首页 > 最新文献

10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing最新文献

英文 中文
Discovering and analyzing deviant communities: Methods and experiments 发现和分析离经叛道的社区:方法和实验
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257262
Napoleon Paxton, Dae-il Jang, I. S. Moskowitz, Gail-Joon Ahn, S. Russell
Botnets continue to threaten the security landscape of computer networks worldwide. This is due in part to the time lag present between discovery of botnet traffic and identification of actionable intelligence derived from the traffic analysis. In this article we present a novel method to fill such a gap by segmenting botnet traffic into communities and identifying the category of each community member. This information can be used to identify attack members (bot nodes), command and control members (Command and Control nodes), botnet controller members (botmaster nodes), and victim members (victim nodes). All of which can be used immediately in forensics or in defense of future attacks. The true novelty of our approach is the segmentation of the malicious network data into relational communities and not just spatially based clusters. The relational nature of the communities allows us to discover the community roles without a deep analysis of the entire network. We discuss the feasibility and practicality of our method through experiments with real-world botnet traffic. Our experimental results show a high detection rate with a low false positive rate, which gives encouragement that our approach can be a valuable addition to a defense in depth strategy.
僵尸网络继续威胁着全球计算机网络的安全格局。这部分是由于从流量分析中发现僵尸网络流量和识别可操作情报之间存在时间滞后。在本文中,我们提出了一种新的方法,通过将僵尸网络流量分割到社区并识别每个社区成员的类别来填补这一空白。此信息可用于识别攻击成员(僵尸节点)、命令和控制成员(命令和控制节点)、僵尸网络控制器成员(僵尸主节点)和受害者成员(受害者节点)。所有这些都可以立即用于取证或防御未来的攻击。我们的方法的真正新颖之处在于将恶意网络数据分割成关系社区,而不仅仅是基于空间的集群。社区的关系性质使我们无需对整个网络进行深入分析就能发现社区角色。通过对真实僵尸网络流量的实验,讨论了该方法的可行性和实用性。我们的实验结果显示了高检测率和低假阳性率,这鼓励了我们的方法可以成为深度防御策略的一个有价值的补充。
{"title":"Discovering and analyzing deviant communities: Methods and experiments","authors":"Napoleon Paxton, Dae-il Jang, I. S. Moskowitz, Gail-Joon Ahn, S. Russell","doi":"10.4108/ICST.COLLABORATECOM.2014.257262","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257262","url":null,"abstract":"Botnets continue to threaten the security landscape of computer networks worldwide. This is due in part to the time lag present between discovery of botnet traffic and identification of actionable intelligence derived from the traffic analysis. In this article we present a novel method to fill such a gap by segmenting botnet traffic into communities and identifying the category of each community member. This information can be used to identify attack members (bot nodes), command and control members (Command and Control nodes), botnet controller members (botmaster nodes), and victim members (victim nodes). All of which can be used immediately in forensics or in defense of future attacks. The true novelty of our approach is the segmentation of the malicious network data into relational communities and not just spatially based clusters. The relational nature of the communities allows us to discover the community roles without a deep analysis of the entire network. We discuss the feasibility and practicality of our method through experiments with real-world botnet traffic. Our experimental results show a high detection rate with a low false positive rate, which gives encouragement that our approach can be a valuable addition to a defense in depth strategy.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"2012 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133272462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clusters 以顶点为中心的图处理集群中计算和通信权衡的性能建模
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257474
Amir Abdolrashidi, Lakshmish Ramaswamy, David S. Narron
Distributed vertex-centric graph processing systems have been recently proposed to perform different types of analytics on large graphs. These systems utilize the parallelism of shared nothing clusters. In this work we propose a novel model for the performance cost of such clusters.We also define novel metrics related to the workload balance and network communication cost of clusters processing massive real graph datasets. We empirically investigate the effects of different graph partitioning mechanisms and their tradeoff for two different categories of graph processing algorithms.
分布式以顶点为中心的图处理系统最近被提出用于对大型图执行不同类型的分析。这些系统利用无共享集群的并行性。在这项工作中,我们提出了这种集群的性能成本的新模型。我们还定义了与处理大量真实图数据集的集群的工作负载平衡和网络通信成本相关的新指标。我们实证研究了不同的图划分机制的影响及其对两种不同类别的图处理算法的权衡。
{"title":"Performance modeling of computation and communication tradeoffs in vertex-centric graph processing clusters","authors":"Amir Abdolrashidi, Lakshmish Ramaswamy, David S. Narron","doi":"10.4108/ICST.COLLABORATECOM.2014.257474","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257474","url":null,"abstract":"Distributed vertex-centric graph processing systems have been recently proposed to perform different types of analytics on large graphs. These systems utilize the parallelism of shared nothing clusters. In this work we propose a novel model for the performance cost of such clusters.We also define novel metrics related to the workload balance and network communication cost of clusters processing massive real graph datasets. We empirically investigate the effects of different graph partitioning mechanisms and their tradeoff for two different categories of graph processing algorithms.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126452564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Model for collaborative and adaptive multimedia content delivery in a collaborative m-learning environment 协作式移动学习环境下的协作和自适应多媒体内容交付模型
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257231
Aleksandar Karadimce, D. Davcev
Smart mobile devices are already used for everyday communication between people. They have become ubiquitous devices for receiving and sharing important information, but they poses limited capability of storing and processing multimedia content. Considering that mobile devices will always have these mentioned limitations, the proposed solution is to use collaborative, adaptive multimedia content delivery and the cloud computing technology. In order to gain increased perception of quality of m-learning systems, the proposed model delivers three services for selection, transcoding and authoring multimedia content, which should be hosted by SaaS cloud computing model. The proposed model for collaborative and adaptive multimedia content delivery will provide the mobile learners with cloud-based services. These services will facilitate the delivery of the preferred multimedia content across heterogeneous network to various types of mobile devices that learners are using. The advantage of the proposed framework is proved by using a sample mobile application for our case study, which estimates the operation of the service for multimedia content selection and authoring service.
智能移动设备已经用于人与人之间的日常交流。它们已经成为接收和共享重要信息的无处不在的设备,但它们的存储和处理多媒体内容的能力有限。考虑到移动设备总是有这些限制,建议的解决方案是使用协作的、自适应的多媒体内容交付和云计算技术。为了提高对移动学习系统质量的感知,所提出的模型提供了选择、转码和创作多媒体内容的三种服务,这些服务应该由SaaS云计算模型托管。提出的协作和自适应多媒体内容交付模型将为移动学习者提供基于云的服务。这些服务将促进跨异构网络向学习者使用的各种类型的移动设备传送首选的多媒体内容。本文以一个移动应用程序为例,对多媒体内容选择和创作服务的运行情况进行了评估,证明了该框架的优势。
{"title":"Model for collaborative and adaptive multimedia content delivery in a collaborative m-learning environment","authors":"Aleksandar Karadimce, D. Davcev","doi":"10.4108/ICST.COLLABORATECOM.2014.257231","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257231","url":null,"abstract":"Smart mobile devices are already used for everyday communication between people. They have become ubiquitous devices for receiving and sharing important information, but they poses limited capability of storing and processing multimedia content. Considering that mobile devices will always have these mentioned limitations, the proposed solution is to use collaborative, adaptive multimedia content delivery and the cloud computing technology. In order to gain increased perception of quality of m-learning systems, the proposed model delivers three services for selection, transcoding and authoring multimedia content, which should be hosted by SaaS cloud computing model. The proposed model for collaborative and adaptive multimedia content delivery will provide the mobile learners with cloud-based services. These services will facilitate the delivery of the preferred multimedia content across heterogeneous network to various types of mobile devices that learners are using. The advantage of the proposed framework is proved by using a sample mobile application for our case study, which estimates the operation of the service for multimedia content selection and authoring service.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125355273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Direct transmission vs relay transmission for information dissemination in a MANet: an analytical study MANet中信息传播的直接传输与中继传输:分析研究
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257313
S. Chaumette, Jonathan Ouoba
It is acknowledged that in a mobile environment the wireless technologies that are available at each node can be exploited so as to achieve efficient peer-to-peer communications. Therefore we have developed a multilevel platform the goal of which is to allow a set of mobile terminals to securely communicate in a peer-to-peer manner by using the most appropriate available technology according to the context at hand. The scenario that we have chosen to focus on targets information sharing for collaboration purpose between the mobile nodes of the network. The study of this scenario led us to identify the main operations that are required to achieve it, the central process being the publication of profiles. This operation is meant to allow a node to publish a description (that we call a profile) of the information it is willing to share with the other nodes. Two approaches, direct transmission and relay transmission, are considered so that the publication of profiles can be performed in the most efficient way (according to the available communication technologies and the dynamics of the network). In this paper, we first present the target environments that we consider and the approach that we have chosen to implement in our multilevel platform. We then focus on the publication of profiles and we highlight the two transmission modes (direct transmission and relay transmission) that we have chosen to consider. We analytically study and compare them in terms of the probability to successfully deliver a given message in the target context defined above. We conclude with future research directions.
人们承认,在移动环境中,可以利用在每个节点上可用的无线技术,以便实现有效的点对点通信。因此,我们开发了一个多层平台,其目标是允许一组移动终端根据手头的上下文使用最合适的可用技术,以点对点的方式安全地通信。我们选择关注的场景目标是在网络的移动节点之间共享用于协作的信息。对该场景的研究使我们确定了实现该场景所需的主要操作,中心过程是概要文件的发布。此操作旨在允许节点发布其愿意与其他节点共享的信息的描述(我们称之为概要文件)。考虑了两种方法,直接传输和中继传输,以便以最有效的方式(根据可用的通信技术和网络动态)执行概要文件的发布。在本文中,我们首先介绍了我们考虑的目标环境以及我们选择在多层平台中实现的方法。然后,我们将重点放在概要文件的发布上,并重点介绍我们选择考虑的两种传输模式(直接传输和中继传输)。我们根据在上面定义的目标上下文中成功传递给定消息的概率对它们进行分析研究和比较。最后展望了未来的研究方向。
{"title":"Direct transmission vs relay transmission for information dissemination in a MANet: an analytical study","authors":"S. Chaumette, Jonathan Ouoba","doi":"10.4108/ICST.COLLABORATECOM.2014.257313","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257313","url":null,"abstract":"It is acknowledged that in a mobile environment the wireless technologies that are available at each node can be exploited so as to achieve efficient peer-to-peer communications. Therefore we have developed a multilevel platform the goal of which is to allow a set of mobile terminals to securely communicate in a peer-to-peer manner by using the most appropriate available technology according to the context at hand. The scenario that we have chosen to focus on targets information sharing for collaboration purpose between the mobile nodes of the network. The study of this scenario led us to identify the main operations that are required to achieve it, the central process being the publication of profiles. This operation is meant to allow a node to publish a description (that we call a profile) of the information it is willing to share with the other nodes. Two approaches, direct transmission and relay transmission, are considered so that the publication of profiles can be performed in the most efficient way (according to the available communication technologies and the dynamics of the network). In this paper, we first present the target environments that we consider and the approach that we have chosen to implement in our multilevel platform. We then focus on the publication of profiles and we highlight the two transmission modes (direct transmission and relay transmission) that we have chosen to consider. We analytically study and compare them in terms of the probability to successfully deliver a given message in the target context defined above. We conclude with future research directions.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Automatic mapping rules and OWL ontology extraction for the OBDA Ontop OBDA Ontop的自动映射规则和OWL本体提取
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257493
Fayez Khazalah, Zaki Malik, A. Rezgui
Extracting Ontop mapping rules and OWL ontology manually from a relational schema is a tedious task. We present an automatic approach for extracting Ontop mappings and OWL ontology from an existing database schema. The end users can access the underlying data source through SPARQL queries. A SPARQL query is written according to the extracted ontology and the end user does not need to know about the underlying data source and its schema. The proposed approach takes into consideration the different relationships between entities of the database schema. Instead of extracting a flat ontology that is an exact copy of the database schema, it extracts a rich ontology. The extracted ontology can also be used as an intermediate between a domain ontology and the underlying database schema. The experiment results indicate that the extracted mappings and ontology are accurate. i.e., end users can query all data (using SPARQL) from the underlying database source in the same way as if they have written SQL queries.
从关系模式中手动提取Ontop映射规则和OWL本体是一项繁琐的任务。我们提出了一种从现有数据库模式中自动提取Ontop映射和OWL本体的方法。最终用户可以通过SPARQL查询访问底层数据源。SPARQL查询是根据提取的本体编写的,最终用户不需要知道底层数据源及其模式。所建议的方法考虑了数据库模式实体之间的不同关系。它不是提取与数据库模式完全相同的平面本体,而是提取丰富的本体。提取的本体还可以用作领域本体和底层数据库模式之间的中介。实验结果表明,所提取的映射和本体是准确的。也就是说,终端用户可以以与编写SQL查询相同的方式(使用SPARQL)从底层数据库源查询所有数据。
{"title":"Automatic mapping rules and OWL ontology extraction for the OBDA Ontop","authors":"Fayez Khazalah, Zaki Malik, A. Rezgui","doi":"10.4108/ICST.COLLABORATECOM.2014.257493","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257493","url":null,"abstract":"Extracting Ontop mapping rules and OWL ontology manually from a relational schema is a tedious task. We present an automatic approach for extracting Ontop mappings and OWL ontology from an existing database schema. The end users can access the underlying data source through SPARQL queries. A SPARQL query is written according to the extracted ontology and the end user does not need to know about the underlying data source and its schema. The proposed approach takes into consideration the different relationships between entities of the database schema. Instead of extracting a flat ontology that is an exact copy of the database schema, it extracts a rich ontology. The extracted ontology can also be used as an intermediate between a domain ontology and the underlying database schema. The experiment results indicate that the extracted mappings and ontology are accurate. i.e., end users can query all data (using SPARQL) from the underlying database source in the same way as if they have written SQL queries.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A collaboration model for community-based Software Development with social machines 基于社会机器的基于社区的软件开发协作模型
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257245
Dave Murray-Rust, Ognjen Scekic, P. Papapanagiotou, Hong Linh Truong, D. Robertson, S. Dustdar
Today's crowdsourcing systems are predominantly used for processing independent tasks with simplistic coordination. As such, they offer limited support for handling complex, intellectually and organizationally challenging labour types, such as software development. In order to support crowdsourcing of the software development processes, the system needs to enact coordination mechanisms which integrate human creativity with machine support. While workflows can be used to handle highly-structured and predictable labour processes, they are less suitable for software development methodologies where unpredictability is an unavoidable part the process. This is especially true in phases of requirement elicitation and feature development, when both the client and development communities change with time. In this paper we present models and techniques for coordination of human workers in crowdsourced software development environments. The techniques augment the existing Social Compute Unit (SCU) concept-a general framework for management of ad-hoc human worker teams-with versatile coordination protocols expressed in the Lightweight Social Calculus (LSC). This approach allows us to combine coordination and quality constraints with dynamic assessments of software-user's desires, while dynamically choosing appropriate software development coordination models.
今天的众包系统主要用于处理简单协调的独立任务。因此,它们为处理复杂的、智力上和组织上具有挑战性的劳动类型(例如软件开发)提供有限的支持。为了支持软件开发过程的众包,系统需要制定协调机制,将人类的创造力与机器的支持结合起来。虽然工作流可以用于处理高度结构化和可预测的劳动过程,但它们不太适合软件开发方法,因为不可预测性是过程中不可避免的一部分。在需求引出和特性开发阶段尤其如此,因为客户和开发社区都随着时间而变化。在本文中,我们提出了在众包软件开发环境中协调人类工作者的模型和技术。这些技术通过轻量级社会演算(Lightweight Social Calculus, LSC)中表达的通用协调协议,增强了现有的社会计算单元(Social Compute Unit, SCU)概念——一种用于管理临时人力团队的通用框架。这种方法允许我们将协调和质量约束与软件用户需求的动态评估结合起来,同时动态地选择合适的软件开发协调模型。
{"title":"A collaboration model for community-based Software Development with social machines","authors":"Dave Murray-Rust, Ognjen Scekic, P. Papapanagiotou, Hong Linh Truong, D. Robertson, S. Dustdar","doi":"10.4108/ICST.COLLABORATECOM.2014.257245","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257245","url":null,"abstract":"Today's crowdsourcing systems are predominantly used for processing independent tasks with simplistic coordination. As such, they offer limited support for handling complex, intellectually and organizationally challenging labour types, such as software development. In order to support crowdsourcing of the software development processes, the system needs to enact coordination mechanisms which integrate human creativity with machine support. While workflows can be used to handle highly-structured and predictable labour processes, they are less suitable for software development methodologies where unpredictability is an unavoidable part the process. This is especially true in phases of requirement elicitation and feature development, when both the client and development communities change with time. In this paper we present models and techniques for coordination of human workers in crowdsourced software development environments. The techniques augment the existing Social Compute Unit (SCU) concept-a general framework for management of ad-hoc human worker teams-with versatile coordination protocols expressed in the Lightweight Social Calculus (LSC). This approach allows us to combine coordination and quality constraints with dynamic assessments of software-user's desires, while dynamically choosing appropriate software development coordination models.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133960558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Influencing data availability in IoT enabled cloud based e-health in a 30 day readmission context 在30天的再入院环境中影响基于物联网的云电子医疗中的数据可用性
Pub Date : 2014-10-01 DOI: 10.4108/ICST.COLLABORATECOM.2014.257621
Rajesh Vargheese, Y. Viniotis
The US healthcare Affordable Care Act established the 30 day readmission protection program as one of the base lines of measuring quality of care at hospitals and post discharge. With reduced payment penalties for hospitals with excessive readmissions, hospitals have increased their focus on managing post discharge care. With the emphasis on prevention and proactive care, integrated approaches that have the ability to collect relevant data from patients, process it efficiently and timely and predict risk patterns in advance and enable seamless collaboration between the patients and the care team is required. This allows care teams to proactively manage the care of the patient and limit complications and readmissions. Internet of things enabled collaborative cloud based e-health is evolving as one of the key transformation approaches in helping to address the 30 day readmission avoidance efforts. While the sensors provide critical data, there are significant constraints in terms of processing, power, storage and overall context. The power and capabilities of the cloud can augment the local visibility of sensors by providing capabilities that the sensors lack. In this work, we define these capabilities as the five P's: Provisioning, Policy Management, Processing, Protection and Prediction. We argue that by bringing these elements together, the e-health architecture is able to take the data from sensors securely and transfer it to the cloud and generate insights and actions that help improve healthcare outcomes in a timely manner. The Cloud management plays a critical role in ensuring the integrity and availability of vital information. The blind spots in the unavailability of data or compromised data can result in missed opportunities for proactive care; ours proposed architecture ensures data availability, processing availability and integrity and thus is very important in a 30 day readmission context.
美国《平价医疗法案》将30天再入院保护计划作为衡量医院和出院后护理质量的基准之一。随着对过度再入院的医院的罚款减少,医院增加了对出院后护理的管理。在强调预防和主动护理的情况下,需要能够从患者那里收集相关数据,有效及时地处理数据,提前预测风险模式,并实现患者和护理团队之间无缝协作的综合方法。这使得护理团队能够主动管理患者的护理,并限制并发症和再入院。基于物联网的基于协作云的电子医疗正在发展成为帮助解决30天再入院问题的关键转型方法之一。虽然传感器提供关键数据,但在处理、功率、存储和整体环境方面存在重大限制。云的强大功能可以通过提供传感器所缺乏的功能来增强传感器的本地可见性。在这项工作中,我们将这些功能定义为五个P:供应(Provisioning)、策略管理(Policy Management)、处理(Processing)、保护(Protection)和预测(Prediction)。我们认为,通过将这些元素结合在一起,电子医疗体系结构能够安全地从传感器获取数据并将其传输到云端,并生成有助于及时改善医疗保健结果的见解和行动。云管理在确保重要信息的完整性和可用性方面起着至关重要的作用。无法获得数据或数据泄露的盲点可能导致错失主动护理的机会;我们提出的架构确保了数据的可用性、处理的可用性和完整性,因此在30天的重新申请环境中非常重要。
{"title":"Influencing data availability in IoT enabled cloud based e-health in a 30 day readmission context","authors":"Rajesh Vargheese, Y. Viniotis","doi":"10.4108/ICST.COLLABORATECOM.2014.257621","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257621","url":null,"abstract":"The US healthcare Affordable Care Act established the 30 day readmission protection program as one of the base lines of measuring quality of care at hospitals and post discharge. With reduced payment penalties for hospitals with excessive readmissions, hospitals have increased their focus on managing post discharge care. With the emphasis on prevention and proactive care, integrated approaches that have the ability to collect relevant data from patients, process it efficiently and timely and predict risk patterns in advance and enable seamless collaboration between the patients and the care team is required. This allows care teams to proactively manage the care of the patient and limit complications and readmissions. Internet of things enabled collaborative cloud based e-health is evolving as one of the key transformation approaches in helping to address the 30 day readmission avoidance efforts. While the sensors provide critical data, there are significant constraints in terms of processing, power, storage and overall context. The power and capabilities of the cloud can augment the local visibility of sensors by providing capabilities that the sensors lack. In this work, we define these capabilities as the five P's: Provisioning, Policy Management, Processing, Protection and Prediction. We argue that by bringing these elements together, the e-health architecture is able to take the data from sensors securely and transfer it to the cloud and generate insights and actions that help improve healthcare outcomes in a timely manner. The Cloud management plays a critical role in ensuring the integrity and availability of vital information. The blind spots in the unavailability of data or compromised data can result in missed opportunities for proactive care; ours proposed architecture ensures data availability, processing availability and integrity and thus is very important in a 30 day readmission context.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124553821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Establishing global policies over decentralized online social networks 在分散的在线社交网络上建立全球政策
Pub Date : 2014-04-07 DOI: 10.4108/ICST.COLLABORATECOM.2014.257584
Zhe Wang, N. Minsky
Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members. These concerns prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host; providing access to it to other members of the OSN according to its own access-control policy. Unfortunately all existing DOSN projects have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy. We adopt the decentralization idea underlying DOSNs, complementing it with a means for specifying and enforcing a wide range of policies over the membership of a social community, and over the interaction between its disparate distributed members. And we do so in a scalable fashion.
传统的在线社交网络(online social network, osn)采用集中式的实现方式。虽然集中化是实现osn的一种方便方法,但它有几个众所周知的缺点。其中主要是对OSN所维护的信息的安全性和隐私性构成的风险;以及对个人成员提供的信息失去控制。这些担忧促使人们尝试创建分散的osn (dosn)。这些尝试背后的基本思想是,社交网络的每个成员都将自己的数据置于自己的控制之下,而不是将其交给中央主机;根据自己的访问控制策略,向OSN的其他成员提供访问权限。不幸的是,所有现有的DOSN项目都有非常严重的限制。也就是说,它们不能使DOSN的成员以及成员之间的交互服从任何全局策略。我们采用了dosn基础上的去中心化思想,并用一种方法对社会社区的成员以及不同的分布式成员之间的交互指定和执行广泛的策略来补充它。我们以一种可扩展的方式这样做。
{"title":"Establishing global policies over decentralized online social networks","authors":"Zhe Wang, N. Minsky","doi":"10.4108/ICST.COLLABORATECOM.2014.257584","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2014.257584","url":null,"abstract":"Conventional online social networks (OSNs) are implemented in a centralized manner. Although centralization is a convenient way for implementing OSNs, it has several well known drawbacks. Chief among them are the risks they pose to the security and privacy of the information maintained by the OSN; and the loss of control over the information contributed by individual members. These concerns prompted several attempts to create decentralized OSNs, or DOSNs. The basic idea underlying these attempts, is that each member of a social network keeps its data under its own control, instead of surrendering it to a central host; providing access to it to other members of the OSN according to its own access-control policy. Unfortunately all existing DOSN projects have a very serious limitation. Namely, they are unable to subject the membership of a DOSN, and the interaction between its members, to any global policy. We adopt the decentralization idea underlying DOSNs, complementing it with a means for specifying and enforcing a wide range of policies over the membership of a social community, and over the interaction between its disparate distributed members. And we do so in a scalable fashion.","PeriodicalId":432345,"journal":{"name":"10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-04-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129875910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1