首页 > 最新文献

2012 Tenth Annual International Conference on Privacy, Security and Trust最新文献

英文 中文
Visualization of processes in self-learning systems 自学习系统中过程的可视化
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297953
G. Peters, K. Bunte, M. Strickert, Michael Biehl, T. Villmann
One aspect of self-organizing systems is their desired ability to be self-learning, i.e., to be able to adapt dynamically to conditions in their environment. This quality is awkward especially if it comes to applications in security or safety-sensitive areas. Here a step towards more trustful systems could be taken by providing transparency of the processes of a system. An important means of giving feedback to an operator is the visualization of the internal processes of a system. In this position paper we address the problem of visualizing dynamic processes especially in self-learning systems. We take an existing self-learning system from the field of computer vision as an example from which we derive questions of general interest such as possible options to visualize the flow of information in a dynamic learning system or the visualization of symbolic data. As a side effect the visualization of learning processes may provide a better understanding of underlying principles of learning in general, i.e, also in biological systems. That may also facilitate improved designs of future self-learning systems.
自组织系统的一个方面是它们期望的自我学习能力,即能够动态地适应环境中的条件。这种质量是尴尬的,特别是当它涉及到安全或安全敏感领域的应用程序。在这方面,可以通过提供系统过程的透明度,向更可信的系统迈出一步。向操作员提供反馈的一个重要手段是系统内部过程的可视化。在这篇立场文件中,我们讨论了可视化动态过程的问题,特别是在自学习系统中。我们以计算机视觉领域的一个现有的自学习系统为例,从中我们得出了一些普遍感兴趣的问题,例如在动态学习系统中可视化信息流的可能选项或符号数据的可视化。作为一个副作用,学习过程的可视化可以提供对一般学习的基本原理的更好理解,也就是在生物系统中。这也可能有助于改进未来自主学习系统的设计。
{"title":"Visualization of processes in self-learning systems","authors":"G. Peters, K. Bunte, M. Strickert, Michael Biehl, T. Villmann","doi":"10.1109/PST.2012.6297953","DOIUrl":"https://doi.org/10.1109/PST.2012.6297953","url":null,"abstract":"One aspect of self-organizing systems is their desired ability to be self-learning, i.e., to be able to adapt dynamically to conditions in their environment. This quality is awkward especially if it comes to applications in security or safety-sensitive areas. Here a step towards more trustful systems could be taken by providing transparency of the processes of a system. An important means of giving feedback to an operator is the visualization of the internal processes of a system. In this position paper we address the problem of visualizing dynamic processes especially in self-learning systems. We take an existing self-learning system from the field of computer vision as an example from which we derive questions of general interest such as possible options to visualize the flow of information in a dynamic learning system or the visualization of symbolic data. As a side effect the visualization of learning processes may provide a better understanding of underlying principles of learning in general, i.e, also in biological systems. That may also facilitate improved designs of future self-learning systems.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133664278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Using Trust to reduce wasteful computation in open Desktop Grid Systems 利用信任减少开放式桌面网格系统中的浪费计算
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297954
Lukas Klejnowski, Yvonne Bernard, C. Müller-Schloer, J. Hähner
In this paper we present an open multi-agent based Desktop Grid System that improves the performance of cooperative clients while decreasing the performance of non-cooperative clients as an incentive for good conduct. This is achieved by trust-based job client and worker algorithms that take into account the local and global history of the credibility and reliability experiences between agents, as well as their current state. We show with simulation results that the algorithms provide performance increases by applying standard Desktop Grid performance metrics and evaluating the system in several scenarios with a varying number of disturbances to the system. In this paper, we focus on the task of minimising wasteful computation and thus increasing the benefit of grid participation for the agents.
在本文中,我们提出了一个开放的基于多智能体的桌面网格系统,该系统提高了合作客户端的性能,同时降低了非合作客户端的性能,作为对良好行为的激励。这是通过基于信任的工作客户端和工人算法实现的,这些算法考虑了代理之间的可信度和可靠性经验的本地和全局历史,以及它们的当前状态。我们通过仿真结果表明,通过应用标准桌面网格性能指标并在系统受到不同数量干扰的几种情况下评估系统,这些算法提供了性能提升。在本文中,我们关注最小化浪费计算的任务,从而增加代理参与网格的利益。
{"title":"Using Trust to reduce wasteful computation in open Desktop Grid Systems","authors":"Lukas Klejnowski, Yvonne Bernard, C. Müller-Schloer, J. Hähner","doi":"10.1109/PST.2012.6297954","DOIUrl":"https://doi.org/10.1109/PST.2012.6297954","url":null,"abstract":"In this paper we present an open multi-agent based Desktop Grid System that improves the performance of cooperative clients while decreasing the performance of non-cooperative clients as an incentive for good conduct. This is achieved by trust-based job client and worker algorithms that take into account the local and global history of the credibility and reliability experiences between agents, as well as their current state. We show with simulation results that the algorithms provide performance increases by applying standard Desktop Grid performance metrics and evaluating the system in several scenarios with a varying number of disturbances to the system. In this paper, we focus on the task of minimising wasteful computation and thus increasing the benefit of grid participation for the agents.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129017545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring re-identification risks in public domains 探索公共领域的重新识别风险
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297917
Aditi Ramachandran, L. Singh, E. Porter, F. Nagle
While re-identification of sensitive data has been studied extensively, with the emergence of online social networks and the popularity of digital communications, the ability to use public data for re-identification has increased. This work begins by presenting two different cases studies for sensitive data re-identification. We conclude that targeted re-identification using traditional variables is not only possible, but fairly straightforward given the large amount of public data available. However, our first case study also indicates that large-scale re-identification is less likely. We then consider methods for agencies such as the Census Bureau to identify variables that cause individuals to be vulnerable without testing all combinations of variables. We show the effectiveness of different strategies on a Census Bureau data set and on a synthetic data set.
虽然对敏感数据的重新识别已经进行了广泛的研究,但随着在线社交网络的出现和数字通信的普及,使用公共数据进行重新识别的能力已经增加。这项工作首先介绍了敏感数据重新识别的两个不同案例研究。我们的结论是,使用传统变量进行有针对性的重新识别不仅是可能的,而且考虑到大量可用的公共数据,这是相当直接的。然而,我们的第一个案例研究也表明,大规模重新识别是不太可能的。然后,我们考虑人口普查局等机构在不测试所有变量组合的情况下识别导致个人易受伤害的变量的方法。我们展示了不同策略在人口普查局数据集和合成数据集上的有效性。
{"title":"Exploring re-identification risks in public domains","authors":"Aditi Ramachandran, L. Singh, E. Porter, F. Nagle","doi":"10.1109/PST.2012.6297917","DOIUrl":"https://doi.org/10.1109/PST.2012.6297917","url":null,"abstract":"While re-identification of sensitive data has been studied extensively, with the emergence of online social networks and the popularity of digital communications, the ability to use public data for re-identification has increased. This work begins by presenting two different cases studies for sensitive data re-identification. We conclude that targeted re-identification using traditional variables is not only possible, but fairly straightforward given the large amount of public data available. However, our first case study also indicates that large-scale re-identification is less likely. We then consider methods for agencies such as the Census Bureau to identify variables that cause individuals to be vulnerable without testing all combinations of variables. We show the effectiveness of different strategies on a Census Bureau data set and on a synthetic data set.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"261 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116821383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Towards a BPEL model-driven approach for Web services security 为Web服务安全性提供BPEL模型驱动的方法
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297928
Hanine Tout, A. Mourad, H. Yahyaoui, C. Talhi, H. Otrok
By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure environment for Web services composition. The key solution cannot be seen as a simple embed of security properties in the source code of the business logic since the dynamism of the BPEL process will be affected when the security measures get updated. In this context, several approaches have emerged to tackle such issue by offering the ability to specify the security properties independently from the business logic based on policy languages. Nevertheless, these languages are complex, verbose and require programming expertise. Owing to these difficulties, specifying and the enforcing BPEL security policies become very tedious tasks. To mitigate these challenges, we propose in this paper, a novel approach that takes advantage of both the Unified Modeling Language (UML) and the Aspect Oriented Paradigm (AOP). By elaborating a UML extension mechanism, called UML Profile, our approach provides the users with model-based capabilities to specify aspects that enforce the required security policies. On the other hand, it offers a high level of flexibility when enforcing security hardening solutions in the BPEL process by exploiting the AOP approach. We illustrate our approach through an example of the dynamic generation and integration of model-based security aspects in a BPEL process.
通过处理Web服务的编排、组合和交互,业务流程执行语言(BPEL)获得了极大的关注。然而,这种基于过程的语言并不能保证Web服务组合的安全环境。关键解决方案不能被看作是在业务逻辑的源代码中简单地嵌入安全属性,因为当安全措施得到更新时,BPEL流程的动态性将受到影响。在这种情况下,出现了几种解决此类问题的方法,它们提供了基于策略语言独立于业务逻辑指定安全属性的能力。然而,这些语言复杂、冗长,需要编程专业知识。由于这些困难,指定和实施BPEL安全策略成为非常繁琐的任务。为了减轻这些挑战,我们在本文中提出了一种利用统一建模语言(UML)和面向方面范式(AOP)的新方法。通过细化UML扩展机制(称为UML Profile),我们的方法为用户提供了基于模型的功能,以指定执行所需安全策略的方面。另一方面,在利用AOP方法在BPEL流程中实施安全强化解决方案时,它提供了高度的灵活性。我们通过一个BPEL流程中基于模型的安全方面的动态生成和集成示例来说明我们的方法。
{"title":"Towards a BPEL model-driven approach for Web services security","authors":"Hanine Tout, A. Mourad, H. Yahyaoui, C. Talhi, H. Otrok","doi":"10.1109/PST.2012.6297928","DOIUrl":"https://doi.org/10.1109/PST.2012.6297928","url":null,"abstract":"By handling the orchestration, composition and interaction of Web services, the Business Process Execution Language (BPEL) has gained tremendous interest. However, such process-based language does not assure a secure environment for Web services composition. The key solution cannot be seen as a simple embed of security properties in the source code of the business logic since the dynamism of the BPEL process will be affected when the security measures get updated. In this context, several approaches have emerged to tackle such issue by offering the ability to specify the security properties independently from the business logic based on policy languages. Nevertheless, these languages are complex, verbose and require programming expertise. Owing to these difficulties, specifying and the enforcing BPEL security policies become very tedious tasks. To mitigate these challenges, we propose in this paper, a novel approach that takes advantage of both the Unified Modeling Language (UML) and the Aspect Oriented Paradigm (AOP). By elaborating a UML extension mechanism, called UML Profile, our approach provides the users with model-based capabilities to specify aspects that enforce the required security policies. On the other hand, it offers a high level of flexibility when enforcing security hardening solutions in the BPEL process by exploiting the AOP approach. We illustrate our approach through an example of the dynamic generation and integration of model-based security aspects in a BPEL process.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129634223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Privacy invasion in business environments 商业环境中的隐私侵犯
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297944
Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur
It is not uncommon for business managers to use recent innovations in information and communications technology to monitor employees and job candidates. These methods not only rely on heavy surveillance during working hours of employees but can also be applied outside their professional environment, to impinge on their personal lives. Surveillance techniques encompass such traditional means like recording cameras to more recent methods including analyzing social networks pages, performing extensive web searches and dealing with online data brokers. While monitoring initiatives set up by employers can have benefits for companies, the threat to privacy they entail can deteriorate the mental and physical health of employees and have a negative impact on the quality of relationship between colleagues. Businesses have a social responsibility and need to ensure that their behavior does not infringe upon their employee's rights to privacy. In this non-technical paper, we discuss some online approaches adopted by companies regarding employee surveillance. We elaborate on various methods employed by managers to monitor their employees and gain as much information as possible on job candidates. Then, these techniques are further discussed from the standpoint of their moral and legal perspectives with regards to privacy rights.
企业经理使用最新的信息和通信技术创新来监控员工和求职者,这并不罕见。这些方法不仅依赖于员工在工作时间的严密监视,而且还可以应用于他们的专业环境之外,侵犯他们的个人生活。监控技术既包括传统的摄像手段,也包括分析社交网络页面、进行广泛的网络搜索和处理在线数据经纪人等最新手段。虽然雇主设立的监控举措可以给公司带来好处,但它们所带来的对隐私的威胁可能会恶化员工的身心健康,并对同事之间的关系质量产生负面影响。企业有社会责任,需要确保自己的行为不会侵犯员工的隐私权。在这篇非技术论文中,我们讨论了公司在员工监控方面采用的一些在线方法。我们详细阐述了管理者用来监控员工并尽可能多地获取求职者信息的各种方法。然后,从隐私权的道德和法律角度进一步讨论了这些技术。
{"title":"Privacy invasion in business environments","authors":"Manuel Lafond, Pierre-Olivier Brosseau, Esma Aïmeur","doi":"10.1109/PST.2012.6297944","DOIUrl":"https://doi.org/10.1109/PST.2012.6297944","url":null,"abstract":"It is not uncommon for business managers to use recent innovations in information and communications technology to monitor employees and job candidates. These methods not only rely on heavy surveillance during working hours of employees but can also be applied outside their professional environment, to impinge on their personal lives. Surveillance techniques encompass such traditional means like recording cameras to more recent methods including analyzing social networks pages, performing extensive web searches and dealing with online data brokers. While monitoring initiatives set up by employers can have benefits for companies, the threat to privacy they entail can deteriorate the mental and physical health of employees and have a negative impact on the quality of relationship between colleagues. Businesses have a social responsibility and need to ensure that their behavior does not infringe upon their employee's rights to privacy. In this non-technical paper, we discuss some online approaches adopted by companies regarding employee surveillance. We elaborate on various methods employed by managers to monitor their employees and gain as much information as possible on job candidates. Then, these techniques are further discussed from the standpoint of their moral and legal perspectives with regards to privacy rights.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121909166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social secret sharing in cloud computing using a new trust function 基于新信任函数的云计算社会秘密共享
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297936
Mehrdad Nojoumian, Douglas R Stinson
We first review the notion of social secret sharing and its trust function. We then illustrate how this construction can be used in cloud computing to create a self-organizing environment. In fact, we show distributed secure systems using threshold secret sharing can be adjusted automatically based on the resource availability of the cloud providers. Accordingly, we propose a new trust function with social characteristics in order to improve the existing social secret sharing scheme.
我们首先回顾了社会秘密共享的概念及其信任函数。然后,我们将说明如何在云计算中使用此构造来创建自组织环境。实际上,我们展示了使用阈值秘密共享的分布式安全系统可以根据云提供商的资源可用性自动调整。为此,我们提出了一种新的具有社会特征的信任函数,以改进现有的社会秘密共享方案。
{"title":"Social secret sharing in cloud computing using a new trust function","authors":"Mehrdad Nojoumian, Douglas R Stinson","doi":"10.1109/PST.2012.6297936","DOIUrl":"https://doi.org/10.1109/PST.2012.6297936","url":null,"abstract":"We first review the notion of social secret sharing and its trust function. We then illustrate how this construction can be used in cloud computing to create a self-organizing environment. In fact, we show distributed secure systems using threshold secret sharing can be adjusted automatically based on the resource availability of the cloud providers. Accordingly, we propose a new trust function with social characteristics in order to improve the existing social secret sharing scheme.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132875895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A provenance-based access control model 基于来源的访问控制模型
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297930
Jaehong Park, Dang Nguyen, R. Sandhu
Existence of data provenance information in a system raises at least two security-related issues. One is how provenance data can be used to enhance security in the system and the other is how to protect provenance data which might be more sensitive than the data itself. Recent data provenance-related access control literature mainly focuses on the latter issue of protecting provenance data. In this paper, we propose a novel provenance-based access control model that addresses the former objective. Using provenance data for access control to the underlying data facilitates additional capabilities beyond those available in traditional access control models. We utilize a notion of dependency as the key foundation for access control policy specification. Dependency-based policy provides simplicity and effectiveness in policy specification and access control administration. We show our model can support dynamic separation of duty, workflow control, origin-based control, and object versioning. The proposed model identifies essential components and concepts and provides a foundational base model for provenance-based access control. We further discuss possible extensions of the proposed base model for enhanced access controls.
系统中数据来源信息的存在至少会引发两个与安全相关的问题。一个是如何使用来源数据来增强系统的安全性,另一个是如何保护可能比数据本身更敏感的来源数据。最近与数据来源相关的访问控制文献主要关注保护来源数据的后一个问题。在本文中,我们提出了一种新的基于来源的访问控制模型来解决前一个目标。使用来源数据对底层数据进行访问控制,可以促进传统访问控制模型中可用功能之外的其他功能。我们利用依赖关系的概念作为访问控制策略规范的关键基础。基于依赖的策略在策略规范和访问控制管理方面提供了简单性和有效性。我们展示了我们的模型可以支持动态职责分离、工作流控制、基于起源的控制和对象版本控制。提出的模型确定了基本组件和概念,并为基于来源的访问控制提供了基本的基础模型。我们进一步讨论为增强访问控制而提出的基本模型的可能扩展。
{"title":"A provenance-based access control model","authors":"Jaehong Park, Dang Nguyen, R. Sandhu","doi":"10.1109/PST.2012.6297930","DOIUrl":"https://doi.org/10.1109/PST.2012.6297930","url":null,"abstract":"Existence of data provenance information in a system raises at least two security-related issues. One is how provenance data can be used to enhance security in the system and the other is how to protect provenance data which might be more sensitive than the data itself. Recent data provenance-related access control literature mainly focuses on the latter issue of protecting provenance data. In this paper, we propose a novel provenance-based access control model that addresses the former objective. Using provenance data for access control to the underlying data facilitates additional capabilities beyond those available in traditional access control models. We utilize a notion of dependency as the key foundation for access control policy specification. Dependency-based policy provides simplicity and effectiveness in policy specification and access control administration. We show our model can support dynamic separation of duty, workflow control, origin-based control, and object versioning. The proposed model identifies essential components and concepts and provides a foundational base model for provenance-based access control. We further discuss possible extensions of the proposed base model for enhanced access controls.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128260970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Distributive and retributive justice in self-organising electronic institutions 自组织电子制度中的分配正义与报应正义
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297951
J. Pitt
Open computing systems, from sensor networks to Smart-Grids, face the same challenge: a set of autonomous, heterogenous agents, needing to collectivise and distribute resources without a centralised decision-making authority. One possible solution is to collectively agree a set of rules for resource provision and appropriation, but there remains the possibility for some agents not to comply with the rules. Therefore, some notion of “trust” with respect to rule compliance is essential. In this talk, we use a notion of trust stemming from analytic philosophy, whereby “trust” is analysed as a belief that there is a rule and an expectation that someone else's behaviour will conform to the rule, underpinned by a reparation mechanism if it does not. In the context of an electronic institution, whose rules are based on Elinor's Ostrom's principles of enduring institutions for common-pool resource management, we consider how this notion of “trust” can be represented by principles of distributive and retributive justice, and we report some experimental results in self-organisation of the “justice system”.
开放的计算系统,从传感器网络到智能电网,都面临着同样的挑战:一组自主的、异质的代理,需要在没有中央决策权的情况下集中和分配资源。一种可能的解决办法是集体商定一套资源提供和拨款的规则,但仍然存在一些代理不遵守规则的可能性。因此,关于规则遵从的一些“信任”概念是必不可少的。在这次演讲中,我们使用了源于分析哲学的信任概念,即“信任”被分析为一种信念,即存在规则和期望他人的行为将符合规则,如果不符合规则,则以补偿机制为基础。在电子制度的背景下,其规则基于埃莉诺·奥斯特罗姆关于公共资源管理的持久制度原则,我们考虑了这种“信任”的概念如何用分配和报应正义的原则来表示,我们报告了一些“司法系统”自组织的实验结果。
{"title":"Distributive and retributive justice in self-organising electronic institutions","authors":"J. Pitt","doi":"10.1109/PST.2012.6297951","DOIUrl":"https://doi.org/10.1109/PST.2012.6297951","url":null,"abstract":"Open computing systems, from sensor networks to Smart-Grids, face the same challenge: a set of autonomous, heterogenous agents, needing to collectivise and distribute resources without a centralised decision-making authority. One possible solution is to collectively agree a set of rules for resource provision and appropriation, but there remains the possibility for some agents not to comply with the rules. Therefore, some notion of “trust” with respect to rule compliance is essential. In this talk, we use a notion of trust stemming from analytic philosophy, whereby “trust” is analysed as a belief that there is a rule and an expectation that someone else's behaviour will conform to the rule, underpinned by a reparation mechanism if it does not. In the context of an electronic institution, whose rules are based on Elinor's Ostrom's principles of enduring institutions for common-pool resource management, we consider how this notion of “trust” can be represented by principles of distributive and retributive justice, and we report some experimental results in self-organisation of the “justice system”.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126035800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Single-party private web search 单方私人网络搜索
Pub Date : 2012-07-16 DOI: 10.1109/PST.2012.6297913
Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, J. M. Mateo-Sanz
Web search engines profile their users by storing and analyzing their past searches. Profiles reflect the interests of the users and enable web search engines to offer a better service. In this way, search results are personalized to fulfill the expectations of each individual user. Nevertheless, this service is not provided without cost. User profiles contain information that can be considered private and personal. This represents a serious privacy threat which must be addressed. Several privacy-preserving techniques which try to prevent this situation can be found in the literature. In this paper, we focus on those that work directly in the computer of the users without requiring any external entity. More specifically, we propose a new single-party scheme that addresses the trade-off between privacy and quality of service but it does not require any change at the server side. The performance of this new method has been evaluated using real search queries extracted from the AOL's files. The results achieved show that our proposal works as expected and it can be considered a proper option for those users who are concerned about their privacy.
网络搜索引擎通过存储和分析用户过去的搜索来描述用户。个人资料反映了用户的兴趣,使网络搜索引擎能够提供更好的服务。通过这种方式,搜索结果是个性化的,以满足每个用户的期望。然而,这项服务不是免费提供的。用户配置文件包含可以被视为私有和个人的信息。这是一个必须解决的严重的隐私威胁。一些试图防止这种情况的隐私保护技术可以在文献中找到。在本文中,我们关注的是那些直接在用户计算机中工作而不需要任何外部实体的系统。更具体地说,我们提出了一个新的单方方案,它解决了隐私和服务质量之间的权衡,但它不需要在服务器端进行任何更改。使用从AOL文件中提取的真实搜索查询对这种新方法的性能进行了评估。结果表明,我们的建议是预期的,对于那些关心自己隐私的用户来说,这是一个合适的选择。
{"title":"Single-party private web search","authors":"Alexandre Viejo, Jordi Castellà-Roca, Oriol Bernado, J. M. Mateo-Sanz","doi":"10.1109/PST.2012.6297913","DOIUrl":"https://doi.org/10.1109/PST.2012.6297913","url":null,"abstract":"Web search engines profile their users by storing and analyzing their past searches. Profiles reflect the interests of the users and enable web search engines to offer a better service. In this way, search results are personalized to fulfill the expectations of each individual user. Nevertheless, this service is not provided without cost. User profiles contain information that can be considered private and personal. This represents a serious privacy threat which must be addressed. Several privacy-preserving techniques which try to prevent this situation can be found in the literature. In this paper, we focus on those that work directly in the computer of the users without requiring any external entity. More specifically, we propose a new single-party scheme that addresses the trade-off between privacy and quality of service but it does not require any change at the server side. The performance of this new method has been evaluated using real search queries extracted from the AOL's files. The results achieved show that our proposal works as expected and it can be considered a proper option for those users who are concerned about their privacy.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133154563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast 一种智能手机安全两方计算的实现,应用于保护隐私的利益分配
Pub Date : 2012-07-16 DOI: 10.1145/2348543.2348607
Gianpiero Costantino, F. Martinelli, P. Santi, D. Amoruso
In this paper, we present an implementation of the FairPlay framework for secure two-party function computation on Android smartphones, which we call MobileFairPlay. Mobile-FairPlay allows high-level programming of several secure two-party protocols, including protocols for the Millionaire problem, set intersection, computation of Jaccard similarity coefficient, etc. All these functions are useful in the context of mobile social networks and opportunistic networks, where parties are often requested to exchange sensitive information (list of contacts, interest profiles, etc.) to optimize network operation. To demonstrate the feasibility of MobileFairPlay, we present an application to privacy-preserving interest-casting in opportunistic networks, implementing a recently proposed protocol. We tested running times of the implemented protocol on several Android phones, obtaining very reasonable (up to 5sec) running times. These results clearly promote MobileFairPlay as a feasible security framework for mobile environments.
在本文中,我们提出了在Android智能手机上实现安全的两方函数计算的FairPlay框架,我们称之为MobileFairPlay。Mobile-FairPlay允许对几个安全的双方协议进行高级编程,包括百万富翁问题的协议,集合交集,Jaccard相似系数的计算等。所有这些功能在移动社交网络和机会主义网络的背景下都是有用的,在这些网络中,各方经常被要求交换敏感信息(联系人列表、兴趣档案等),以优化网络运营。为了证明MobileFairPlay的可行性,我们提出了一种应用于机会主义网络中保护隐私的兴趣投射,实现了最近提出的协议。我们在几个Android手机上测试了实现协议的运行时间,得到了非常合理的运行时间(最多5秒)。这些结果清楚地表明,MobileFairPlay是移动环境中可行的安全框架。
{"title":"An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast","authors":"Gianpiero Costantino, F. Martinelli, P. Santi, D. Amoruso","doi":"10.1145/2348543.2348607","DOIUrl":"https://doi.org/10.1145/2348543.2348607","url":null,"abstract":"In this paper, we present an implementation of the FairPlay framework for secure two-party function computation on Android smartphones, which we call MobileFairPlay. Mobile-FairPlay allows high-level programming of several secure two-party protocols, including protocols for the Millionaire problem, set intersection, computation of Jaccard similarity coefficient, etc. All these functions are useful in the context of mobile social networks and opportunistic networks, where parties are often requested to exchange sensitive information (list of contacts, interest profiles, etc.) to optimize network operation. To demonstrate the feasibility of MobileFairPlay, we present an application to privacy-preserving interest-casting in opportunistic networks, implementing a recently proposed protocol. We tested running times of the implemented protocol on several Android phones, obtaining very reasonable (up to 5sec) running times. These results clearly promote MobileFairPlay as a feasible security framework for mobile environments.","PeriodicalId":434948,"journal":{"name":"2012 Tenth Annual International Conference on Privacy, Security and Trust","volume":"196 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132765620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2012 Tenth Annual International Conference on Privacy, Security and Trust
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1