首页 > 最新文献

10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
An Access Control scheme for Big Data processing 面向大数据处理的访问控制方案
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257649
Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn
Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.
访问控制(AC)系统是最关键的网络安全组件之一。由于访问控制策略的错误配置,而不是加密原语或协议的失败,系统的隐私和安全控制更有可能受到损害。随着软件系统的日益复杂,这个问题变得越来越严重,例如大数据处理系统,被部署来管理大量的敏感信息和资源,这些信息和资源被组织成一个复杂的BD处理集群。基本上,BD访问控制需要将协作处理域之间的协作作为由分布式AC管理下的计算单元组成的计算环境进行保护。提出了许多BD架构设计来解决BD挑战;然而,他们中的大多数都集中在“3v”(速度、体积和种类)的处理能力上。在保护BD时对安全性的考虑主要是临时的和补丁工作。即使在最近的BD系统中包含了一些安全性,但用于保护BD处理组件及其用户免受内部攻击的关键安全组件AC(授权)仍然难以捉摸。本文提出了一种用于分布式BD处理集群的通用交流方案。
{"title":"An Access Control scheme for Big Data processing","authors":"Vincent C. Hu, T. Grance, David F. Ferraiolo, D. R. Kuhn","doi":"10.4108/ICST.COLLABORATECOM.2014.257649","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257649","url":null,"abstract":"Access Control (AC) systems are among the most critical of network security components. A system's privacy and security controls are more likely to be compromised due to the misconfiguration of access control policies rather than the failure of cryptographic primitives or protocols. This problem becomes increasingly severe as software systems become more and more complex, such as Big Data (BD) processing systems, which are deployed to manage a large amount of sensitive information and resources organized into a sophisticated BD processing cluster. Basically, BD access control requires the collaboration among cooperating processing domains to be protected as computing environments that consist of computing units under distributed AC managements. Many BD architecture designs were proposed to address BD challenges; however, most of them were focused on the processing capabilities of the “three Vs” (Velocity, Volume, and Variety). Considerations for security in protecting BD are mostly ad hoc and patch efforts. Even with some inclusion of security in recent BD systems, a critical security component, AC (Authorization), for protecting BD processing components and their users from the insider attacks, remains elusive. This paper proposes a general purpose AC scheme for distributed BD processing clusters.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123588654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 33
Audio retrieval based on perceptual similarity 基于感知相似度的音频检索
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257704
Teng Zhang, Ji Wu, Dingding Wang, Tao Li
Given a short query audio clip, the goal of audio retrieval is to automatically fetch all similar clips from a given audio database. Different from traditional audio similarity which is mainly based on priori knowledge of objective reality, this paper proposes to use a more subjective method to measure the perceptual similarity between audio clips. These perceptual features focus on users' personal experience, which can be very helpful for audio retrieval across different databases. In addition, indexing and audio matching methods are introduced to speed up the retrieval process. Experimental results on four different datasets are conducted to evaluate the effectiveness and efficiency of our proposed approaches..
给定一个简短的查询音频剪辑,音频检索的目标是从给定的音频数据库中自动获取所有类似的剪辑。不同于传统的音频相似度主要基于对客观现实的先验知识,本文提出了一种更加主观的方法来度量音频片段之间的感知相似度。这些感知特征关注用户的个人体验,这对跨数据库的音频检索非常有帮助。此外,还引入了索引和音频匹配方法,加快了检索速度。在四个不同的数据集上进行了实验,以评估我们提出的方法的有效性和效率。
{"title":"Audio retrieval based on perceptual similarity","authors":"Teng Zhang, Ji Wu, Dingding Wang, Tao Li","doi":"10.4108/ICST.COLLABORATECOM.2014.257704","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257704","url":null,"abstract":"Given a short query audio clip, the goal of audio retrieval is to automatically fetch all similar clips from a given audio database. Different from traditional audio similarity which is mainly based on priori knowledge of objective reality, this paper proposes to use a more subjective method to measure the perceptual similarity between audio clips. These perceptual features focus on users' personal experience, which can be very helpful for audio retrieval across different databases. In addition, indexing and audio matching methods are introduced to speed up the retrieval process. Experimental results on four different datasets are conducted to evaluate the effectiveness and efficiency of our proposed approaches..","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115018600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Location-based timely cooperation over social private network 基于位置的社交私网即时合作
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257321
Youna Jung, R. Figueiredo, J. Fortes
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.
在紧急情况下越来越多地使用在线社交网络向我们展示了通过社交网络开展人类合作的美好未来。尽管有这种强烈的兴趣,一些基本的限制仍然存在,例如缺乏适当的概念模式和对合作方法和可共享资源的限制。为了解决现有的限制,我们提出了一个面向OSN用户的协作框架Whistle,它可以动态地与附近的用户组织一个应急社区,并利用Jitsi通信器和SocialVPN保证不受限制的协作和资源共享。为了测试Whistle的可行性和适用性,我们给出了一个实现的原型,并演示了它对一个示例用例的适用性。
{"title":"Location-based timely cooperation over social private network","authors":"Youna Jung, R. Figueiredo, J. Fortes","doi":"10.4108/ICST.COLLABORATECOM.2014.257321","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257321","url":null,"abstract":"The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122572737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights 多模态物理(IoT)、网络和社会数据的应用,以获得可靠和可操作的见解
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257553
A. Sheth, Pramod Anantharam, K. Thirunarayan
Physical objects with embedded sensors are increasingly being networked together using wireless and internet technologies to form Internet of Things (IoT). However, early applications that rely on IoT data fail to provide comprehensive situational awareness. This often requires combining physical (i.e., IoT) data with social data created by humans on the Web and increasingly on their mobile phones (i.e., citizen sensing) as well as other data such as structured open data and background knowledge available on the Web (i.e., cyber data and knowledge). In this paper, we explore how integration and analysis of multimodal physical-cybersocial data can support advanced applications and enrich human experience. Specifically, we illustrate the complementary role played by sensor and social data, often intermediated by other Web based data and knowledge, using real-world examples in the domain of situational awareness, traffic monitoring, and healthcare. We also show how semantic techniques and technologies support critical data interoperability needs, advanced computation capabilities including reasoning, and significantly enhance our ability to exploit growing amount of data from the proliferation of Internet of Things.
具有嵌入式传感器的物理对象越来越多地通过无线和互联网技术联网在一起,形成物联网(IoT)。然而,依赖物联网数据的早期应用无法提供全面的态势感知。这通常需要将物理(即物联网)数据与人类在网络上创建的社交数据以及越来越多的移动电话(即公民感知)以及其他数据(如结构化开放数据和网络上可用的背景知识)相结合(即网络数据和知识)。在本文中,我们探讨了多模态物理-网络社会数据的集成和分析如何支持高级应用和丰富人类体验。具体来说,我们使用情景感知、交通监控和医疗保健领域的实际示例说明了传感器和社会数据(通常由其他基于Web的数据和知识作为中介)所发挥的互补作用。我们还展示了语义技术和技术如何支持关键的数据互操作性需求,包括推理在内的高级计算能力,并显著增强了我们利用物联网激增带来的不断增长的数据量的能力。
{"title":"Applications of multimodal physical (IoT), cyber and social data for reliable and actionable insights","authors":"A. Sheth, Pramod Anantharam, K. Thirunarayan","doi":"10.4108/ICST.COLLABORATECOM.2014.257553","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257553","url":null,"abstract":"Physical objects with embedded sensors are increasingly being networked together using wireless and internet technologies to form Internet of Things (IoT). However, early applications that rely on IoT data fail to provide comprehensive situational awareness. This often requires combining physical (i.e., IoT) data with social data created by humans on the Web and increasingly on their mobile phones (i.e., citizen sensing) as well as other data such as structured open data and background knowledge available on the Web (i.e., cyber data and knowledge). In this paper, we explore how integration and analysis of multimodal physical-cybersocial data can support advanced applications and enrich human experience. Specifically, we illustrate the complementary role played by sensor and social data, often intermediated by other Web based data and knowledge, using real-world examples in the domain of situational awareness, traffic monitoring, and healthcare. We also show how semantic techniques and technologies support critical data interoperability needs, advanced computation capabilities including reasoning, and significantly enhance our ability to exploit growing amount of data from the proliferation of Internet of Things.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114546080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Effects of cohesion-based feedback on the collaborations in global software development teams 基于内聚的反馈对全球软件开发团队协作的影响
Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores
This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's cohesion level, while the other teams received no feedback. The nature of the group interactions as well as the linguistic content of such interactions was then analyzed and compared. Results from this analysis show statistically significant differences between the feedback and non-feedback conditions. More specifically, cohesion-based feedback had a positive relation to a team's total message count, response rate, and individual cohesion score. In addition, the analysis of linguistic categories showed that the most salient categories observed were related to words about time and work. Although the feedback system did not appear to affect individual performance, the findings suggest that the cohesion measure defined in the study is positively correlated to the task cohesion construct and is also related to individual and team performance.
本文描述了一项研究,该研究检查了基于凝聚力的反馈对全球软件开发项目中团队成员行为的影响。聊天信息和论坛帖子是从一个软件开发项目中收集的,该项目涉及生活在美国和墨西哥的学生。项目中一半的团队收到了以图形表示形式的反馈,显示了团队的凝聚力水平,而其他团队没有收到反馈。然后对群体互动的性质以及这种互动的语言内容进行了分析和比较。该分析结果显示,反馈和非反馈条件之间存在统计学上的显著差异。更具体地说,基于凝聚力的反馈与团队的总消息数、回复率和个人凝聚力得分呈正相关。此外,对语言类别的分析表明,观察到的最显著的类别是与时间和工作有关的词。虽然反馈系统并未对个体绩效产生影响,但研究结果表明,研究中定义的凝聚力度量与任务凝聚力构建呈正相关,并且与个人和团队绩效也相关。
{"title":"Effects of cohesion-based feedback on the collaborations in global software development teams","authors":"Alberto Castro-Hernández, K. Swigger, Mirna Patricia Ponce Flores","doi":"10.4108/eai.21-12-2015.150818","DOIUrl":"https://doi.org/10.4108/eai.21-12-2015.150818","url":null,"abstract":"This paper describes a study that examines the effect of cohesion-based feedback on a team members' behaviors in a global software development project. Chat messages and forum posts were collected from a software development project involving students living in the US and Mexico. Half of the teams in the project received feedback in the form of a graphical representation that displayed the group's cohesion level, while the other teams received no feedback. The nature of the group interactions as well as the linguistic content of such interactions was then analyzed and compared. Results from this analysis show statistically significant differences between the feedback and non-feedback conditions. More specifically, cohesion-based feedback had a positive relation to a team's total message count, response rate, and individual cohesion score. In addition, the analysis of linguistic categories showed that the most salient categories observed were related to words about time and work. Although the feedback system did not appear to affect individual performance, the findings suggest that the cohesion measure defined in the study is positively correlated to the task cohesion construct and is also related to individual and team performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Impact of socio-technical network on process performance 社会技术网络对过程绩效的影响
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257288
R. Liu, Akhil Kumar
There is a growing interest in socio-technical networks that encompass people, process and technology. They capture connections among technical artifacts and human resources. Existing studies have shown that social networks among resources that collaborate to work on a business process instance have an impact on the performance of the instance. Hence, the social network among the resources should be aligned with the technical work structure. Thus, we propose to identify empirically the specific features of social networks (e.g. size, closeness, density, etc.) that have the most significant impact on the performance of a process. Then, we can leverage these significant social network features to optimize dynamic assignment of tasks to resources for better performance. In general, organizations can use this two-part approach to evaluate their resource social networks and shape their resource networks to achieve socio-technical network alignment. We use real data from business processes in the IT incident management domain for this study to demonstrate our proposed methodology.
人们对包含人、过程和技术的社会技术网络越来越感兴趣。它们捕获了技术工件和人力资源之间的联系。现有的研究表明,协作处理业务流程实例的资源之间的社会网络对实例的性能有影响。因此,资源之间的社会网络应该与技术工作结构保持一致。因此,我们建议从经验上确定社会网络的具体特征(如大小、亲密度、密度等),这些特征对过程的性能有最显著的影响。然后,我们可以利用这些重要的社会网络特征来优化任务对资源的动态分配,以获得更好的性能。一般来说,组织可以使用这两部分的方法来评估他们的资源社会网络和塑造他们的资源网络,以实现社会技术网络的一致性。在本研究中,我们使用来自IT事件管理领域的业务流程的真实数据来演示我们提出的方法。
{"title":"Impact of socio-technical network on process performance","authors":"R. Liu, Akhil Kumar","doi":"10.4108/ICST.COLLABORATECOM.2014.257288","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257288","url":null,"abstract":"There is a growing interest in socio-technical networks that encompass people, process and technology. They capture connections among technical artifacts and human resources. Existing studies have shown that social networks among resources that collaborate to work on a business process instance have an impact on the performance of the instance. Hence, the social network among the resources should be aligned with the technical work structure. Thus, we propose to identify empirically the specific features of social networks (e.g. size, closeness, density, etc.) that have the most significant impact on the performance of a process. Then, we can leverage these significant social network features to optimize dynamic assignment of tasks to resources for better performance. In general, organizations can use this two-part approach to evaluate their resource social networks and shape their resource networks to achieve socio-technical network alignment. We use real data from business processes in the IT incident management domain for this study to demonstrate our proposed methodology.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Role and attribute based collaborative administration of intra-tenant cloud IaaS 基于角色和属性的租户内云IaaS协同管理
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257591
Xin Jin, R. Krishnan, R. Sandhu
Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including network based remote collaborative administration. This flexibility can be fully availed only if complemented by commensurately flexible access control to the customers remote IT resources by the customer's IT users. Since customer policies in this regard can vary greatly, the CSP needs a flexible model to accommodate diverse policy requirements. In this paper, we investigate attribute-based access control (ABAC) in cloud IaaS. In ABAC, access requests are evaluated based on the attributes of cloud tenant users and those of objects such as virtual machines, storage volumes, networks, etc. We investigate the access control models supported by commercial IaaS providers such as Amazon AWS and opensource OpenStack, as well as other models in the literature, which mostly use role-based access control (RBAC). We demonstrate their limitations and motivate the need for ABAC support to realize the true potential of IaaS. Building on prior published ABAC models we define a formal ABAC model suitable for IaaS. As proof-of-concept we implement this model in OpenStack, a widely-used open source cloud IaaS software platform. We discuss enforcement alternatives in this context and partially evaluate their performance.
云基础设施即服务(IaaS)是云计算中成熟最快的服务模式,它将计算、存储和网络等传统IT基础设施资源由云服务提供商(CSP)拥有,并作为按需虚拟资源提供给客户(租户)。将物理资源转换为虚拟资源为CSP客户提供了极大的灵活性,包括基于网络的远程协作管理。只有当客户的IT用户对客户远程IT资源进行相应灵活的访问控制时,才能充分利用这种灵活性。由于客户在这方面的策略差异很大,因此CSP需要一个灵活的模型来适应不同的策略需求。本文研究了基于属性的访问控制(ABAC)在云IaaS中的应用。在ABAC中,访问请求是基于云租户用户和对象(如虚拟机、存储卷、网络等)的属性进行评估的。我们研究了商业IaaS提供商(如Amazon AWS和开源OpenStack)支持的访问控制模型,以及文献中的其他模型,这些模型主要使用基于角色的访问控制(RBAC)。我们展示了它们的局限性,并激发了对ABAC支持的需求,以实现IaaS的真正潜力。在先前发布的ABAC模型的基础上,我们定义了一个适用于IaaS的正式ABAC模型。作为概念验证,我们在OpenStack中实现了这个模型,OpenStack是一个广泛使用的开源云IaaS软件平台。我们将在此背景下讨论强制执行方案,并部分评估其性能。
{"title":"Role and attribute based collaborative administration of intra-tenant cloud IaaS","authors":"Xin Jin, R. Krishnan, R. Sandhu","doi":"10.4108/ICST.COLLABORATECOM.2014.257591","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257591","url":null,"abstract":"Cloud Infrastructure as a Service (IaaS), where traditional IT infrastructure resources such as compute, storage and networking are owned by a cloud service provider (CSP) and offered as on-demand virtual resources to customers (tenants), is the fastest maturing service model in cloud computing. The transformation of physical resources into virtual offers great flexibility to CSP customers including network based remote collaborative administration. This flexibility can be fully availed only if complemented by commensurately flexible access control to the customers remote IT resources by the customer's IT users. Since customer policies in this regard can vary greatly, the CSP needs a flexible model to accommodate diverse policy requirements. In this paper, we investigate attribute-based access control (ABAC) in cloud IaaS. In ABAC, access requests are evaluated based on the attributes of cloud tenant users and those of objects such as virtual machines, storage volumes, networks, etc. We investigate the access control models supported by commercial IaaS providers such as Amazon AWS and opensource OpenStack, as well as other models in the literature, which mostly use role-based access control (RBAC). We demonstrate their limitations and motivate the need for ABAC support to realize the true potential of IaaS. Building on prior published ABAC models we define a formal ABAC model suitable for IaaS. As proof-of-concept we implement this model in OpenStack, a widely-used open source cloud IaaS software platform. We discuss enforcement alternatives in this context and partially evaluate their performance.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130440140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Programmer-controlled application-level multicast 程序员控制的应用层多播
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257266
P. Dewan
Group communication abstractions provide application-level multicasting to communicate information among distributed processes. A variety of such abstractions have been provided to implement synchronous collaborative applications but they do not allow control over the multicast of information to the selected group of processes. We have developed a new abstraction that overcomes this limitation. It defines a two-level grouping of distributed processes, with one level defining the users interacting with a specific collaborative application, and the other defining the set of collaborative applications a set of users is sharing simultaneously to perform some collaborative task. It allows information to be sent directly to the receiving processes or through a centralized relayer. In either case, programmer-choosable and replaceable send and receive filters provide consistency guarantees. The abstraction provides message passing rather than remote procedure calls, and supports asynchronous sending and receiving of messages. It is designed to support both centralized and replicated architectures. The abstraction has been implemented on top of the Java Remote Method Invocation layer and has been used to implement a broad range of collaboration functions.
组通信抽象提供应用程序级多播,以便在分布式进程之间通信信息。已经提供了各种这样的抽象来实现同步协作应用程序,但是它们不允许控制向所选进程组发送信息的多播。我们开发了一个新的抽象来克服这个限制。它定义了分布式流程的两层分组,其中一层定义了与特定协作应用程序交互的用户,另一层定义了一组用户同时共享以执行某些协作任务的协作应用程序。它允许将信息直接发送到接收进程或通过集中中继器。在这两种情况下,程序员可选择和可替换的发送和接收过滤器提供一致性保证。抽象提供消息传递而不是远程过程调用,并支持消息的异步发送和接收。它旨在支持集中式和复制式架构。抽象是在Java远程方法调用层之上实现的,并用于实现广泛的协作功能。
{"title":"Programmer-controlled application-level multicast","authors":"P. Dewan","doi":"10.4108/ICST.COLLABORATECOM.2014.257266","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257266","url":null,"abstract":"Group communication abstractions provide application-level multicasting to communicate information among distributed processes. A variety of such abstractions have been provided to implement synchronous collaborative applications but they do not allow control over the multicast of information to the selected group of processes. We have developed a new abstraction that overcomes this limitation. It defines a two-level grouping of distributed processes, with one level defining the users interacting with a specific collaborative application, and the other defining the set of collaborative applications a set of users is sharing simultaneously to perform some collaborative task. It allows information to be sent directly to the receiving processes or through a centralized relayer. In either case, programmer-choosable and replaceable send and receive filters provide consistency guarantees. The abstraction provides message passing rather than remote procedure calls, and supports asynchronous sending and receiving of messages. It is designed to support both centralized and replicated architectures. The abstraction has been implemented on top of the Java Remote Method Invocation layer and has been used to implement a broad range of collaboration functions.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134008292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards composable prediction of contact groups 面向接触组的可组合预测
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257329
Andrew Ghobrial, Jacob W. Bartel, P. Dewan
Users' contacts often need to be grouped into equivalence classes for various purposes such as easily sending a message to all members of the group. Several approaches have been recently developed to make such predictions (a) for both ephemeral and persistent groups (b) in both email and social networks systems. However, no research has attempted to compare these approaches or compose them by using ideas of one in another. We have taken a step in this direction. We have developed and compared multiple approaches to predicting persistent contact groups in email. These approaches compose an algorithm that generates friend lists in Facebook from a social graph with different techniques for generating the social graph. One of these techniques is based on a scoring algorithm used by Google to predict ephemeral groups incrementally. To compare the approaches we ran a user study involving 19 participants and used two simple metrics that calculated the average percentage difference between a predicted group and the group of addresses in a future message. The evaluation showed that using the Google score was the best approach though it offered very small improvements over all but one of the simpler methods.
出于各种目的,用户的联系人通常需要被分组到等价类中,例如方便地向组中的所有成员发送消息。最近已经开发了几种方法来做出这样的预测(a)短期和持久的群体(b)在电子邮件和社会网络系统。然而,没有研究试图比较这些方法,或者通过使用另一种方法的想法来组合它们。我们已经朝这个方向迈出了一步。我们已经开发并比较了多种方法来预测电子邮件中的持久联系组。这些方法组成了一个算法,该算法使用不同的技术从社交图谱中生成Facebook中的好友列表。其中一种技术是基于谷歌使用的评分算法,该算法用于增量预测短暂的群体。为了比较这两种方法,我们进行了一项涉及19名参与者的用户研究,并使用了两个简单的指标来计算预测组和未来消息中地址组之间的平均百分比差异。评估显示,使用谷歌评分是最好的方法,尽管除了一种更简单的方法外,它提供的改进很小。
{"title":"Towards composable prediction of contact groups","authors":"Andrew Ghobrial, Jacob W. Bartel, P. Dewan","doi":"10.4108/ICST.COLLABORATECOM.2014.257329","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257329","url":null,"abstract":"Users' contacts often need to be grouped into equivalence classes for various purposes such as easily sending a message to all members of the group. Several approaches have been recently developed to make such predictions (a) for both ephemeral and persistent groups (b) in both email and social networks systems. However, no research has attempted to compare these approaches or compose them by using ideas of one in another. We have taken a step in this direction. We have developed and compared multiple approaches to predicting persistent contact groups in email. These approaches compose an algorithm that generates friend lists in Facebook from a social graph with different techniques for generating the social graph. One of these techniques is based on a scoring algorithm used by Google to predict ephemeral groups incrementally. To compare the approaches we ran a user study involving 19 participants and used two simple metrics that calculated the average percentage difference between a predicted group and the group of addresses in a future message. The evaluation showed that using the Google score was the best approach though it offered very small improvements over all but one of the simpler methods.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129082371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Multi-objective optimization based location and social network aware recommendation 基于位置和社交网络感知的多目标优化推荐
Pub Date : 2014-11-11 DOI: 10.4108/ICST.COLLABORATECOM.2014.257382
Makbule Gülçin Özsoy, Faruk Polat, R. Alhajj
Social networks, personal blog pages, on-line transaction web-sites, expertise web pages and location based social networks provide an attractive platform for millions of users to share opinions, comments, ratings, etc. Having this kind of diverse and comprehensive information leads to difficulties for users to reach the most appropriate and reliable conclusions. Recommendation systems form one of the solutions to deal with the information overload problem by providing personalized services. Using spatial, temporal and social information on recommender systems is a recent trend that increases the performance. Also, taking into account more than one criterion can improve the performance of the recommender systems. In this paper, a location and social network aware recommender system enhanced with multi objective filtering is proposed and described. The results show that the proposed method reaches high coverage while preserving precision. Besides, the proposed method is not affected by the range of ratings and provides persistent results in different settings.
社交网络、个人博客页面、在线交易网站、专业网页和基于位置的社交网络为数百万用户提供了一个有吸引力的平台来分享意见、评论、评级等。拥有这种多样化和全面的信息导致用户难以得出最合适和最可靠的结论。推荐系统通过提供个性化的服务,是解决信息过载问题的解决方案之一。在推荐系统中使用空间、时间和社会信息是提高性能的最新趋势。此外,考虑多个标准可以提高推荐系统的性能。本文提出并描述了一种基于多目标过滤的位置感知和社交网络感知推荐系统。结果表明,该方法在保持精度的前提下达到了较高的覆盖率。此外,该方法不受评级范围的影响,并在不同设置下提供持久的结果。
{"title":"Multi-objective optimization based location and social network aware recommendation","authors":"Makbule Gülçin Özsoy, Faruk Polat, R. Alhajj","doi":"10.4108/ICST.COLLABORATECOM.2014.257382","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257382","url":null,"abstract":"Social networks, personal blog pages, on-line transaction web-sites, expertise web pages and location based social networks provide an attractive platform for millions of users to share opinions, comments, ratings, etc. Having this kind of diverse and comprehensive information leads to difficulties for users to reach the most appropriate and reliable conclusions. Recommendation systems form one of the solutions to deal with the information overload problem by providing personalized services. Using spatial, temporal and social information on recommender systems is a recent trend that increases the performance. Also, taking into account more than one criterion can improve the performance of the recommender systems. In this paper, a location and social network aware recommender system enhanced with multi objective filtering is proposed and described. The results show that the proposed method reaches high coverage while preserving precision. Besides, the proposed method is not affected by the range of ratings and provides persistent results in different settings.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1