6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)最新文献

筛选
英文 中文
CODILA: A Collaborative and Distributed Learning Activity applied to software engineering courses in Latin American Universities CODILA:一个应用于拉丁美洲大学软件工程课程的协作和分布式学习活动
C. Collazos, S. Ochoa, S. Zapata, F. Giraldo, María Inés Lund, Laura Aballay, G. Clunie
{"title":"CODILA: A Collaborative and Distributed Learning Activity applied to software engineering courses in Latin American Universities","authors":"C. Collazos, S. Ochoa, S. Zapata, F. Giraldo, María Inés Lund, Laura Aballay, G. Clunie","doi":"10.4108/ICST.COLLABORATECOM.2010.49","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.49","url":null,"abstract":"Software engineering education has been recognized as an important challenge in computer science undergraduate programs. Instruction in such area requires not only to deliver theoretical knowledge, but also to perform practical experiences that allow students to assimilate and apply such knowledge. This paper introduces a computer-supported Collaborative and Distributed Learning Activity (CODILA) that has been used to allow undergraduate students to acquire not only particular knowledge on software engineering, but also specific competencies or skills to collaborate in a distributed development team. The article also presents two experiences in which CODILA was applied. Such experiences involved students and instructors from five Latin American Universities. The obtained results were satisfactory and indicate this collaborative learning activity could be appropriate to address the instructional process in other disciplines.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"207 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133943985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries 具有连续查询的基于位置的移动系统中的全局隐私和运输模式同质匿名化
Leon Stenneth, Philip S. Yu
{"title":"Global privacy and transportation mode homogeneity anonymization in location based mobile systems with continuous queries","authors":"Leon Stenneth, Philip S. Yu","doi":"10.4108/ICST.COLLABORATECOM.2010.8","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.8","url":null,"abstract":"A major concern for deployment of location-based mobile systems is the ill-usage of mobile client's location data, which may imply sensitive and private personal information. Also, even if the location is exposed willingly by the mobile client the query should not be linked to the mobile client. Still, many location based systems (store finders, transit itinerary systems, and social networks) are created with a different focus and have little concern for end user privacy. We focused on location based mobile systems where the location of the mobile user may be available; however, an adversary should not be able to link a query to a specific mobile user. Two key contributions of this work are the introduction and experimental evaluation of a novel concept called transportation mode homogeneity anonymization that adds another dimension to privacy in mobile location based systems. Also, a novel dynamic layered approach on achieving K-anonymity by separating the local privacy requirement on each snapshot and global privacy requirement across snapshots with different privacy goals is proposed to exploit the local privacy anonymization group as candidates to obtain global anonymization group candidates.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130069752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
Hardware security device facilitated trusted residential energy services 硬件安全装置,为居民提供可靠的能源服务
J. Zic, Julian Jang, Dongxi Liu, Chen Wang, M. Groot
{"title":"Hardware security device facilitated trusted residential energy services","authors":"J. Zic, Julian Jang, Dongxi Liu, Chen Wang, M. Groot","doi":"10.4108/ICST.COLLABORATECOM.2010.41","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.41","url":null,"abstract":"We report on our experiences in developing a hardware based security solution for a demonstration prototype of a novel, smart-grid enabled energy services delivery model. This model is based on establishing and maintaining trusted, secure dynamic collaborations with agreed, policy driven usage and billing metrics between energy service providers, energy supply companies, and the consumers' residences. In this paper, we describe how we used a specialized secure hardware device, issued by an energy service company and containing a set of tokens and cryptographic functions can be used to ensure that all transactions between the energy service company and the consumer are trusted, secure and private to the participants.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133379436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SocialTrust++: Building community-based trust in Social Information Systems socialtrust++:在社会信息系统中建立社区信任
James Caverlee, Zhiyuan Cheng, B. Eoff, Chiao-Fang Hsu, K. Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, Kyumin Lee
{"title":"SocialTrust++: Building community-based trust in Social Information Systems","authors":"James Caverlee, Zhiyuan Cheng, B. Eoff, Chiao-Fang Hsu, K. Kamath, Said Kashoob, Jeremy Kelley, Elham Khabiri, Kyumin Lee","doi":"10.4108/ICST.COLLABORATECOM.2010.40","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.40","url":null,"abstract":"Social information systems - popularized by Facebook, Wikipedia, Twitter, and other social websites - are emerging as a powerful new paradigm for distributed social-powered information management. While there has been growing interest in these systems by businesses, government agencies, and universities, there remain important open challenges that must be addressed if the potential of these social systems is to be fully realized. For example, the presence of poor quality users and users intent on manipulating the system can disrupt the quality of socially-powered information and knowledge sharing applications. In this paper, we outline the SocialTrust++ project at Texas A&M University. The overall research goal of the SocialTrust++ project is to develop, analyze, deploy, and test algorithms for building, enabling, and leveraging community-based trust in Social Information Systems. Concretely, we are developing a trustworthy community-based information platform so that each user in a Social Information System can have transparent access to the community's trust perspective to enable more effective and efficient social information access.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"47 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125909226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Cloud-based platform for personalization in a wellness management ecosystem: Why, what, and how 健康管理生态系统中基于云的个性化平台:为什么,做什么,如何做
P. Hsueh, R. Lin, M. Hsiao, Liangzhao Zeng, S. Ramakrishnan, Henry Chang
{"title":"Cloud-based platform for personalization in a wellness management ecosystem: Why, what, and how","authors":"P. Hsueh, R. Lin, M. Hsiao, Liangzhao Zeng, S. Ramakrishnan, Henry Chang","doi":"10.4108/ICST.COLLABORATECOM.2010.44","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.44","url":null,"abstract":"Offering personalized services through dynamically formed ecosystems is essential to personal wellness management. In this paper, we present the design of a cloud-enabled platform to facilitate the collection and delivery of evidence for personalization in a multi-provider ecosystem environment. In addition, the platform also provides essential building blocks of personalization services: smarter analytics for active personalization and dynamic provisioning. While the former common service takes charge of inferring user wellness risks from multiple data sources on the fly and making risk-driven recommendations, the latter common service determines optimal platform pricing and resource allocation given the constraint of acceptable quality of service.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
BMI CyberWorkstation: A cyberinfrastructure for collaborative experimental research on Brain-Machine Interfaces BMI网络工作站:用于脑机接口协作实验研究的网络基础设施
Prapaporn Rattanatamrong, Andréa M. Matsunaga, J. Fortes
{"title":"BMI CyberWorkstation: A cyberinfrastructure for collaborative experimental research on Brain-Machine Interfaces","authors":"Prapaporn Rattanatamrong, Andréa M. Matsunaga, J. Fortes","doi":"10.4108/ICST.COLLABORATECOM.2010.42","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.42","url":null,"abstract":"This paper describes the design and implementation of an improved version (2.0) of a computational cyberinfrastructure for neuroscience research, called CyberWorkstation (CW). CW can provide to neurophysiology laboratories the following: (1) data storage for large volumes of neural signals, experimental parameters and computational results, (2) integration of necessary experimental equipment, powerful computational resources and robust software mechanisms that enable users to conduct online and offline BMI experiments, (3) a Web-based interface that permits users to conveniently setup, monitor and review their experiments and collaborate with others in analyzing and developing their research findings. The capabilities of the CW in enabling collaborative BMI research are demonstrated using forward models based on neural networks that predict positions of an agent in 2D movement control.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Secure Information Sharing models for community Cyber Security 面向社区网络安全的安全信息共享模式探讨
R. Sandhu, R. Krishnan, G. White
{"title":"Towards Secure Information Sharing models for community Cyber Security","authors":"R. Sandhu, R. Krishnan, G. White","doi":"10.4108/ICST.COLLABORATECOM.2010.3","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.3","url":null,"abstract":"In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. The term community in this context refers to a county or larger city size unit with a clearly demarcated geographical boundary aligned more or less with a governance boundary. Our choice of the community domain is based on the decade long experience of the Center for Infrastructure Assurance and Security (CIAS), now part of the Institute for Cyber Security (ICS-CIAS) at the University of Texas at San Antonio. Over the past decade ICS-CIAS has conducted cyber security preparedness exercises and training at communities throughout the nation specifically dealing with communication, incident response, disaster recovery, business continuity, security awareness and similar issues. We discuss the insights gained from these frequent exercises to illustrate the limitations of prior models for SIS, such as discretionary access control, mandatory access control and role-based access control. Specifically, we argue that these traditional models, while effective in addressing the issues that they were developed for, lack the agility to dynamically configure a system to facilitate SIS scenarios such as monitoring and response during a community cyber security incident life cycle. We discuss how our current research efforts at the Institute for Cyber Security on group-centric SIS models directly address the limitations of existing models in such scenarios.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"PC-22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126670910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Simulating collaboration from multiple, potentially non-collaborative healthcare systems to create a single view of a patient 模拟来自多个潜在非协作性医疗保健系统的协作,以创建患者的单一视图
Tyrone Grandison, Varun Bhagwan, D. Gruhl
{"title":"Simulating collaboration from multiple, potentially non-collaborative healthcare systems to create a single view of a patient","authors":"Tyrone Grandison, Varun Bhagwan, D. Gruhl","doi":"10.4108/ICST.COLLABORATECOM.2010.17","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.17","url":null,"abstract":"There is still significant investment in legacy healthcare information technology (HIT). Current systems are a diverse mix of technologies, standards, platforms and versions. Many of which were never intended to be used together to achieve a common goal. In order to deliver care effectively and efficiently, point-of-care software must navigate this complex maze, coordinating multiple disparate systems, to produce as holistic a view as possible of a patient's treatment history, in a timely manner. In this paper, we introduce a specific problem of enabling the collaboration of HIT to facilitate data ingest and integration, present a solution approach and describe a software embodiment that was deployed.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121686825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A collaborative approach to facilitate intrusion detection and response against DDoS attacks. 一个协作的方法,以方便入侵检测和应对DDoS攻击。
S. Zargar, J. Joshi
{"title":"A collaborative approach to facilitate intrusion detection and response against DDoS attacks.","authors":"S. Zargar, J. Joshi","doi":"10.4108/ICST.COLLABORATECOM.2010.46","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.46","url":null,"abstract":"Intrusion detection and response systems (IPSs) for protecting against distributed denial-of-service (DDoS) attacks will beneflit significantly if all the routers within each autonomous system (AS) are capable of detection and response in addition to sampling. However, DDoS detection and response will incur high storage and processing overhead if each router does redundant detection and response tasks. Many overlay communication protocols have been introduced in the literature to achieve coordination among the routers but they generally have high communication overheads. Furthermore, DDoS detection and response requires that all the flows intended to the same destination be analyzed together in order to efficiently capture the correlation between them. In order to do that, current approaches centrally collect all the sampled data and analyze them, which also increases the communication overhead. In this paper, we present a collaborative approach to distribute the sampling, detection, and response responsibilities among all the routers within the AS in such a way that each router can detect and respond to DDoS attacks. Our proposed approach achieves coordination among all the routers in the network to eliminate redundant sampling, detection, and response tasks without exploiting any specific communication protocol. We propose an optimal assignment of disjoint flows to each of the routers within the ASs in such a way that all the flows destined for the same host will be sampled, analyzed, and properly responded at the same router. Each router can thus capture the correlation between flows destined for a specific destination.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126495443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Keystroke-dynamics authentication against synthetic forgeries 针对合成伪造的击键动力学认证
D. Stefan, D. Yao
{"title":"Keystroke-dynamics authentication against synthetic forgeries","authors":"D. Stefan, D. Yao","doi":"10.4108/ICST.COLLABORATECOM.2010.16","DOIUrl":"https://doi.org/10.4108/ICST.COLLABORATECOM.2010.16","url":null,"abstract":"We describe the use of keystroke-dynamics patterns for authentication and detecting infected hosts, and evaluate its robustness against forgery attacks. Specifically, we present a remote authentication framework called TUBA for monitoring a user's typing patterns. We evaluate the robustness of TUBA through comprehensive experimental evaluation including two series of simulated bots. Support vector machine is used for classification. Our results based on 20 users' keystroke data are reported. Our work shows that keystroke dynamics is robust against synthetic forgery attacks studied, where attacker draws statistical samples from a pool of available keystroke datasets other than the target. TUBA is particularly suitable for detecting extrusion in organizations and protecting the integrity of hosts in collaborative environments, as well as authentication.","PeriodicalId":354101,"journal":{"name":"6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010)","volume":"1693 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129391444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信