{"title":"R4: Towards a holistic framework for designing and developing Social Web Applications","authors":"S. P. Choe, Junehwa Song","doi":"10.4108/ICST.COLLABORATECOM2009.8288","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8288","url":null,"abstract":"Social Web Application (SWA) design and development is a complex process that requires the understanding and coordination of several domains of knowledge. Yet there remain few if any holistic frameworks to manage this process. In this paper we present such a framework, R4. It coordinates and relates the different perspectives that inform the entire SWA design and development process. We base R4 on SWA design and development framework requirements derived from the literature. We formulate and relate four basic perspectives, the User, Culture, Technology and Business spheres and define stages, (Re)Design, Realization and Reformation (RRR), of the entire SWA design and development lifecycle. We then suggest basic SWA design and development guidelines derived from our R4 framework and develop an example methodology based on that framework.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115053620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DDT: A distributed data structure for the support of P2P range query","authors":"D. Carfí, M. Coppola, D. Laforenza, L. Ricci","doi":"10.4108/ICST.COLLABORATECOM2009.8356","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8356","url":null,"abstract":"This paper defines and evaluates a hierarchical distributed data structure, distributed digest trie, supporting range queries in P2P systems. Providing efficient support for these queries is currently a challenging research issue in the P2P field, as classical approaches based on distributed hash tables (DHT) are often not suitable for this kind of queries, due to the loss of locality introduced by the hashing function. Distributed digest trie exploits the DHT only to define a uniform assignment of logical identifiers to peers while each key is managed by the peer publishing it. Each peer is paired with the leaf of the trie corresponding to its logical identifier. An internal node of the trie stores a digest summarizing the keys published by the peers paired with the leaves of the tree rooted at that node. A proper mapping function is defined to map the internal nodes of the trie to the peers. The digests stored at the internal nodes are exploited to guide the search process for the resolution of the range query. Different aggregation techniques are proposed. A set of experimental results compare these techniques, evaluate the cost of dynamic updates of the data structure and the network traffic generated by the method.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116324689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandre Passant, Philippe Laublet, J. Breslin, S. Decker
{"title":"SemSLATES: Improving enterprise 2.0 information systems using semantic Web technologies","authors":"Alexandre Passant, Philippe Laublet, J. Breslin, S. Decker","doi":"10.4108/ICST.COLLABORATECOM2009.8369","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8369","url":null,"abstract":"While the use of Web 2.0 tools and principles in organizations — a practice commonly known as Enterprise 2.0 — helps knowledge workers to collaboratively build and exchange information more easily, it introduces several issues in terms of efficiently integrating and retrieving this information. In this paper, we describe how Semantic Web technologies can be efficiently deployed to solve these issues and to enhance such ecosystems. We detail the SemSLATES methodology, a middleware architecture for Enterprise 2.0 that combines Social Web principles and Semantic Web technologies in a novel and innovative way for the benefit of end users. Since the work presented here has been applied in an industrial context, we emphasize our motivations and the benefits of the approach through a complete and real-world case study.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128288289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CASTLE: A social framework for collaborative anti-phishing databases","authors":"Arash Nourian, Sameer Ishtiaq, Muthucumaru Maheswaran","doi":"10.4108/ICST.COLLABORATECOM2009.8310","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8310","url":null,"abstract":"Phishing is a major problem on the Internet. The cornerstone of anti-phishing is detecting whether a given site is good or bad. Most of the approaches for anti-phishing rely on looking up centrally maintained repositories. In this paper, we present a decentralized framework called CASTLE that allows a collaborative approach for anti-phishing services. We implemented a prototype and then tested it on Planet-lab. The experiments indicate the viability of our framework.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130583476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Square region-based coverage and connectivity probability model in wireless sensor networks","authors":"X. Xing, Guojun Wang, Jie Wu, Jie Li","doi":"10.4108/ICST.COLLABORATECOM2009.8335","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8335","url":null,"abstract":"Sensing coverage and network connectivity are two fundamental issues in wireless sensor networks (WSNs). Due to resource constraints of sensor nodes, it may not be possible, or necessary, to provide full coverage and/or connectivity in WSNs. Under a certain coverage and connectivity requirement, the node deployment strategy becomes a challenging issue in randomly deployed networks. In this paper, we propose a square region-based coverage and connectivity probability model (SCCP), which reflects the relations among the coverage and connectivity rates, the number of sensor nodes, the sensing and communication ranges of sensor nodes, and the network size. This model can calculate the number of sensor nodes that need to be deployed for maintaining a certain coverage and/or connectivity rate. The simulation results have shown that the error-rate of node deployment is less than 5%, which is defined as the absolute difference between the number of sensor nodes obtained from the theoretical analysis and the number obtained from the simulation, divided by the number of sensor nodes obtained from the theoretical analysis. The proposed model is very useful in estimating the monitoring coverage and connectivity capacity when sensor nodes are distributed randomly and uniformly.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130584889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A decentralized mechanism for application level monitoring of distributed systems","authors":"C. Serban, Wenxuan Zhang, N. Minsky","doi":"10.4108/ICST.COLLABORATECOM2009.8336","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8336","url":null,"abstract":"For a complex distributed system to be dependable, it must be continuously monitored, so that its failures and imperfections can be discovered and corrected in a timely manner. This work is concerned with the monitoring of large, open and heterogeneous systems, at their application level. Our objective is a monitoring technique that satisfies the following properties: scalability with respect to the size of the system and with the complexity of the monitoring task; the ability to deal reliably with heterogeneous components; and the ease and flexibility of deployment. Our approach to monitoring is based on a middleware called Law-Governed Interaction (LGI), which is a decentralized coordination and control mechanism.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116281511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A collaborative k-anonymity approach for location privacy in location-based services","authors":"Hassan Takabi, J. Joshi, H. Karimi","doi":"10.4108/ICST.COLLABORATECOM2009.8374","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8374","url":null,"abstract":"Considering the growth of wireless communication and mobile positioning technologies, location-based services (LBSs) have been generating increasing research interest in recent years. One of the critical issues for the deployment of LBS applications is how to reconcile their quality of service with privacy concerns. Location privacy based on k-anonymity is a very common way to hide the real locations of the users from the LBS provider. Several k-anonymity approaches have been proposed in the literature, each with some drawbacks. They need either a trusted third party or the users (or providers) to trust each other in collaborative approaches. In this paper, we propose a collaborative approach that provides k-anonymity in a distributed manner and does not require a trusted third party nor the users (or providers) to trust each other. Furthermore, our approach integrates well with the existing communication infrastructure. A user's location is known to only his/her location provider (e.g., cell phone operator). By using cryptographic schemes, user with the help of location providers determines whether the k-anonymity property is satisfied in a query area or not. We start with a simple scenario where user and location providers are honest-but-curious and then we progressively extend our protocol to deal with scenarios where entities may collude with each other. Moreover, we analyze possible threats and discuss how our proposed approach defends against such threats.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129254446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In-depth analysis of IPv6 security posture","authors":"Abdur Rahim Choudhary","doi":"10.4108/ICST.COLLABORATECOM2009.8393","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8393","url":null,"abstract":"The version 6 of Internet Protocol (IPv6) is being gradually deployed worldwide. This paper analyzes the security of IPv6 protocol. is the analysis concludes that serious security vulnerabilities exist that are IPv6 specific. Therefore additional security measures are needed and more capable security management tools are required in IPv6 networks in order to achieve a security posture at parity with that of the IPv4 networks.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122007153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative filtering via epidemic aggregation in distributed virtual environments","authors":"Patrick Gratz, J. Botev","doi":"10.4108/ICST.COLLABORATECOM2009.8278","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8278","url":null,"abstract":"The ever-increasing amount of available information in today's digital society necessitates inline techniques for determining the most relevant content. Collaborative filtering (CF) systems have proven to be an adequate means for reducing informational overload and generating useful recommendations. Current systems are predominantly built on centralized or, more recently, structured Peer-to-Peer (P2P) approaches. However, in order to apply collaborative filtering to large-scale distributed virtual environments (DVEs) in unstructured networks with substatially higher user numbers, different approaches are necessary. Within this paper we present a collaborative filtering algorithm for DVEs utilizing epidemic data aggregation based exclusively on local information. Designed to be extremely scalable, it creates recommendations in a transparent way by distributing an accumulated view of favorite ratings to interacting users. The algorithm is intended for deployment in the HyperVerse - a self-organizing middleware service for large-scale DVEs - for generating and managing rating predictions of object favorites. Evaluation results show that, in terms of quality, locally aggregated predictions converge well on those obtained from an idealized global view.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126613008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Integrating P2PSIP into collaborative P2P applications: A case study with the P2P videoconferencing system BRAVIS","authors":"R. Klauck, M. Kirsche","doi":"10.4108/ICST.COLLABORATECOM2009.8350","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM2009.8350","url":null,"abstract":"Collaborative applications, such as videoconferencing systems, allow communication partners to interact and communicate anytime and anywhere over the Internet. Today, such applications require central servers for various functions. Even decentralized Peer-to-Peer (P2P) systems still require servers for the invitation and localization of users. The Session Initiation Protocol (SIP) is usually used for videoconferencing systems as a signaling protocol with its registration and proxy servers. This paper introduces a use case where these central SIP servers are replaced in a collaborative application with the help of the decentralized P2PSIP protocol. In the paper, we evaluate different available P2PSIP candidates and describe the integration of a chosen candidate into the P2P videoconferencing system BRAVIS. We present new insights on the practical appliance of P2PSIP for real life collaborative P2P applications along with general remarks for the integration and improvement of P2PSIP.","PeriodicalId":232795,"journal":{"name":"2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128200063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}