2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)最新文献

筛选
英文 中文
Proactive Digital Companions in Pervasive Hypermedia Environments 普及超媒体环境中的主动数字伙伴
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00017
Kimberly García, S. Mayer, A. Ricci, A. Ciortea
{"title":"Proactive Digital Companions in Pervasive Hypermedia Environments","authors":"Kimberly García, S. Mayer, A. Ricci, A. Ciortea","doi":"10.1109/CIC50333.2020.00017","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00017","url":null,"abstract":"Artificial companions and digital assistants have been investigated for several decades, from research in the autonomous agents and social robots areas to the highly popular voice-enabled digital assistants that are already in widespread use (e.g., Siri and Alexa). Although these companions provide valuable information and services to people, they remain reactive entities that operate in isolated environments waiting to be asked for help. The Web is now emerging as a uniform hypermedia fabric that interconnects everything (e.g., devices, physical objects, abstract concepts, digital services), thereby enabling unprecedented levels of automation and comfort in our professional and private lives. However, this also results in increasingly complex environments that are becoming unintelligible to everyday users. To ameliorate this situation, we envision proactive Digital Companions that take advantage of this new generation of pervasive hypermedia environments to provide assistance and protection to people. In addition to Digital Companions perceiving a person's environment through vision and sound, pervasive hypermedia environments provide them with means to further contextualize the situation by exploiting information from available connected devices, and give them access to rich knowledge bases that allow to derive relevant actions and recommendations.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125019764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Invisible Security: Protecting Users with No Time to Spare 无形的安全:保护用户没有多余的时间
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00031
J. Dykstra
{"title":"Invisible Security: Protecting Users with No Time to Spare","authors":"J. Dykstra","doi":"10.1109/CIC50333.2020.00031","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00031","url":null,"abstract":"For over 50 years, the cybersecurity community has sought to protect vulnerable systems and users from victimization. Despite ongoing and valiant work at adoption and usability, some users cannot or will not avail themselves of necessary cybersecurity measures such as patching. Average, non-expert users-particularly those in small businesses-cannot afford to devote time to cybersecurity. Instead of accepting the risk of no security, alternatives are possible which achieve both security outcomes and conservation of time. We explore the paradigm of invisible security focused on creating cyber defenses that occur automatically without end user intervention. Invisible security is the next evolutionary step to aid users, now that automation is robust and effective in supporting it. Even though some example implementations, such as automatic updates, have existed for years, dedicated focus on this emerging paradigm is required to develop, measure, and deploy new capabilities. We present examples consistent with this approach in existence today, including automatic software updates and protective DNS. We draw insight and comparisons to other domains, including automobile safety. Then we describe how invisible defenses may aid potential beneficiaries in health care, the defense industrial base, and the general public. Finally, we present benefits and limitations of the approach and propose areas of future research and innovation.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121971871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions 基于参数化角色和权限的SDN应用访问控制模型
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00022
Abdullah Al-Alaj, R. Krishnan, R. Sandhu
{"title":"ParaSDN: An Access Control Model for SDN Applications based on Parameterized Roles and Permissions","authors":"Abdullah Al-Alaj, R. Krishnan, R. Sandhu","doi":"10.1109/CIC50333.2020.00022","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00022","url":null,"abstract":"Software Defined Networking (SDN) has become one of the most important network architectures for simplifying network management and enabling innovation through network programmability. Network applications submit network operations that directly and dynamically access critical network resources and manipulate the network behavior. Therefore, validating these operations submitted by SDN applications is critical for the security of SDNs. A feasible access control mechanism should allow system administrators to specify constraints that allow for applying minimum privileges on applications with high granularity. However, the granularity of access provided by current access control systems for SDN applications is not sufficient to satisfy such requirements. In this paper, we propose ParaSDN, an access control model to address the above problem using the concept of parameterized roles and permissions. Our model provides the benefits of enhancing access control granularity for SDN with support of role and permission parameters. We implemented a proof of concept prototype in an SDN controller to demonstrate the applicability and feasibility of our proposed model in identifying and rejecting unauthorized access requests submitted by controller applications.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134281433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Collaborative Intelligence and Killer Applications in Edge Computing 边缘计算中的协同智能和杀手级应用
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/cic50333.2020.00009
{"title":"Collaborative Intelligence and Killer Applications in Edge Computing","authors":"","doi":"10.1109/cic50333.2020.00009","DOIUrl":"https://doi.org/10.1109/cic50333.2020.00009","url":null,"abstract":"","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129349436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Short Survey of LSTM Models for De-identification of Medical Free Text 医学自由文本去识别的LSTM模型综述
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00023
Joffrey L. Leevy, T. Khoshgoftaar
{"title":"A Short Survey of LSTM Models for De-identification of Medical Free Text","authors":"Joffrey L. Leevy, T. Khoshgoftaar","doi":"10.1109/CIC50333.2020.00023","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00023","url":null,"abstract":"The confidentiality of patient information is legislated by governmental regulations in various countries, such as the Health Insurance Portability and Accountability Act (HIPAA) standards in the USA. Under these laws, adequate protections must be in place to safeguard patients' health records, which are often big data comprised of free text. Machine learning approaches are extensively used for the automated de-identification of medical free text, with outstanding results obtained from several studies that incorporate long short-term memory (LSTM) networks. These networks are a variant of the recurrent neural network (RNN) architecture. Our survey of LSTM models dates back five years, and the contribution of the findings is appreciable. Performance-wise, LSTMs generally surpassed other types of models used in automated de-identification of free text, namely conditional random field (CRF) algorithms and rule-based algorithms. In addition, hybrid or ensemble LSTM models did not outperform LSTM -only models. Finally, we note that the customization of gold-standard, de-identification datasets may result in overfitted models.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"40 5-6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132364457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Autonomous Driving: Practical Challenges & Opportunities 自动驾驶:现实挑战与机遇
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/cic50333.2020.00010
{"title":"Autonomous Driving: Practical Challenges & Opportunities","authors":"","doi":"10.1109/cic50333.2020.00010","DOIUrl":"https://doi.org/10.1109/cic50333.2020.00010","url":null,"abstract":"","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133710414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
cVM: Containerized Virtual Machine cVM:容器化虚拟机
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00011
Gong Su
{"title":"cVM: Containerized Virtual Machine","authors":"Gong Su","doi":"10.1109/CIC50333.2020.00011","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00011","url":null,"abstract":"Virtual machines (VM) and containers are virtualization technologies that partition computing resources and isolate workloads. They are the foundations for resource consolidation which leads to the success of cloud computing. VMs perform partitioning and isolation at the machine device level while containers do so at the operation system level. The pros and cons of VMs and containers are generally well understood. VMs provide better isolation and security while containers are less resource intensive and perform better. There are various attempts to address the shortcomings in both communities to narrow the gap between the two. In this paper, we review these efforts and discuss their strengths and weaknesses. We also present the cVM architecture with ideas to explore ways of reducing VM resource demand and improving VM performance towards being comparable to those of containers. cVMs bootstrap from a “disk template” where Linux Logical Volume Manager snapshot is used to allow cVMs to share read-only files and directories, thus reducing their disk footprint. Similarly, “memory template” allows cVMs to share read-only code and data memory pages, thus reducing their memory footprint. Finally, cVMs leverage device hotplug capability and lightweight Linux distributions to reduce bootup time without sacrificing too much generality. And cVMs also take advantage of device virtualization and utilize device passthrough to achieve near native I/O performance.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126698097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SenShaMart: A Trusted loT Marketplace for Sensor Sharing SenShaMart:传感器共享的可信赖loT市场
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00012
Dimitrios Georgakopoulos, P. Jayaraman, Anas Dawod
{"title":"SenShaMart: A Trusted loT Marketplace for Sensor Sharing","authors":"Dimitrios Georgakopoulos, P. Jayaraman, Anas Dawod","doi":"10.1109/CIC50333.2020.00012","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00012","url":null,"abstract":"This paper proposes a novel Trusted IoT Marketplace, which we refer to as SenShaMart, that permits different IoT applications to share (i.e., provide, discover, (re)use and pay for) IoT sensors. SenShaMart promotes both sharing of existing sensors and deployment of new sensors via a revenue generating scheme for IoT sensor provider applications. Unlike existing sensor discovery and integration solutions that are currently owned/controlled by a specific IoT platforms or sensor provider, SenShaMart has been specifically designed to be a trustworthy third party that manages all the important information needed for sensor discovery, integration, use and payment via a specialized blockchain (which we refer as SenShaMart blockchain). This solution ensures that the IoT application that use SenShaMart to share IoT sensors maintain their privacy and ensures first-come first-served access to any available sensor. The paper presents the key innovations in devising the SenShaMart and outlines the design of its main components.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128742785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
HydraSpace: Computational Data Storage for Autonomous Vehicles HydraSpace:自动驾驶汽车的计算数据存储
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00033
Ruijun Wang, Liangkai Liu, Weisong Shi
{"title":"HydraSpace: Computational Data Storage for Autonomous Vehicles","authors":"Ruijun Wang, Liangkai Liu, Weisong Shi","doi":"10.1109/CIC50333.2020.00033","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00033","url":null,"abstract":"To ensure the safety and reliability of an autonomous driving system, multiple sensors have been installed in various positions around the vehicle to eliminate any blind point which could bring potential risks. Although the sensor data is quite useful for localization and perception, the high volume of these data becomes a burden for on-board computing systems. More importantly, the situation will worsen with the demand for increased precision and reduced response time of self-driving applications. Therefore, how to manage this massive amount of sensed data has become a big challenge. The existing vehicle data logging system cannot handle sensor data because both the data type and the amount far exceed its processing capability. In this paper, we propose a computational storage system called HydraSpace with multi-layered storage architecture and practical compression algorithms to manage the sensor pipe data, and we discuss five open questions related to the challenge of storage design for autonomous vehicles. According to the experimental results, the total reduction of storage space is achieved by 88.6% while maintaining the comparable performance of the self-driving applications.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128923598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability 聪明的故事叙述:视频和文本风险交流提高MFA的可接受性
2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC) Pub Date : 2020-12-01 DOI: 10.1109/CIC50333.2020.00027
Sanchari Das, Shrirang Mare, L. Camp
{"title":"Smart Storytelling: Video and Text Risk Communication to Increase MFA Acceptability","authors":"Sanchari Das, Shrirang Mare, L. Camp","doi":"10.1109/CIC50333.2020.00027","DOIUrl":"https://doi.org/10.1109/CIC50333.2020.00027","url":null,"abstract":"Exposure of passwords for authentication and access management is a ubiquitous and constant threat. Yet, reliable solutions, including multi-factor authentication (MFA), face issues with wide-spread adoption. Prior research shows that making MFA mandatory helps with tool adoption but is detrimental to users' mental models and leads to security-avoidance behavior. To explore feasible solutions, we implemented text-and video-based risk communication strategies to evaluate if either mode of risk communication was useful. We sought to explore users' technical biases to further examine the mental models that are associated with safer security habits. Our study of $N$ = 620 participants found that users are aware of frequent security attacks, including phishing. We found that text- and video-based communication is often useful when information is aligned with individual actions and their consequences, which can range from benign to catastrophic. Shorter mental-model-aligned video snippets piqued user interest in MFA. On the other hand, detailed risk communication videos or textual descriptions improved users' understanding of MFA and the potential risks of non-usage. Our study indicates that, beyond usability and comprehensive education, risk communication offers the potential to increase MFA adoption.","PeriodicalId":265435,"journal":{"name":"2020 IEEE 6th International Conference on Collaboration and Internet Computing (CIC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信