE empirical evidence.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125943026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Data collection for distributed surveillance sensor networks in disaster-hit regions 灾区分布式监测传感器网络的数据采集
Yao Zhao, Xin Wang, Jin Zhao, A. Lim
The objective of many applications with the surveillance missions in wireless sensor networks is to provide long-term monitoring of the specific environments, such as disaster-hit regions. These applications usually perform continuous monitoring without any maintenance, even if some sensor nodes fail. A significant challenge when designing the data collection approaches for such systems is that the conventional communication protocols for wireless sensor networks would present low efficiency, since the network topology changes rapidly due to the node failure. Thus the sensor nodes in such systems should use an automatic transmission approach to disseminate their sensed data to the sink in a distributed manner. In this paper, we propose a novel Coding-based Probabilistic Routing (CPR) to address this specific problem of data collection for distributed surveillance sensor networks in disaster-hit regions. CPR dynamically adapts to node failure to collect the maximum data in any given time and chooses an optimal probabilistic routing to decrease the transmission consumption. The extensive simulation results are presented to show that CPR outperforms other strategies.
无线传感器网络监控任务的许多应用程序的目标是提供对特定环境的长期监测,例如受灾地区。这些应用程序通常在没有任何维护的情况下执行连续监控,即使某些传感器节点发生故障。设计此类系统的数据收集方法时面临的一个重大挑战是,由于节点故障导致网络拓扑结构迅速变化,无线传感器网络的传统通信协议将呈现低效率。因此,此类系统中的传感器节点应使用自动传输方法以分布式方式将其感测数据传播到接收器。在本文中,我们提出了一种新的基于编码的概率路由(CPR)来解决受灾地区分布式监控传感器网络的数据收集问题。该算法能够动态适应节点故障,在任意给定时间内收集最多的数据,并选择最优概率路由以减少传输消耗。广泛的仿真结果表明,心肺复苏优于其他策略。
{"title":"Data collection for distributed surveillance sensor networks in disaster-hit regions","authors":"Yao Zhao, Xin Wang, Jin Zhao, A. Lim","doi":"10.4108/ICST.COLLABORATECOM.2010.45","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.45","url":null,"abstract":"The objective of many applications with the surveillance missions in wireless sensor networks is to provide long-term monitoring of the specific environments, such as disaster-hit regions. These applications usually perform continuous monitoring without any maintenance, even if some sensor nodes fail. A significant challenge when designing the data collection approaches for such systems is that the conventional communication protocols for wireless sensor networks would present low efficiency, since the network topology changes rapidly due to the node failure. Thus the sensor nodes in such systems should use an automatic transmission approach to disseminate their sensed data to the sink in a distributed manner. In this paper, we propose a novel Coding-based Probabilistic Routing (CPR) to address this specific problem of data collection for distributed surveillance sensor networks in disaster-hit regions. CPR dynamically adapts to node failure to collect the maximum data in any given time and chooses an optimal probabilistic routing to decrease the transmission consumption. The extensive simulation results are presented to show that CPR outperforms other strategies.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115033516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Collaboration by passing access rights for personal protected Web resources 通过传递个人受保护的Web资源的访问权限进行协作
Yasushi Shinjo, D. Kamikawa, Akira Sato
This paper describes how users can collaborate through sharing personal protected Web resources. Personal protected Web resources are Web pages and services that are typically password-protected. One example is a personal page on an auction site. This paper introduces capability-based access control to the World Wide Web without modifying existing servers and clients. Access rights for personal protected Web resources are represented as capabilities for the Web resources. When users collaborate, capability-based access control on the Web has two advantages over conventional access-control-list based access control. First, a user can easily pass his/her own capabilities to access Web resources to other users along with delegating tasks. For example, a parent can ask a child to bid on a PC on behalf of the parent by passing the capability to access the parent's auction page but not giving the child the password. Second, restricted capabilities are useful in passing access rights. For example, before a parent passes the capability to bid on a PC to a child, the parent can create a restricted capability that allows biding up to $100 on a PC from the original unlimited capability. The proposed method has been implemented as Web applications called CapaEdit and CapaGate in Java by using the Google Web Toolkit. Using CapaEdit, a user can interactively create a capability to access his/her personal protected Web resources with access control to hyperlinks and form parameters. The receiver of the capability can access the Web resources through CapaGate, which enforces the restrictions. Experimental results show that these Web applications perform well enough for interactive use.
本文描述了用户如何通过共享个人受保护的Web资源进行协作。个人受保护的Web资源是通常受密码保护的Web页面和服务。一个例子是拍卖网站上的个人页面。本文介绍了在不修改现有服务器和客户端的情况下,对万维网进行基于能力的访问控制。个人受保护的Web资源的访问权限表示为Web资源的功能。当用户协作时,Web上基于功能的访问控制比传统的基于访问控制列表的访问控制有两个优点。首先,用户可以轻松地将他/她自己访问Web资源的能力连同委派任务一起传递给其他用户。例如,家长可以要求孩子在个人电脑上代表家长竞标,通过传递访问家长拍卖页面的能力,但不给孩子密码。其次,受限制的功能在传递访问权限时很有用。例如,在父母将个人电脑的竞标权传给孩子之前,父母可以创建一个限制能力,允许在个人电脑上竞标100美元,而不是原来的无限能力。所提出的方法已通过b谷歌Web Toolkit在Java中实现为Web应用程序CapaEdit和CapaGate。使用CapaEdit,用户可以交互式地创建一种功能,通过对超链接和表单参数的访问控制来访问他/她个人受保护的Web资源。功能的接收者可以通过CapaGate访问Web资源,CapaGate执行了这些限制。实验结果表明,这些Web应用程序可以很好地进行交互使用。
{"title":"Collaboration by passing access rights for personal protected Web resources","authors":"Yasushi Shinjo, D. Kamikawa, Akira Sato","doi":"10.4108/ICST.COLLABORATECOM.2010.50","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.50","url":null,"abstract":"This paper describes how users can collaborate through sharing personal protected Web resources. Personal protected Web resources are Web pages and services that are typically password-protected. One example is a personal page on an auction site. This paper introduces capability-based access control to the World Wide Web without modifying existing servers and clients. Access rights for personal protected Web resources are represented as capabilities for the Web resources. When users collaborate, capability-based access control on the Web has two advantages over conventional access-control-list based access control. First, a user can easily pass his/her own capabilities to access Web resources to other users along with delegating tasks. For example, a parent can ask a child to bid on a PC on behalf of the parent by passing the capability to access the parent's auction page but not giving the child the password. Second, restricted capabilities are useful in passing access rights. For example, before a parent passes the capability to bid on a PC to a child, the parent can create a restricted capability that allows biding up to $100 on a PC from the original unlimited capability. The proposed method has been implemented as Web applications called CapaEdit and CapaGate in Java by using the Google Web Toolkit. Using CapaEdit, a user can interactively create a capability to access his/her personal protected Web resources with access control to hyperlinks and form parameters. The receiver of the capability can access the Web resources through CapaGate, which enforces the restrictions. Experimental results show that these Web applications perform well enough for interactive use.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128643385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combining access control and trust negotiations in an On-line Social Network 在线社交网络中访问控制与信任协商的结合
S. Braghin, E. Ferrari, Alberto Trombetta
Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web. This has resulted in the definition of some access control models tailored to the protection of OSN resources. One of the key parameter on which access control decisions in OSNs should be based is represented by the trust between OSN users. A well-known approach for the management of trust relationships is represented by trust negotiations. In this paper, we show how access control and trust negotiation can be combined in a framework for the protection of OSN resources. Moreover, we show how the outcome of a trust negotiation can be exploited to dynamically adjust the trust level between OSN users.
保护在线社交网络(OSNs)资源已经成为一个主要需求,因为今天的OSNs是Web上最大的个人信息存储库。这就产生了一些针对OSN资源保护的访问控制模型。OSN中访问控制决策的关键参数之一是OSN用户之间的信任程度。信任协商是管理信任关系的一种众所周知的方法。在本文中,我们展示了如何将访问控制和信任协商结合在一个框架中来保护OSN资源。此外,我们还展示了如何利用信任协商的结果来动态调整OSN用户之间的信任水平。
{"title":"Combining access control and trust negotiations in an On-line Social Network","authors":"S. Braghin, E. Ferrari, Alberto Trombetta","doi":"10.4108/ICST.COLLABORATECOM.2010.18","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.18","url":null,"abstract":"Protection of On-line Social Networks (OSNs) resources has become a primary need since today OSNs are the hugest repository of personal information on the Web. This has resulted in the definition of some access control models tailored to the protection of OSN resources. One of the key parameter on which access control decisions in OSNs should be based is represented by the trust between OSN users. A well-known approach for the management of trust relationships is represented by trust negotiations. In this paper, we show how access control and trust negotiation can be combined in a framework for the protection of OSN resources. Moreover, we show how the outcome of a trust negotiation can be exploited to dynamically adjust the trust level between OSN users.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130173956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
SoJa: Collaborative reference management using a decentralized social information system SoJa:使用分散式社会信息系统的协作参考管理
Anwitaman Datta
In this (invited) paper, we present a work in progress social library and reference management system called SoJa (Social Jabref), which is realized on top of a decentralized (peer-to-peer) social information system. The contribution of the work is multi-fold. It provides a platform to collaborate and socialize to carry out a specific task (managing and sharing bibliographic meta-information). From systems design perspective, it is an effort to realize social software on a peer-to-peer infrastructure, as well as make such a peer-to-peer system robust and reliable by leveraging on the social network. Particularly, we discuss how (we think) social networks can be leveraged to build reliable indexing, routing and storage services. We elaborate on the SocialCircle DHT which exclusively uses social links, and hence is expected to be naturally robust against various kinds of attacks. We also discuss several open challenges currently under investigation, which need to be addressed to build mature systems that can be deployed at large-scale. Furthermore, while not the principal focus of this specific work, the experiences in realizing SoJa are also directly relevant to the recent spate of work on realizing decentralized online social networks (DOSNs).
在这篇(特邀)论文中,我们介绍了一个正在开发中的社会图书馆和参考咨询管理系统,称为SoJa (social Jabref),它是在一个分散的(点对点)社会信息系统之上实现的。这项工作的贡献是多方面的。它提供了一个协作和社会化的平台来完成特定的任务(管理和共享书目元信息)。从系统设计的角度来看,它是在点对点基础设施上实现社交软件,并通过利用社交网络使这种点对点系统健壮和可靠的一种努力。特别地,我们讨论了(我们认为)如何利用社交网络来构建可靠的索引、路由和存储服务。我们详细介绍了SocialCircle DHT,它专门使用社交链接,因此有望自然地抵御各种攻击。我们还讨论了目前正在研究的几个开放挑战,这些挑战需要解决,以构建可以大规模部署的成熟系统。此外,虽然不是这项具体工作的主要焦点,但实现SoJa的经验也与最近大量实现分散式在线社交网络(dosn)的工作直接相关。
{"title":"SoJa: Collaborative reference management using a decentralized social information system","authors":"Anwitaman Datta","doi":"10.4108/ICST.COLLABORATECOM.2010.32","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.32","url":null,"abstract":"In this (invited) paper, we present a work in progress social library and reference management system called SoJa (Social Jabref), which is realized on top of a decentralized (peer-to-peer) social information system. The contribution of the work is multi-fold. It provides a platform to collaborate and socialize to carry out a specific task (managing and sharing bibliographic meta-information). From systems design perspective, it is an effort to realize social software on a peer-to-peer infrastructure, as well as make such a peer-to-peer system robust and reliable by leveraging on the social network. Particularly, we discuss how (we think) social networks can be leveraged to build reliable indexing, routing and storage services. We elaborate on the SocialCircle DHT which exclusively uses social links, and hence is expected to be naturally robust against various kinds of attacks. We also discuss several open challenges currently under investigation, which need to be addressed to build mature systems that can be deployed at large-scale. Furthermore, while not the principal focus of this specific work, the experiences in realizing SoJa are also directly relevant to the recent spate of work on realizing decentralized online social networks (DOSNs).","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132192857","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the design of autonomic, decentralized VPNs 自主的、分散的vpn的设计
D. Wolinsky, Kyungyong Lee, P. Boykin, R. Figueiredo
Decentralized and P2P (peer-to-peer) VPNs (virtual private networks) have recently become quite popular for connecting users in small to medium collaborative environments, such as academia, businesses, and homes. In the realm of VPNs, there exist centralized, decentralized, and P2P solutions. Centralized systems require a single entity to provide and manage VPN server(s); decentralized approaches allow more than one entity to share the management responsibility for the VPN infrastructure, while existing P2P approaches rely on a centralized infrastructure but allow users to bypass it to form direct low-latency, high-throughput links between peers. In this paper, we describe a novel VPN architecture that can claim to be both decentralized and P2P, using methods that lower the entry barrier for VPN deployment compared to other VPN approaches. Our solution extends existing work on IP-over-P2P (IPOP) overlay networks to address challenges of configuration, management, bootstrapping, and security. We present the first implementation and analysis of a P2P system secured by DTLS (datagram transport layer security) along with decentralized techniques for revoking user access.
去中心化和P2P(点对点)vpn(虚拟专用网)最近变得非常流行,用于连接中小型协作环境中的用户,例如学术界、企业和家庭。在vpn领域,存在集中式、分散式和P2P解决方案。集中式系统需要一个实体来提供和管理VPN服务器;分散式方法允许多个实体共享VPN基础设施的管理责任,而现有的P2P方法依赖于集中式基础设施,但允许用户绕过它,在对等体之间形成直接的低延迟、高吞吐量的链接。在本文中,我们描述了一种新的VPN架构,它可以声称是分散的和P2P的,与其他VPN方法相比,它使用的方法降低了VPN部署的进入门槛。我们的解决方案扩展了现有的IP-over-P2P (IPOP)覆盖网络,以解决配置、管理、引导和安全方面的挑战。我们提出了一个由DTLS(数据报传输层安全)保护的P2P系统的第一个实现和分析,以及用于撤销用户访问的分散技术。
{"title":"On the design of autonomic, decentralized VPNs","authors":"D. Wolinsky, Kyungyong Lee, P. Boykin, R. Figueiredo","doi":"10.4108/ICST.COLLABORATECOM.2010.43","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.43","url":null,"abstract":"Decentralized and P2P (peer-to-peer) VPNs (virtual private networks) have recently become quite popular for connecting users in small to medium collaborative environments, such as academia, businesses, and homes. In the realm of VPNs, there exist centralized, decentralized, and P2P solutions. Centralized systems require a single entity to provide and manage VPN server(s); decentralized approaches allow more than one entity to share the management responsibility for the VPN infrastructure, while existing P2P approaches rely on a centralized infrastructure but allow users to bypass it to form direct low-latency, high-throughput links between peers. In this paper, we describe a novel VPN architecture that can claim to be both decentralized and P2P, using methods that lower the entry barrier for VPN deployment compared to other VPN approaches. Our solution extends existing work on IP-over-P2P (IPOP) overlay networks to address challenges of configuration, management, bootstrapping, and security. We present the first implementation and analysis of a P2P system secured by DTLS (datagram transport layer security) along with decentralized techniques for revoking user access.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128835595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
期刊
6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1