{"title":"Role based interoperability security policies in collaborative systems","authors":"Khalifa Toumi, A. Cavalli, Mazen El Maarabani","doi":"10.1109/CTS.2012.6261092","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261092","url":null,"abstract":"Access control in a distributed system with external users and various organizations is an important issue in systems' security. A comparative study between the existing models will help both: (1) researchers to propose new formalisms and models adapted to these requirements and (2) developers to choose the adequate ones for their applications. In this paper, we are interested in studying role based interoperability security policies. We propose to classify these models based on some criteria related to collaborative environment. Then, we discuss and detail the characteristics of each one. Finally, we propose some perspectives.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130765902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alan Davoust, Alexander Craig, B. Esfandiari, Vincent Kazmierski
{"title":"Decentralized collaboration with a peer-to-peer wiki","authors":"Alan Davoust, Alexander Craig, B. Esfandiari, Vincent Kazmierski","doi":"10.1109/CTS.2012.6261064","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261064","url":null,"abstract":"We report our experience using a peer-to-peer (P2P) wiki system for academic writing tutorials. Our wiki system supports a non-traditional collaboration model, where each participant maintains their own version of the documents.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114842419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lift - A mechanism for composing virtual app-clusters from heterogeneous apps","authors":"A. Agrawal, B. Sodhi, T. Prabhakar","doi":"10.1109/CTS.2012.6261052","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261052","url":null,"abstract":"Most people own multiple computing devices such as laptops, desktops, tablets, servers etc. sometimes geographically dispersed. Each such computing device may have a different operating system (OS) with its own native apps and data. Often these applications can be used only by the local users that have physical access to such machines thus limiting the application's utilization. As of today there is no adequate solution which allows the users to have a unified view of all or a subset of apps and data from multiple machines, at one place. The remote graphical desktop sharing systems such as Virtual Network Computing (VNC) viewer etc. do not fully address the problem. We call this ability to operate a native application from a remote foreign platform as lifting the application into that foreign platform. We define the semantics for liftability from an application's perspective, and propose a framework that allows lifting native applications. Using this framework a set of native applications residing on disparate machines can be composed into a single app-cluster. Such a virtual desktop offers native experience of the lifted applications. This concept is demonstrated through a prototype implementation working on Ubuntu platforms.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129590176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet of things implications on ICN","authors":"A. Rayes, M. Morrow, D. Lake","doi":"10.1109/CTS.2012.6261023","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261023","url":null,"abstract":"The number of connected devices over the Internet of Things (IoT) are expected to be over 25 billion by 2015. This is more than three devices for every human being on earth. The most common deployment of the IoT is expected to be based on Information-Centric Networking (ICN) where control and intelligent related information are hosted at a centralized location. Cleary performance and security implications must be considered very carefully when developing IOT architectural frameworks. This paper addresses the key ICN performance and security requirements of IP based IoT networks and presents a case study using smart services in IT infrastructure network.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantically-supported team building in a KDD virtual environment","authors":"C. Diamantini, D. Potena, Emanuele Storti","doi":"10.1109/CTS.2012.6261026","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261026","url":null,"abstract":"Team building plays a crucial role in many collaborative projects. The use of semantic technologies and tools, like ontologies and metadata management proved to be a powerful approach to organize people competencies and support the formation of teams. Although Knowledge Discovery in Databases (KDD) has inherent collaborative characteristics, team building in this domain has not been the subject of extensive work yet. In this paper we start filling this gap by presenting TeamOnto, an ontology for the representation of project teams. TeamOnto is part of a wide, modular and integrated Knowledge Base about KDD projects, of which we briefly illustrate some modules, showing their use to support team building in the KDD domain.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software agent application to support the patient-at-home","authors":"M. Lyell, Xiong Liu","doi":"10.1109/CTS.2012.6261034","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261034","url":null,"abstract":"This work is motivated by the Patient-at-Home (PAH). He or she is an ambulatory patient who requires a greater level of attention, such as individuals with chronic conditions, elderly patients, those with trauma injuries, etc. Latest developments in US national-level health care standards and specifications have focused on needs of in-hospital scenarios and interoperability among diverse institutionally-situated software systems. This work provides a focus of bringing the Patient-at-Home into collaborative partnership with the emerging standards-based electronic health care support. To accomplish this, an approach involving collaborative elements was developed. These include interactions between the PAH and an agent-based software application named Patient-at-Home Supporting Software Agents (PAHSSA) and between the PAH and the Family Physician. The point of connection between the Patient-at-Home and the emerging electronic health care system involves the Family Physician's Electronic Health Record (EHR). In this work, we develop a set of scenario elements that pertain to the PAH. We then derive requirements that can be utilized as use case snippets in order to design meaningful collaboration between the PAH and the health care system. Finally, we present an initial agent system design for PAHSSA to support the collaboration.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125783890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Vincent, V. Alimi, Aude Plateaux, Chrystel Gaber, M. Pasquet
{"title":"A mobile payment evaluation based on a digital identity representation","authors":"J. Vincent, V. Alimi, Aude Plateaux, Chrystel Gaber, M. Pasquet","doi":"10.1109/CTS.2012.6261085","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261085","url":null,"abstract":"In today's interconnected world, the mobile phone, especially the smartphone, takes a central place. Recently, the NFC technology has been embedded in smartphones to enable new usages such as mobile proximity payment. Meanwhile, growing concerns have raised regarding the privacy issues of those technologies. In this paper, we propose a new way to analyze the privacy issues of NFC payment. The payment is modelized as a digital identity of the customer and the payment process is viewed as a identity management solution (IMS). A specific framework designed to analyze privacy and security in IMS is then applied to make the analysis.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127287786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtual collaborative environments for Engineered Resilient Systems","authors":"Dale Burnham","doi":"10.1109/CTS.2012.6261079","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261079","url":null,"abstract":"Past and current military conflicts have proven that an adversary will change tactics to gain an advantage over their opposition. In certain military circles this concept is known as “blowback”. The advantage gained is due to rendering the opposition's materiel and training inadequate. Given the timeframe required to field a new weapon system, the effects of “blowback” are a detriment to mission and campaign success. The most efficient and effective way to reduce the effects of “blowback” is to greatly reduce or compress the acquisition lifecycle timeframe. This can be accomplished by engineering and producing resilient systems. Current Systems Engineering tools, practices and environments are not adequate for realization of resilient systems. Therefore, there exists a need for a virtual collaborative environment that will host and integrate the required domain tools, allow the real-time virtual collaboration of all stakeholders (laboratories, engineers, program managers, configuration management, users, maintainers, contracts, finance, logistics and all levels of leadership), disseminate the right data at the right time to the right stakeholders and maintain and control the artifacts of the system under development or change.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130898094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ashfaq Ahmed Malik, Muhammad A. Khan, A. Mahboob, Faraz Haider
{"title":"Secure geo-sharing in mobile ad-hoc networks","authors":"Ashfaq Ahmed Malik, Muhammad A. Khan, A. Mahboob, Faraz Haider","doi":"10.1109/CTS.2012.6261041","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261041","url":null,"abstract":"In this paper we present techniques to enhance security of geo-sharing which can be used in mobile ad-hoc networks. Our techniques are applicable and useful in a number of scenarios such as military operations in built-up areas where it is essential to securely know the location of friends. We have used Embedded Linux based PDA's equipped with on-board GPS to implement our secure geo-sharing techniques. We have used IPSec with automated key agreement (IKE) and WEP at the link layer to implement security of the geo-sharing information. In addition, we experimented with a number of encryption and authentication algorithms inlucding AES, DES, 3DES, Blowfish, Camellia, MD5 and SHA.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130548811","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Shopping for danger e-commerce techniques applied to collaboration in cyber security","authors":"Joe Bruce, Glenn A. Fink","doi":"10.1109/CTS.2012.6261057","DOIUrl":"https://doi.org/10.1109/CTS.2012.6261057","url":null,"abstract":"Collaboration among cyber security analysts is essential to a successful protection strategy on the Internet today. Time and effort are common barriers to collaboration. We propose an ambient collaboration framework, called Vulcan, designed to remove those barriers and mitigate others. By applying concepts developed in the context of e-commerce - specifically collaborative filtering - and instrumenting common analytic tools, we automate the process of sharing. We discuss the framework design and the instrumentation of two analytic applications, concluding with lessons learned from a mock analysis session that tested the output of the system.","PeriodicalId":200122,"journal":{"name":"2012 International Conference on Collaboration Technologies and Systems (CTS)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133508465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}