{"title":"Portable key management service for cloud storage","authors":"Julian Jang, Avnish Manraj, S. Nepal","doi":"10.4108/ICST.COLLABORATECOM.2012.250488","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250488","url":null,"abstract":"Cloud storage services provide highly scalable, available and pay-as-you-go storage space for individual and enterprise users. Cloud storage services are inherently insecure as the management of the data in the cloud storage is controlled by third parties beyond the reach of the data owner. To address this problem, a number of data obfuscation techniques have been proposed to conceal data before sending it to the cloud. The secrets keys used for obfuscation are stored in a secure location while obfuscated data is stored in the cloud. In these approaches, the data is as secure as its corresponding keys. However, this still brings a challenging issue where a user needs to manage a large number of (secret) keys in such a way that they are protected against all types of adversaries, and should be as highly available as cloud storage services. To address this issue, we propose a portable key management service that is highly secure and available. In our solution, all keys are stored in a tamper-proof hardware within a portable USB device that users can carry with them all the time in order to provide high security and availability. We describe the system model, the details of the key management service and a prototype implementation.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134334730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Access rule consistency in cooperative data access environment","authors":"Meixing Le, K. Kant, S. Jajodia","doi":"10.4108/ICST.COLLABORATECOM.2012.250467","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250467","url":null,"abstract":"In this paper we consider the situation where a set of enterprises need to collaborate to provide rich services to their clients. Such collaboration often requires controlled access to each other's data, which we assume is stored in standard relational form. The access control is provided by a set of access rules that may be defined over the joins of various relations. In this paper we introduce the notion of consistency of access rules and devise an algorithm to ensure consistency. We also consider the possibility of occasional changes in access rules and address the problem of maintaining consistency in the face of such changes. We propose algorithms for both changes with new privileges grants and revocations on existing privileges.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129510314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delta extraction optimization for view maintenance in a limited collaborative environment","authors":"Z. Lu, Haijun Liu, P. Hyland","doi":"10.4108/ICST.COLLABORATECOM.2012.250533","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250533","url":null,"abstract":"This work considers maintaining materialized view in a distributed environment where the collaboration from highly autonomous operational database management systems is limited to granting read only access on a set of selected relational tables. In addition, due to possibly large volumes of remote source data involved in the view maintenance process, and consequently enormous overhead associated with data transfer, efficiency issues must been taken into the consideration. This proposal is based on the observation that usually, there is a large amount of static data in relational tables. It is proposed to use some statistical techniques at data warehouse system to helps us understand the essential characteristics of raw data at remote sites. Based on the characteristics of raw data, some optimization techniques are presented.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131109712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaboration should become a first-class citizen in support environments for software engineers","authors":"K. Dullemond, Ben van Gameren, R. Solingen","doi":"10.4108/ICST.COLLABORATECOM.2012.250418","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250418","url":null,"abstract":"Much work has been done in developing Integrated Development Environments (IDEs) for supporting software engineers in their isolated programming tasks. Software Engineering however, is primarily a collaborative activity in which communication, coordination and cooperation with colleagues is essential. Supporting this collaboration is often overlooked in support environments while it is in fact highly beneficial for Software Engineering teams in general and distributed teams in particular. Progress has been made in extending existing IDEs with functionality for supporting the collaborative activities in Software Engineering, however such environments are focused primarily on the programming task with collaboration functionality added to that. In this paper we argue the case that collaboration should be at the core of Integrated Collaborative Development Environments by showing exhibits that Software Engineering is primarily a collaborative activity, discussing limitations in the support for this in existing solutions and discussing our own approach in dealing with these limitations.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bum-Suk Lee, Jinyoung Yoon, Seokjung Kim, Byungyeon Hwang
{"title":"Detecting social signals of flu symptoms","authors":"Bum-Suk Lee, Jinyoung Yoon, Seokjung Kim, Byungyeon Hwang","doi":"10.4108/ICST.COLLABORATECOM.2012.250355","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250355","url":null,"abstract":"A cold and the flu are both respiratory illnesses and they are very common to us. Vaccination is the most effective way to prevent infection of the flu, but there is no way for a cold. Thus, the best strategy for individuals is to stay away from the flu or cold carriers and to wash their hands often. Early detection of flu epidemics and a quick response to that can minimize the impact of the flu. We observed tweets as social signals of flu symptoms to detect the flu epidemics in early stage. We compared a tweet corpus from nine cities in Korea to the weather factors, flu forecast, and Influenza-like Illness datasets. The results show the possibility of using social signals to detect epidemic diseases.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129527156","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CyberX: A biologically-inspired platform for cyber trust management","authors":"M. Azab, M. Eltoweissy","doi":"10.4108/ICST.COLLABORATECOM.2012.250512","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250512","url":null,"abstract":"Today numerous infrastructure assets remain alarmingly susceptible to advanced, targeted cyber attacks. There is a need to construct trustworthy high-quality protection and defense solutions capable of securing such valuable assets. In our work, we realize such cyber trust through trace-resistant moving-target defense, resilience against failures and attacks, and autonomous trustworthy cooperative defense. Achieving these goals would require software development, management, and operation platforms that support elasticity, diversity, awareness, cooperation, and intelligence. In this paper, we propose CyberX, a situation-aware trustworthy management platform. CyberX utilizes our Cell Oriented Architecture (COA) capability that separates the main design concerns: data, logic and physical resources to employ runtime diversity via hot shuffling of similar-function different-quality-objective code variants. CyberX employs such diversity to modify the application implicit behavior at runtime utilizing autonomous execution elasticity and adaptability. Further, CyberX enhances application resilience against failures and attacks via multi-mode recovery and real-time, context- and situation-aware adjustment of shuffling and recovery policies. Using analysis and simulation, results show that CyberX-managed COA-based software systems can efficiently adapt to maintain the desired performance and resilience objectives even in hazardous, unstable environments at a reasonable overhead.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131369808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Understanding lookup performance deficiencies in the KAD network","authors":"Yunzhao Li, D. Gruenbacher, C. Scoglio","doi":"10.4108/ICST.COLLABORATECOM.2012.250424","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250424","url":null,"abstract":"The KAD network is one of the largest distributed hash tables utilized by the popular P2P file-sharing systems: aMule and eMule. However, its lookup performance is recognized as inefficient. In this work, based on the fact that peers publish and retrieve information with the help of their routing tables and publishing tables, we evaluate this inefficiency problem via a series of real world tests. Our measurements show that even though the maintenance policy of routing tables is well designed, the current refresh scheme of the publishing table and the selfishness of publishing peers cause the poor lookup performance. To mitigate this problem, we propose there different modifications and analyze their advantages and weaknesses.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183186","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Knowedge-based policy conflict analysis for collabrative workspace","authors":"Zhengping Wu, Yuanyao Liu","doi":"10.4108/ICST.COLLABORATECOM.2012.250514","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250514","url":null,"abstract":"In collaborative workspace, collaborations are constrained by different requirements between different participants. Since policy-based management can be used to simplify collaboration management, administrators and users can use policies to define control rules and configurations of collaborative workspaces. These control rules and restrictions actually reflect management needs and business contracts. When collaboration is necessary between participants for a specific task, various management requirements from individuals may have conflicts. The situation is even worse when the collaboration is a one-time event. To detect and resolve potential conflicts within a collaborative workspace, a knowledge-based agent framework is proposed and used in this paper to analyze potential policy conflicts. Experiments in a sensor network environment confirm several advantages of the proposed framework.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129613631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Peer-aware collaborative access control in social networks","authors":"Qian Xiao, K. Tan","doi":"10.4108/ICST.COLLABORATECOM.2012.250524","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250524","url":null,"abstract":"Todays online social networks (OSNs) allow a user to share his photos with others and tag the co-owners, i.e., friends who also appear in the co-owned photos. However, it is not uncommon that conflicts may arise among the co-owners because of their different privacy concerns. OSNs, unfortunately, offer only limited access control support where the publisher of the shared content is the sole decision maker to restrict access. There is thus an urgent need to develop mechanisms for multiple owners of the shared content to collaboratively determine the access rights of other users, as well as to resolve the conflicts among co-owners with different requirements. Rather than competing with each other and just wanting ones own decision to be executed, OSN users may be affected their peers concerns and adjust their decisions accordingly. To incorporate such peer effects in the strategy, we formulate a model to simulate an emotional mediation among multiple co-owners. Our mechanism, called CAPE, considers the intensity with which the co-owners are willing to pick up a choice (e.g. to release a photo to the public) and the extent to which they want their decisions to be affected by their peers actions. Moreover, CAPE automatically yields the final actions for the co-owners as the mediation reaches equilibrium. It frees the co-owners from the mediation process after the initial setting, and meanwhile, offers a way to achieve more agreements among themselves.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129776988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative media choice processes in virtual teams","authors":"Katrin Bergener, S. Hofmann","doi":"10.4108/ICST.COLLABORATECOM.2012.250438","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2012.250438","url":null,"abstract":"Virtual teams have become a common form of organizing work. A vital part of virtual collaboration is the process of choosing appropriate media and subsequently adopting it. Up to now, research has mainly focused on giving guidelines for or predicting media usage in virtual teams ignoring how teams come to use their media. Furthermore, only the individual media choice is analyzed whereas the collaborative use is hardly studied. The goal of our study therefore was to understand how virtual teams collaboratively choose their collaboration and communication media. Media choice theories that explain media choices and media behaviors served as a theoretical underpinning. We conducted a case study with fifteen teams (33 participants in total) taking part in an international virtual seminar. Qualitative data were gathered from presentations held by the seminar participants, from field notes taken by the researchers as well as from semi-structured interviews, conducted with seven participants. Following an adopted grounded theory approach, we derived seven theses, which we structured according to the categories (1) criteria for media choice, (2) the media choice process, and (3) overcoming the deficiencies in virtual collaborations. This case study gives a rich description about the media choice process in virtual teams as well as factors influencing it.","PeriodicalId":225191,"journal":{"name":"8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133687835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}