Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412432
M. Pardal, M. Harrison, S. Sarma, J. Marques
Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing `raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents.
{"title":"Performance assessment of XACML authorizations for Supply Chain Traceability Web Services","authors":"M. Pardal, M. Harrison, S. Sarma, J. Marques","doi":"10.1109/CASoN.2012.6412432","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412432","url":null,"abstract":"Service-Oriented Architecture (SOA) and Web Services (WS) offer advanced flexibility and interoperability capabilities. However they imply significant performance overheads that need to be carefully considered. Supply Chain Management (SCM) and Traceability systems are an interesting domain for the use of WS technologies that are usually deemed to be too complex and unnecessary in practical applications, especially regarding security. This paper presents an externalized security architecture that uses the eXtensible Access Control Markup Language (XACML) authorization standard to enforce visibility restrictions on trace-ability data in a supply chain where multiple companies collaborate; the performance overheads are assessed by comparing `raw' authorization implementations - Access Control Lists, Tokens, and RDF Assertions - with their XACML-equivalents.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127686071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412423
Brahim Batouche, D. Nicolas, H. Ayed, D. Khadraoui
To recommend a travel plan for elderly people, we have to consider more constraints related to ability and health. Existing Web services of travel do not consider these constraints. In order to enhance the quality of live (QoL) of elderly people, we propose a pattern Web service, which takes into account these constraints. Our goal consist to use advantage of semantic Web in order to consider fully user constraints and preferences. We present in this paper, a method of collaboration between request, profile and tourism models to elaborate a recommendation system, which allows to select the travel plan according to user ability. This latter is described by the user profile. The models base on the semantic description of all: user profile, user request and tourism data base. In addition, both of existed user profile ontology and tourism ontology have to be extended to consider constraints and preferences of elderly people.
{"title":"Recommendation of travelling plan for elderly people according to their abilities and preferences","authors":"Brahim Batouche, D. Nicolas, H. Ayed, D. Khadraoui","doi":"10.1109/CASoN.2012.6412423","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412423","url":null,"abstract":"To recommend a travel plan for elderly people, we have to consider more constraints related to ability and health. Existing Web services of travel do not consider these constraints. In order to enhance the quality of live (QoL) of elderly people, we propose a pattern Web service, which takes into account these constraints. Our goal consist to use advantage of semantic Web in order to consider fully user constraints and preferences. We present in this paper, a method of collaboration between request, profile and tourism models to elaborate a recommendation system, which allows to select the travel plan according to user ability. This latter is described by the user profile. The models base on the semantic description of all: user profile, user request and tourism data base. In addition, both of existed user profile ontology and tourism ontology have to be extended to consider constraints and preferences of elderly people.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127943908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412425
Sandir R. Campos, A. A. Fernandes, Rafael Timóteo de Sousa Júnior, E. P. Freitas, J. Costa, A. Serrano, D. D. C. Rodrigues, C. T. Rodrigues
This paper proposes the usage of an ontology indexation process via concept maps to generate evidences of irregularities in payrolls. The proposal uses audit indicators as an instrument for documenting evidences as well as for tracking the data from the moment in which it is provided and structured. Hence, this proposal includes a methodology for transforming basic, and sometimes unstructured, payroll data into useful information for taking decisions regarding irregularities within the payroll auditing process. By means of its implementation as a business intelligence application, the proposal is validated using the original data generated in the monthly payroll analysis of the Brazilian public sector employees. This application was developed in order to assist the activities of the Public Management Secretariat (SEGEP), belonging to the Brazilian Ministry of Planning, Budget and Management (MP).
{"title":"Ontologic audit trails mapping for detection of irregularities in payrolls","authors":"Sandir R. Campos, A. A. Fernandes, Rafael Timóteo de Sousa Júnior, E. P. Freitas, J. Costa, A. Serrano, D. D. C. Rodrigues, C. T. Rodrigues","doi":"10.1109/CASoN.2012.6412425","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412425","url":null,"abstract":"This paper proposes the usage of an ontology indexation process via concept maps to generate evidences of irregularities in payrolls. The proposal uses audit indicators as an instrument for documenting evidences as well as for tracking the data from the moment in which it is provided and structured. Hence, this proposal includes a methodology for transforming basic, and sometimes unstructured, payroll data into useful information for taking decisions regarding irregularities within the payroll auditing process. By means of its implementation as a business intelligence application, the proposal is validated using the original data generated in the monthly payroll analysis of the Brazilian public sector employees. This application was developed in order to assist the activities of the Public Management Secretariat (SEGEP), belonging to the Brazilian Ministry of Planning, Budget and Management (MP).","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128169144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412418
F. Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan
Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality.
{"title":"Effective network defense strategies to maximize system survivability of wireless mesh networks under malicious and jamming attacks","authors":"F. Lin, Yu-Shun Wang, Jing-Wei Wang, Chi-Hsiang Chan","doi":"10.1109/CASoN.2012.6412418","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412418","url":null,"abstract":"Continuity of wireless networks is a critical issue for wireless networks. Unfortunately, there is a category of attacks that seriously threatens the continuity of wireless networks: the jamming attack. The open nature of wireless mediums makes them vulnerable to any wireless capable devices. However, there have not been any studies that address the issue of how the service providers should deploy its topology or allocate its resources to minimize the impact of jamming attacks launched by malicious attackers. In this paper, a mathematical model formulating an attack-defense scenario of the problem is proposed. The results show when deploying defense resources, considering hops from the core node is more useful than link degrees. With the advantage of simulations, the concept of incomplete information can be taken into account which, while increasing the difficulty of the problem, makes the problem closer to reality.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131968760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412383
Alysson Bolognesi Prado, M. Baranauskas
Knowledge on the social web presupposes to gather information about its current and potential users and document their relationships, interests and needs. A recent branch of sociology, the Actor-Network Theory or ANT, states that relations among human and nonhuman actors are equally important to comprehend social phenomena. Since scientists are potential users of huge computational support, their communities provide relevant cases for domain characterization and software design. This paper investigates the possibilities of using ANT to characterize a real instance of those social networks. The active role of nonhuman actors allows us to trace the relations based on material clues left behind by the actors, and also to bring forth features to be explored by social software. The results of this study present a graphical representation that allows quantitative and qualitative analysis of the social network, which may inform a better design of systems for those communities.
{"title":"Representing scientific associations through the lens of Actor-Network Theory","authors":"Alysson Bolognesi Prado, M. Baranauskas","doi":"10.1109/CASoN.2012.6412383","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412383","url":null,"abstract":"Knowledge on the social web presupposes to gather information about its current and potential users and document their relationships, interests and needs. A recent branch of sociology, the Actor-Network Theory or ANT, states that relations among human and nonhuman actors are equally important to comprehend social phenomena. Since scientists are potential users of huge computational support, their communities provide relevant cases for domain characterization and software design. This paper investigates the possibilities of using ANT to characterize a real instance of those social networks. The active role of nonhuman actors allows us to trace the relations based on material clues left behind by the actors, and also to bring forth features to be explored by social software. The results of this study present a graphical representation that allows quantitative and qualitative analysis of the social network, which may inform a better design of systems for those communities.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124592227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412372
R. Brendel, H. Krawczyk
Social networks often forms very complex structures that additionally change over time. Description of actors' roles in such structures requires to take into account this dynamics reflecting behavioral characteristics of the actors. A role can be defined as a sequence of different types of activities. Various types of activities are modeled by pattern subgraphs, whereas sequences of these activities are modeled by sequence diagrams. For such defined roles, an original role identification procedure is applied assigning to each e-mail user a predefined role of spammer or regular user.
{"title":"Primary role identification in e-mail networks using pattern subgraphs and sequence diagrams","authors":"R. Brendel, H. Krawczyk","doi":"10.1109/CASoN.2012.6412372","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412372","url":null,"abstract":"Social networks often forms very complex structures that additionally change over time. Description of actors' roles in such structures requires to take into account this dynamics reflecting behavioral characteristics of the actors. A role can be defined as a sequence of different types of activities. Various types of activities are modeled by pattern subgraphs, whereas sequences of these activities are modeled by sequence diagrams. For such defined roles, an original role identification procedure is applied assigning to each e-mail user a predefined role of spammer or regular user.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117340814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412387
Layth Sliman, Benoit Charroux, Yvan Stroppa
In this paper we describe RunMyCode (RMC), a cloud based Platform as a Service tool (PaaS) which involves researchers collaborating across different time and geographical zones to produce research results along with their related papers. It helps researchers to incrementally co-create, deploy, evaluate, optimize and reproduce their research. It allows also a continuous integration and enhancement of different types of research artefacts including visual models, software and scripts. RMC extends traditional collaborative platforms by means of a scientific research-oriented social layer which allows intensive user contribution, interactions, and community building along with a content management system that lets researchers share, evaluate and develop valuable knowledge. RMC features include load balancing, elastic context aware and data-driven resource allocation, and parallel and “parameterizable” task execution.
{"title":"RunMyCode: An innovative platform for social production and evaluation of scientific research","authors":"Layth Sliman, Benoit Charroux, Yvan Stroppa","doi":"10.1109/CASoN.2012.6412387","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412387","url":null,"abstract":"In this paper we describe RunMyCode (RMC), a cloud based Platform as a Service tool (PaaS) which involves researchers collaborating across different time and geographical zones to produce research results along with their related papers. It helps researchers to incrementally co-create, deploy, evaluate, optimize and reproduce their research. It allows also a continuous integration and enhancement of different types of research artefacts including visual models, software and scripts. RMC extends traditional collaborative platforms by means of a scientific research-oriented social layer which allows intensive user contribution, interactions, and community building along with a content management system that lets researchers share, evaluate and develop valuable knowledge. RMC features include load balancing, elastic context aware and data-driven resource allocation, and parallel and “parameterizable” task execution.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126921688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412428
Jonas Krutil, M. Kudelka, V. Snás̃el
The internet is a library of a huge amount of information and there is a need for categorize its content based on web page classification. Classification of web page content can improve the quality of web search and its accuracy. Unfortunately the high dimensionality of the web pages dataset has made the process of classification difficult. The use of an automatic method for web page classification can simplify the whole process and assist the search engine in getting more relevant results. Nowadays information on the web is generally structured and formatted in a not formal way. This absence of semantics leads to create formal methods to provide more semantics information into web page. Search engines including Bing, Google, Yahoo! and Yandex formed collection of schemas Schema.org to support web page semantics and improve their search results. This paper explores the use of formal source code structure for classifying a large collection of the web content. Is focused on use of schemas collection Schema.org to classify web pages and categorize them unambiguously.
{"title":"Web page classification based on Schema.org collection","authors":"Jonas Krutil, M. Kudelka, V. Snás̃el","doi":"10.1109/CASoN.2012.6412428","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412428","url":null,"abstract":"The internet is a library of a huge amount of information and there is a need for categorize its content based on web page classification. Classification of web page content can improve the quality of web search and its accuracy. Unfortunately the high dimensionality of the web pages dataset has made the process of classification difficult. The use of an automatic method for web page classification can simplify the whole process and assist the search engine in getting more relevant results. Nowadays information on the web is generally structured and formatted in a not formal way. This absence of semantics leads to create formal methods to provide more semantics information into web page. Search engines including Bing, Google, Yahoo! and Yandex formed collection of schemas Schema.org to support web page semantics and improve their search results. This paper explores the use of formal source code structure for classifying a large collection of the web content. Is focused on use of schemas collection Schema.org to classify web pages and categorize them unambiguously.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128146744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412378
Bruno Vicente Alves de Lima, V. Machado
This work shows the results of an analysis of machine learning algorithms applied in automatic classification for the users of the social network called Scientia.Net. The tests were done using a database with 2000 users. The analysis identifies which algorithm performs better in automatic classification of users within a social network. The algorithms tested were Multilayer Perceptron, Support Vector Machine, Kohonen Network and K-means Algorithm.
{"title":"Machine learning algorithms applied in automatic classification of social network users","authors":"Bruno Vicente Alves de Lima, V. Machado","doi":"10.1109/CASoN.2012.6412378","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412378","url":null,"abstract":"This work shows the results of an analysis of machine learning algorithms applied in automatic classification for the users of the social network called Scientia.Net. The tests were done using a database with 2000 users. The analysis identifies which algorithm performs better in automatic classification of users within a social network. The algorithms tested were Multilayer Perceptron, Support Vector Machine, Kohonen Network and K-means Algorithm.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-11-01DOI: 10.1109/CASoN.2012.6412429
Kun Ma, R. Sun, A. Abraham
Nowadays, the cloud computing owners lack management and monitoring tools to ensure the performance, robustness, dependability, and security. To address this limitation, this paper described our experience with a lightweight monitoring framework using some extra development work. This framework performed end-to-end measurements at virtual machine instances and software in the public cloud. It monitors quality of service parameters of the IaaS and SaaS layer without modifying the implementation of the monitored object. In addition, we discussed the manager-agent and module-centralized architecture in details. All the modules make up the entire proposed framework to improve the performance of applications in public clouds.
{"title":"Toward a lightweight framework for monitoring public clouds","authors":"Kun Ma, R. Sun, A. Abraham","doi":"10.1109/CASoN.2012.6412429","DOIUrl":"https://doi.org/10.1109/CASoN.2012.6412429","url":null,"abstract":"Nowadays, the cloud computing owners lack management and monitoring tools to ensure the performance, robustness, dependability, and security. To address this limitation, this paper described our experience with a lightweight monitoring framework using some extra development work. This framework performed end-to-end measurements at virtual machine instances and software in the public cloud. It monitors quality of service parameters of the IaaS and SaaS layer without modifying the implementation of the monitored object. In addition, we discussed the manager-agent and module-centralized architecture in details. All the modules make up the entire proposed framework to improve the performance of applications in public clouds.","PeriodicalId":431370,"journal":{"name":"2012 Fourth International Conference on Computational Aspects of Social Networks (CASoN)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126313751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}