2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)最新文献

筛选
英文 中文
An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis ABAC系统协同管理的管理模型及其安全性分析
S. Jha, S. Sural, V. Atluri, Jaideep Vaidya
{"title":"An Administrative Model for Collaborative Management of ABAC Systems and Its Security Analysis","authors":"S. Jha, S. Sural, V. Atluri, Jaideep Vaidya","doi":"10.1109/CIC.2016.022","DOIUrl":"https://doi.org/10.1109/CIC.2016.022","url":null,"abstract":"Attribute-based Access Control (ABAC) has been emerging as a suitable choice for large and federated enterprises due to its flexibility in expressing various types of security policies. Improved flexibility, however, results in higher design complexity and consequently, possibility of undesired flow of information. Reliance of access decision on the attribute values of subjects, objects and environment underscores the need for a formal way of managing attribute assignment in ABAC systems. Since large enterprises potentially have hundreds of subjects and thousands of resources, centralized management of attribute assignment is inexpedient. This paper introduces an attribute-based administrative model that supports decentralized administration of ABAC systems. The proposed model consists of a number of operations to administer the set of subjects and the set of subject attribute assignments in an ABAC system. We then suggest a methodology for analyzing the security properties of ABAC using Alloy analyzer in the presence of the proposed administrative model.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125849905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures 脑机接口(BCI)应用:隐私威胁与对策
Hassan Takabi, Anuj Bhalotiya, Manar Alohaly
{"title":"Brain Computer Interface (BCI) Applications: Privacy Threats and Countermeasures","authors":"Hassan Takabi, Anuj Bhalotiya, Manar Alohaly","doi":"10.1109/CIC.2016.026","DOIUrl":"https://doi.org/10.1109/CIC.2016.026","url":null,"abstract":"In recent years, Brain-Computer Interfaces (BCIs) have gained popularity in non-medical domains such as the gaming, entertainment, personal health, and marketing industries. A growing number of companies offer various inexpensive consumer grade BCIs and some of these companies have recently introduced the concept of BCI \"App stores\" in order to facilitate the expansion of BCI applications and provide software development kits (SDKs) for other developers to create new applications for their devices. The BCI applications access to users' unique brainwave signals, which consequently allows them to make inferences about users' thoughts and mental processes. Since there are no specific standards that govern the development of BCI applications, its users are at the risk of privacy breaches. In this work, we perform first comprehensive analysis of BCI App stores including software development kits (SDKs), application programming interfaces (APIs), and BCI applications w.r.t privacy issues. The goal is to understand the way brainwave signals are handled by BCI applications and what threats to the privacy of users exist. Our findings show that most applications have unrestricted access to users' brainwave signals and can easily extract private information about their users without them even noticing. We discuss potential privacy threats posed by current practices used in BCI App stores and then describe some countermeasures that could be used to mitigate the privacy threats.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123566897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Characteristics and Requirements of Big Data Analytics Applications 大数据分析应用的特点与需求
J. Al-Jaroodi, N. Mohamed
{"title":"Characteristics and Requirements of Big Data Analytics Applications","authors":"J. Al-Jaroodi, N. Mohamed","doi":"10.1109/CIC.2016.062","DOIUrl":"https://doi.org/10.1109/CIC.2016.062","url":null,"abstract":"Big data analytics picked up pace to offer meaningful information based on analyzing big data. Big data have various distinctive characteristics that together have led to overwhelming the available infrastructures both hardware and software. Moreover, this led to creating further complexities when considering the software engineering aspects for big data applications development. Introducing cloud computing into the mix further complicates the issues. Most of the current efforts in big data analytics target finding ways to store, organize and process big data effectively in addition to investigating cloud-based big data applications perspectives. However, we noticed there is not much emphasis on defining or enhancing the software development process for developing such applications. Like any software system, it is important to identify the types of applications, requirements and constraints and use this knowledge in a well-defined process model to design and develop effective cloud-based and traditional big data analytics applications. In this paper, we investigate these applications and attempt to identify the general requirements and constraints to better support the software development process. One of the important aspects is being able to distinguish real-time from delay-tolerant big data analytics applications. When the requirements and time constraints are identified, we can decide on the type of infrastructure and software architectures that will best match these requirements. As a result, we design and deliver effective and useful big data analytics applications.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"305 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123458160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Constructing the Three Graphs for the Large-Scale Heterogeneous Information System 大规模异构信息系统的三图构造
Bing Li
{"title":"Constructing the Three Graphs for the Large-Scale Heterogeneous Information System","authors":"Bing Li","doi":"10.1109/CIC.2016.047","DOIUrl":"https://doi.org/10.1109/CIC.2016.047","url":null,"abstract":"The paper proposes a bunch of social capital oriented perspectives to resolve the issue of accessing the large-scale heterogeneous information over the Internet. It believes the most critical task for that is to construct the three social graphs that connect the human capital components, i.e., the data, the channel and the human. As the underlying infrastructure, the graphs evolve upon various behaviors of information accessing. Moreover, it also sustains those behaviors in terms of exhibiting high quality information with high performance. As the dominance of the system, the three social graphs play the role of a broker between the physical capital and the human capital. However, it supposes that neither the graphs can be created without sufficient users' participations nor their growing procedures can be imitated by any algorithms. To initiate the system and foster its growth, it puts forward the three approaches, i.e., the rough, the strict and the compromised, to construct the seed graphs. In them, the compromised one is feasible because of its low cost and strengthening information accessing. It also describes the practical implementation of the algorithms and the relevant evaluation solutions.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116292912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Moving Target Defense for Linux Container Resiliency Linux容器弹性的智能移动目标防御
M. Azab, B. Mokhtar, A. S. Abed, M. Eltoweissy
{"title":"Smart Moving Target Defense for Linux Container Resiliency","authors":"M. Azab, B. Mokhtar, A. S. Abed, M. Eltoweissy","doi":"10.1109/CIC.2016.028","DOIUrl":"https://doi.org/10.1109/CIC.2016.028","url":null,"abstract":"Nature is a major source of inspiration for many of the inventions that we rely on to maintain our daily lifestyle. In this paper, we present ESCAPE, an evolved version of our nature-inspired game-like informed moving-target-defense mechanism for cloud containers resiliency. ESCAPE rely on a novel container mobilization framework controlled by a smart attack maneuvering module. That module drives the running containers based on real-time models of the interaction between attackers and their targets as a \"predator searching for a prey\" search game. ESCAPE employs run-time live-migration of Linux-containers {prey} to avoid attacks (predator) and failures. The entire process is guided by a novel host-based behavior-monitoring system that seamlessly monitors containers for indications of intrusions and attacks. To evaluate the effect of ESCAPE's container live-migration evading attacks, we extensively simulated the attack avoidance process based on a mathematical model mimicking the prey-vs-predator search game. With ESCAPE's live-migrations, results show high container survival probabilities with minimal added overhead.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132225512","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Using Transfer Learning to Identify Privacy Leaks in Tweets 使用迁移学习识别推文中的隐私泄露
Saul Ricardo Medrano Castillo, Zhiyuan Chen
{"title":"Using Transfer Learning to Identify Privacy Leaks in Tweets","authors":"Saul Ricardo Medrano Castillo, Zhiyuan Chen","doi":"10.1109/CIC.2016.078","DOIUrl":"https://doi.org/10.1109/CIC.2016.078","url":null,"abstract":"Users of online social networks often disclose a lot of sensitive information intentionally or unintentionally, allowing different organizations such as the government, advertising companies, or criminals to exploit such information. In this paper, we focus on identifying privacy leaks such as being pregnant and being drunk in the content of tweets. This problem is non trivial for two reasons. First, we need to differentiate tweets that indeed contain privacy leaks from tweets that do not. e.g., a tweet may talk about a celebrity getting pregnant or selling products for pregnant women and thus is not privacy sensitive. Second, most existing solutions build a supervised learning model for each type of private leaks, but there could be many types of leaks so such solutions require labeling a large number of tweets for each type of leaks, which could be quite tedious and not easily generalizable. Our main contribution is that we apply transfer learning techniques such that we can use training data for one type of privacy leaks for another type of leaks which shares some common ground but is not exactly the same. This greatly reduces the labeling effort and makes our solution more generalizable. Experimental results validated the benefit of our approach: only 7% of data for the new type of leaks need to be labeled to achieve similar results as using 100% labeled data.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134560276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design 社会技术设计中的隐私:隐私友好型系统设计的协作方法
Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser
{"title":"Privacy by Socio-Technical Design: A Collaborative Approach for Privacy Friendly System Design","authors":"Martin Degeling, Christopher Lentzsch, Alexander Nolte, Thomas Herrmann, Kai-Uwe Loser","doi":"10.1109/CIC.2016.077","DOIUrl":"https://doi.org/10.1109/CIC.2016.077","url":null,"abstract":"Lately the European data protection directive has increased the attention for privacy by design (PbD). The idea behind this system and software design approach is to not consider privacy as an add-on or legal requirement but to foster the development of privacy friendly technology right from the beginning. Current PbD approaches however mainly focus on technological aspects of privacy. They rarely consider the context in which software systems are build and used. The context however plays a vital role especially with respect to the future usage of a system in an organizational environment. We propose to use established socio-technical design approaches, in which multiple stakeholders collaborate on process models, as a basis for privacy by design. We adapt them to incorporate aspects relevant for privacy aware design and introduce a tool that can support question-based evaluation and collaborative work on processes that make use of personally identifiable information.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133614087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
The Listening Patterns to System Events by Benign and Malicious Android Apps 良性和恶意Android应用程序对系统事件的监听模式
Fadi Mohsen, Mohamed Shehab
{"title":"The Listening Patterns to System Events by Benign and Malicious Android Apps","authors":"Fadi Mohsen, Mohamed Shehab","doi":"10.1109/CIC.2016.083","DOIUrl":"https://doi.org/10.1109/CIC.2016.083","url":null,"abstract":"Mobile applications have become an integral component of modern mobile operating systems. The usage pattern for these apps have increased tremendously the last ten years. At the same time, the security and privacy risks of these apps have also expanded in number and severity. In this paper, we spot the light on a critical component of Android mobile applications called Broadcast receivers. We focus on these receivers that are deliberately developed to listen to system's actions and events. The number of these actions has increased tremendously since the initial release of Android operating system. We showed that how such a component can pose serious privacy risks on users without their knowledge and awareness. We first illustrate a prototype of an attack that was possible due to the use of Broadcast receivers. We then show the results of analyzing a large dataset of malicious and benign Android applications in terms of their Broadcast receivers usages. Our prototype shows that with the use of Broadcast receivers the location privacy of users can be compromised, moreover, the dataset analysis results present that the usage of Broadcast receivers by malicious applications is remarkably higher than benign applications. Finally, we end with some conclusions and recommendations.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115056713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
DLSAS: Distributed Large-Scale Anti-Spam Framework for Decentralized Online Social Networks 分布式大规模反垃圾邮件框架,用于分散的在线社交网络
Amira Soliman, Sarunas Girdzijauskas
{"title":"DLSAS: Distributed Large-Scale Anti-Spam Framework for Decentralized Online Social Networks","authors":"Amira Soliman, Sarunas Girdzijauskas","doi":"10.1109/CIC.2016.055","DOIUrl":"https://doi.org/10.1109/CIC.2016.055","url":null,"abstract":"In the last decade, researchers and the open source community have proposed various Decentralized Online Social Networks (DOSNs) that remove dependency on centralized online social network providers to preserve user privacy. However, transitioning from centralized to decentralized environment creates various new set of problems, such as adversarial manipulations. In this paper, we present DLSAS, a novel unsupervised and decentralized anti-spam framework for DOSNs. DLSAS provides decentralized spam detection that is resilient to adversarial attacks. DLSAS typifies massively parallel frameworks and exploits fully decentralized learning and cooperative approaches. Furthermore, DLSAS provides a novel defense mechanism for DOSNs to prevent malicious nodes participating in the system by creating a validation overlay to asses the credibility of the exchanged information among the participating nodes and exclude the misbehaving nodes from the system. Extensive experiments using Twitter datasets confirm not only the DLSAS's capability to detect spam with higher accuracy compared to state-of-the-art approaches, but also the DLSAS's robustness against different adversarial attacks.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128765574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Social Safety Guard Based on Internet of Things 基于物联网的社会保障
J. Moon, Jin-Seong Kim, I. Jung, Su-an Eom
{"title":"Social Safety Guard Based on Internet of Things","authors":"J. Moon, Jin-Seong Kim, I. Jung, Su-an Eom","doi":"10.1109/CIC.2016.072","DOIUrl":"https://doi.org/10.1109/CIC.2016.072","url":null,"abstract":"Social Safety Guards, which make up the blind spots or situations of social security network, can be designed and implemented using state-of-the-art technology. This paper proposes a type of Social Safety Guards based on Internet of Things, Simple Safety Guard for convenience store. The Simple Safety Guard is easy to apply and adopt, and can lead to quick handling of urgent situations. It can help the people in danger as soon as possible.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"28 22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125368201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信