首页 > 最新文献

10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
An Access Control scheme for Big Data processing 面向大数据处理的访问控制方案
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257649
Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn
Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
访问控制(AC)系统是最关键的网络安全组件之一。由于访问控制策略的错误配置,而不是加密原语或协议的失败,系统的隐私和安全控制更有可能受到损害。随着软件系统的日益复杂,这个问题变得越来越严重,例如大数据处理系统,被部署来管理大量的敏感信息和资源,这些信息和资源被组织成一个复杂的BD处理集群。基本上,BD访问控制需要将协作处理域之间的协作作为由分布式AC管理下的计算单元组成的计算环境进行保护。提出了许多BD架构设计来解决BD挑战;然而,他们中的大多数都集中在“3v”(速度、体积和种类)的处理能力上。在保护BD时对安全性的考虑主要是临时的和补丁工作。即使在最近的BD系统中包含了一些安全性,但用于保护BD处理组件及其用户免受内部攻击的关键安全组件AC(授权)仍然难以捉摸。本文提出了一种用于分布式BD处理集群的通用交流方案。
{"title":"An Access Control scheme for Big Data processing","authors":"Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn","doi":"10.4108/ICST.COLLABORATECOM.2014.257649","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257649","url":null,"abstract":"Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Audio retrieval based on perceptual similarity 基于感知相似度的音频检索
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257704
Teng Zhang, Ji Wu, Dingding Wang, Tao Li
Given a short query audio clip, the goal of audio retrieval is to automatically fetch all similar clips from a given audio database. Different from traditional audio similarity which is mainly based on priori knowledge of objective reality, this paper proposes to use a more subjective method to measure the perceptual similarity between audio clips. These perceptual features focus on users' personal experience, which can be very helpful for audio retrieval across different databases. In addition, indexing and audio matching methods are introduced to speed up the retrieval process. Experimental results on four different datasets are conducted to evaluate the effectiveness and efficiency of our proposed approaches..
给定一个简短的查询音频剪辑,音频检索的目标是从给定的音频数据库中自动获取所有类似的剪辑。不同于传统的音频相似度主要基于对客观现实的先验知识,本文提出了一种更加主观的方法来度量音频片段之间的感知相似度。这些感知特征关注用户的个人体验,这对跨数据库的音频检索非常有帮助。此外,还引入了索引和音频匹配方法,加快了检索速度。在四个不同的数据集上进行了实验,以评估我们提出的方法的有效性和效率。
{"title":"Audio retrieval based on perceptual similarity","authors":"Teng Zhang, Ji Wu, Dingding Wang, Tao Li","doi":"10.4108/ICST.COLLABORATECOM.2014.257704","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257704","url":null,"abstract":"Given a short query audio clip, the goal of audio retrieval is to automatically fetch all similar clips from a given audio database. Different from traditional audio similarity which is mainly based on priori knowledge of objective reality, this paper proposes to use a more subjective method to measure the perceptual similarity between audio clips. These perceptual features focus on users' personal experience, which can be very helpful for audio retrieval across different databases. In addition, indexing and audio matching methods are introduced to speed up the retrieval process. Experimental results on four different datasets are conducted to evaluate the effectiveness and efficiency of our proposed approaches..","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Location-based timely cooperation over social private network 基于位置的社交私网即时合作
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257321
Youna Jung, R. Figueiredo, J. Fortes
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.
在紧急情况下越来越多地使用在线社交网络向我们展示了通过社交网络开展人类合作的美好未来。尽管有这种强烈的兴趣,一些基本的限制仍然存在,例如缺乏适当的概念模式和对合作方法和可共享资源的限制。为了解决现有的限制,我们提出了一个面向OSN用户的协作框架Whistle,它可以动态地与附近的用户组织一个应急社区,并利用Jitsi通信器和SocialVPN保证不受限制的协作和资源共享。为了测试Whistle的可行性和适用性,我们给出了一个实现的原型,并演示了它对一个示例用例的适用性。
{"title":"Location-based timely cooperation over social private network","authors":"Youna Jung, R. Figueiredo, J. Fortes","doi":"10.4108/ICST.COLLABORATECOM.2014.257321","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257321","url":null,"abstract":"The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights 多模态物理(IoT)、网络和社会数据的应用,以获得可靠和可操作的见解
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257553
A. Sheth, Pramod Anantharam, K. Thirunarayan
Physical objects with embedded sensors are increasingly being networked together using wireless and internet technologies to form Internet of Things (IoT). However, early applications that rely on IoT data fail to provide comprehensive situational awareness. This often requires combining physical (i.e., IoT) data with social data created by humans on the Web and increasingly on their mobile phones (i.e., citizen sensing) as well as other data such as structured open data and background knowledge available on the Web (i.e., cyber data and knowledge). In this paper, we explore how integration and analysis of multimodal physical-cybersocial data can support advanced applications and enrich human experience. Specifically, we illustrate the complementary role played by sensor and social data, often intermediated by other Web based data and knowledge, using real-world examples in the domain of situational awareness, traffic monitoring, and healthcare. We also show how semantic techniques and technologies support critical data interoperability needs, advanced computation capabilities including reasoning, and significantly enhance our ability to exploit growing amount of data from the proliferation of Internet of Things.
具有嵌入式传感器的物理对象越来越多地通过无线和互联网技术联网在一起,形成物联网(IoT)。然而,依赖物联网数据的早期应用无法提供全面的态势感知。这通常需要将物理(即物联网)数据与人类在网络上创建的社交数据以及越来越多的移动电话(即公民感知)以及其他数据(如结构化开放数据和网络上可用的背景知识)相结合(即网络数据和知识)。在本文中,我们探讨了多模态物理-网络社会数据的集成和分析如何支持高级应用和丰富人类体验。具体来说,我们使用情景感知、交通监控和医疗保健领域的实际示例说明了传感器和社会数据(通常由其他基于Web的数据和知识作为中介)所发挥的互补作用。我们还展示了语义技术和技术如何支持关键的数据互操作性需求,包括推理在内的高级计算能力,并显著增强了我们利用物联网激增带来的不断增长的数据量的能力。
{"title":"Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights","authors":"A. Sheth, Pramod Anantharam, K. Thirunarayan","doi":"10.4108/ICST.COLLABORATECOM.2014.257553","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257553","url":null,"abstract":"Physical objects with embedded sensors are increasingly being networked together using wireless and internet technologies to form Internet of Things (IoT). However, early applications that rely on IoT data fail to provide comprehensive situational awareness. This often requires combining physical (i.e., IoT) data with social data created by humans on the Web and increasingly on their mobile phones (i.e., citizen sensing) as well as other data such as structured open data and background knowledge available on the Web (i.e., cyber data and knowledge). In this paper, we explore how integration and analysis of multimodal physical-cybersocial data can support advanced applications and enrich human experience. Specifically, we illustrate the complementary role played by sensor and social data, often intermediated by other Web based data and knowledge, using real-world examples in the domain of situational awareness, traffic monitoring, and healthcare. We also show how semantic techniques and technologies support critical data interoperability needs, advanced computation capabilities including reasoning, and significantly enhance our ability to exploit growing amount of data from the proliferation of Internet of Things.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of cohesion-based feedback on the collaborations in global software development teams 基于内聚的反馈对全球软件开发团队协作的影响
Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores
This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's cohesion level, while the other teams received no feedback. The nature of the group interactions as well as the linguistic content of such interactions was then analyzed and compared. Results from this analysis show statistically significant differences between the feedback and non-feedback conditions. More specifically, cohesion-based feedback had a positive relation to a team's total message count, response rate, and individual cohesion score. In addition, the analysis of linguistic categories showed that the most salient categories observed were related to words about time and work. Although the feedback system did not appear to affect individual performance, the findings suggest that the cohesion measure defined in the study is positively correlated to the task cohesion construct and is also related to individual and team performance.
本文描述了一项研究,该研究检查了基于凝聚力的反馈对全球软件开发项目中团队成员行为的影响。聊天信息和论坛帖子是从一个软件开发项目中收集的,该项目涉及生活在美国和墨西哥的学生。项目中一半的团队收到了以图形表示形式的反馈,显示了团队的凝聚力水平,而其他团队没有收到反馈。然后对群体互动的性质以及这种互动的语言内容进行了分析和比较。该分析结果显示,反馈和非反馈条件之间存在统计学上的显著差异。更具体地说,基于凝聚力的反馈与团队的总消息数、回复率和个人凝聚力得分呈正相关。此外,对语言类别的分析表明,观察到的最显著的类别是与时间和工作有关的词。虽然反馈系统并未对个体绩效产生影响,但研究结果表明,研究中定义的凝聚力度量与任务凝聚力构建呈正相关,并且与个人和团队绩效也相关。
{"title":"Effects of cohesion-based feedback on the collaborations in global software development teams","authors":"Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores","doi":"10.4108/eai.21-12-2015.150818","DOIUrl":"https://doi.org/10.4108/eai.21-12-2015.150818","url":null,"abstract":"This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's cohesion level, while the other teams received no feedback. The nature of the group interactions as well as the linguistic content of such interactions was then analyzed and compared. Results from this analysis show statistically significant differences between the feedback and non-feedback conditions. More specifically, cohesion-based feedback had a positive relation to a team's total message count, response rate, and individual cohesion score. In addition, the analysis of linguistic categories showed that the most salient categories observed were related to words about time and work. Although the feedback system did not appear to affect individual performance, the findings suggest that the cohesion measure defined in the study is positively correlated to the task cohesion construct and is also related to individual and team performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Impact of socio-technical network on process performance 社会技术网络对过程绩效的影响
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257288
R. Liu, Akhil Kumar
There is a growing interest in socio-technical networks that encompass people, process and technology. They capture connections among technical artifacts and human resources. Existing studies have shown that social networks among resources that collaborate to work on a business process instance have an impact on the performance of the instance. Hence, the social network among the resources should be aligned with the technical work structure. Thus, we propose to identify empirically the specific features of social networks (e.g. size, closeness, density, etc.) that have the most significant impact on the performance of a process. Then, we can leverage these significant social network features to optimize dynamic assignment of tasks to resources for better performance. In general, organizations can use this two-part approach to evaluate their resource social networks and shape their resource networks to achieve socio-technical network alignment. We use real data from business processes in the IT incident management domain for this study to demonstrate our proposed methodology.
人们对包含人、过程和技术的社会技术网络越来越感兴趣。它们捕获了技术工件和人力资源之间的联系。现有的研究表明,协作处理业务流程实例的资源之间的社会网络对实例的性能有影响。因此,资源之间的社会网络应该与技术工作结构保持一致。因此,我们建议从经验上确定社会网络的具体特征(如大小、亲密度、密度等),这些特征对过程的性能有最显著的影响。然后,我们可以利用这些重要的社会网络特征来优化任务对资源的动态分配,以获得更好的性能。一般来说,组织可以使用这两部分的方法来评估他们的资源社会网络和塑造他们的资源网络,以实现社会技术网络的一致性。在本研究中,我们使用来自IT事件管理领域的业务流程的真实数据来演示我们提出的方法。
{"title":"Impact of socio-technical network on process performance","authors":"R. Liu, Akhil Kumar","doi":"10.4108/ICST.COLLABORATECOM.2014.257288","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257288","url":null,"abstract":"There is a growing interest in socio-technical networks that encompass people, process and technology. They capture connections among technical artifacts and human resources. Existing studies have shown that social networks among resources that collaborate to work on a business process instance have an impact on the performance of the instance. Hence, the social network among the resources should be aligned with the technical work structure. Thus, we propose to identify empirically the specific features of social networks (e.g. size, closeness, density, etc.) that have the most significant impact on the performance of a process. Then, we can leverage these significant social network features to optimize dynamic assignment of tasks to resources for better performance. In general, organizations can use this two-part approach to evaluate their resource social networks and shape their resource networks to achieve socio-technical network alignment. We use real data from business processes in the IT incident management domain for this study to demonstrate our proposed methodology.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role and attribute based collaborative administration of intra-tenant cloud IaaS 基于角色和属性的租户内云IaaS协同管理
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257591
Xin Jin, R. Krishnan, R. Sandhu
Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including network based remote collaborative administration. This flexibility can be fully availed only if complemented by commensurately flexible access control to the customers remote IT resources by the customer's IT users. Since customer policies in this regard can vary greatly, the CSP needs a flexible model to accommodate diverse policy requirements. In this paper, we investigate attribute-based access control (ABAC) in cloud IaaS. In ABAC, access requests are evaluated based on the attributes of cloud tenant users and those of objects such as virtual machines, storage volumes, networks, etc. We investigate the access control models supported by commercial IaaS providers such as Amazon AWS and opensource OpenStack, as well as other models in the literature, which mostly use role-based access control (RBAC). We demonstrate their limitations and motivate the need for ABAC support to realize the true potential of IaaS. Building on prior published ABAC models we define a formal ABAC model suitable for IaaS. As proof-of-concept we implement this model in OpenStack, a widely-used open source cloud IaaS software platform. We discuss enforcement alternatives in this context and partially evaluate their performance.
云基础设施即服务(IaaS)是云计算中成熟最快的服务模式,它将计算、存储和网络等传统IT基础设施资源由云服务提供商(CSP)拥有,并作为按需虚拟资源提供给客户(租户)。将物理资源转换为虚拟资源为CSP客户提供了极大的灵活性,包括基于网络的远程协作管理。只有当客户的IT用户对客户远程IT资源进行相应灵活的访问控制时,才能充分利用这种灵活性。由于客户在这方面的策略差异很大,因此CSP需要一个灵活的模型来适应不同的策略需求。本文研究了基于属性的访问控制(ABAC)在云IaaS中的应用。在ABAC中,访问请求是基于云租户用户和对象(如虚拟机、存储卷、网络等)的属性进行评估的。我们研究了商业IaaS提供商(如Amazon AWS和开源OpenStack)支持的访问控制模型,以及文献中的其他模型,这些模型主要使用基于角色的访问控制(RBAC)。我们展示了它们的局限性,并激发了对ABAC支持的需求,以实现IaaS的真正潜力。在先前发布的ABAC模型的基础上,我们定义了一个适用于IaaS的正式ABAC模型。作为概念验证,我们在OpenStack中实现了这个模型,OpenStack是一个广泛使用的开源云IaaS软件平台。我们将在此背景下讨论强制执行方案,并部分评估其性能。
{"title":"Role and attribute based collaborative administration of intra-tenant cloud IaaS","authors":"Xin Jin, R. Krishnan, R. Sandhu","doi":"10.4108/ICST.COLLABORATECOM.2014.257591","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257591","url":null,"abstract":"Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including network based remote collaborative administration. This flexibility can be fully availed only if complemented by commensurately flexible access control to the customers remote IT resources by the customer's IT users. Since customer policies in this regard can vary greatly, the CSP needs a flexible model to accommodate diverse policy requirements. In this paper, we investigate attribute-based access control (ABAC) in cloud IaaS. In ABAC, access requests are evaluated based on the attributes of cloud tenant users and those of objects such as virtual machines, storage volumes, networks, etc. We investigate the access control models supported by commercial IaaS providers such as Amazon AWS and opensource OpenStack, as well as other models in the literature, which mostly use role-based access control (RBAC). We demonstrate their limitations and motivate the need for ABAC support to realize the true potential of IaaS. Building on prior published ABAC models we define a formal ABAC model suitable for IaaS. As proof-of-concept we implement this model in OpenStack, a widely-used open source cloud IaaS software platform. We discuss enforcement alternatives in this context and partially evaluate their performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Programmer-controlled application-level multicast 程序员控制的应用层多播
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257266
P. Dewan
Group communication abstractions provide application-level multicasting to communicate information among distributed processes. A variety of such abstractions have been provided to implement synchronous collaborative applications but they do not allow control over the multicast of information to the selected group of processes. We have developed a new abstraction that overcomes this limitation. It defines a two-level grouping of distributed processes, with one level defining the users interacting with a specific collaborative application, and the other defining the set of collaborative applications a set of users is sharing simultaneously to perform some collaborative task. It allows information to be sent directly to the receiving processes or through a centralized relayer. In either case, programmer-choosable and replaceable send and receive filters provide consistency guarantees. The abstraction provides message passing rather than remote procedure calls, and supports asynchronous sending and receiving of messages. It is designed to support both centralized and replicated architectures. The abstraction has been implemented on top of the Java Remote Method Invocation layer and has been used to implement a broad range of collaboration functions.
组通信抽象提供应用程序级多播,以便在分布式进程之间通信信息。已经提供了各种这样的抽象来实现同步协作应用程序,但是它们不允许控制向所选进程组发送信息的多播。我们开发了一个新的抽象来克服这个限制。它定义了分布式流程的两层分组,其中一层定义了与特定协作应用程序交互的用户,另一层定义了一组用户同时共享以执行某些协作任务的协作应用程序。它允许将信息直接发送到接收进程或通过集中中继器。在这两种情况下,程序员可选择和可替换的发送和接收过滤器提供一致性保证。抽象提供消息传递而不是远程过程调用,并支持消息的异步发送和接收。它旨在支持集中式和复制式架构。抽象是在Java远程方法调用层之上实现的,并用于实现广泛的协作功能。
{"title":"Programmer-controlled application-level multicast","authors":"P. Dewan","doi":"10.4108/ICST.COLLABORATECOM.2014.257266","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257266","url":null,"abstract":"Group communication abstractions provide application-level multicasting to communicate information among distributed processes. A variety of such abstractions have been provided to implement synchronous collaborative applications but they do not allow control over the multicast of information to the selected group of processes. We have developed a new abstraction that overcomes this limitation. It defines a two-level grouping of distributed processes, with one level defining the users interacting with a specific collaborative application, and the other defining the set of collaborative applications a set of users is sharing simultaneously to perform some collaborative task. It allows information to be sent directly to the receiving processes or through a centralized relayer. In either case, programmer-choosable and replaceable send and receive filters provide consistency guarantees. The abstraction provides message passing rather than remote procedure calls, and supports asynchronous sending and receiving of messages. It is designed to support both centralized and replicated architectures. The abstraction has been implemented on top of the Java Remote Method Invocation layer and has been used to implement a broad range of collaboration functions.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DQS-Cloud: A Data Quality-Aware autonomic cloud for sensor services DQS-Cloud:用于传感器服务的数据质量感知自主云
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257475
Abhishek Kothari, Vinay Boddula, Lakshmish Ramaswamy, Neda Abolhassani
With the advent of Internet of Things, the field of domain sensing is increasingly being servitized. In order to effectively support this servitization, there is a growing need for a powerful and easy-to-use infrastructure that enables seamless sharing of sensor data in real-time. In this paper, we present the design and evaluation of Data Quality-Aware Sensor Cloud (DQS-Cloud), a cloud-based sensor data services infrastructure. DQS-Cloud is characterized by three novel features. First, data-quality is pervasive throughout the infrastructure ranging from feed discovery to failure resilience. Second, it incorporates autonomic-computing-based techniques for dealing with sensor failures as well as data quality dynamics. Third, DQS-Cloud also features a unique sensor stream management engine that optimizes the system performance by dynamically placing stream management operators. This paper reports several experiments to study the effectiveness and the efficiency of the framework.
随着物联网时代的到来,域感知领域的服务化程度越来越高。为了有效地支持这种服务化,越来越需要一个功能强大且易于使用的基础设施,以实现传感器数据的实时无缝共享。在本文中,我们提出了数据质量感知传感器云(DQS-Cloud)的设计和评估,这是一种基于云的传感器数据服务基础设施。DQS-Cloud具有三个新特点。首先,从feed发现到故障恢复,数据质量在整个基础设施中无处不在。其次,它结合了基于自主计算的技术来处理传感器故障以及数据质量动态。第三,DQS-Cloud还具有独特的传感器流管理引擎,通过动态放置流管理操作符来优化系统性能。本文通过几个实验来研究该框架的有效性和效率。
{"title":"DQS-Cloud: A Data Quality-Aware autonomic cloud for sensor services","authors":"Abhishek Kothari, Vinay Boddula, Lakshmish Ramaswamy, Neda Abolhassani","doi":"10.4108/ICST.COLLABORATECOM.2014.257475","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257475","url":null,"abstract":"With the advent of Internet of Things, the field of domain sensing is increasingly being servitized. In order to effectively support this servitization, there is a growing need for a powerful and easy-to-use infrastructure that enables seamless sharing of sensor data in real-time. In this paper, we present the design and evaluation of Data Quality-Aware Sensor Cloud (DQS-Cloud), a cloud-based sensor data services infrastructure. DQS-Cloud is characterized by three novel features. First, data-quality is pervasive throughout the infrastructure ranging from feed discovery to failure resilience. Second, it incorporates autonomic-computing-based techniques for dealing with sensor failures as well as data quality dynamics. Third, DQS-Cloud also features a unique sensor stream management engine that optimizes the system performance by dynamically placing stream management operators. This paper reports several experiments to study the effectiveness and the efficiency of the framework.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"53 15-18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114045383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
MACNET: Mobile Adhoc Collaborative NETworks 移动自组织协作网络
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257322
J. Shamsi, S. Raza, Hassan Farid, A. Mehdi, S. Munir
Resource limitation is considered as a major bottleneck in smart phones. This paper aims to address this problem by proposing a collaborative ad-hoc network of smart phones which utilizes trust relationship among peer devices to provide a computationally powerful, resilient, available, and low cost solution. MACNET (Mobile Ad-hoc Collaborative NETwork) implements a middleware to address the issues of collaboration, trust, and network connectivity. A large number of applications can utilize the MACNET framework for improved connectivity, rapid response, and better communication. The paper elaborates sample applications and addresses the architectural details of the solution. It also explains the implementation details and provides results to demonstrate the effectiveness and benefits.
资源限制被认为是智能手机的主要瓶颈。本文旨在通过提出一种智能手机协作自组织网络来解决这一问题,该网络利用对等设备之间的信任关系来提供一种计算能力强大、弹性强、可用且成本低的解决方案。MACNET(移动自组织协作网络)实现了一个中间件来解决协作、信任和网络连接的问题。大量的应用程序可以利用MACNET框架来改进连接性、快速响应和更好的通信。本文详细阐述了示例应用程序,并阐述了解决方案的体系结构细节。它还解释了实现细节,并提供了证明有效性和好处的结果。
{"title":"MACNET: Mobile Adhoc Collaborative NETworks","authors":"J. Shamsi, S. Raza, Hassan Farid, A. Mehdi, S. Munir","doi":"10.4108/ICST.COLLABORATECOM.2014.257322","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257322","url":null,"abstract":"Resource limitation is considered as a major bottleneck in smart phones. This paper aims to address this problem by proposing a collaborative ad-hoc network of smart phones which utilizes trust relationship among peer devices to provide a computationally powerful, resilient, available, and low cost solution. MACNET (Mobile Ad-hoc Collaborative NETwork) implements a middleware to address the issues of collaboration, trust, and network connectivity. A large number of applications can utilize the MACNET framework for improved connectivity, rapid response, and better communication. The paper elaborates sample applications and addresses the architectural details of the solution. It also explains the implementation details and provides results to demonstrate the effectiveness and benefits.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117260137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1