2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)最新文献

筛选
英文 中文
Using the Social Network Internet of Things to Mitigate Public Mass Shootings 利用社交网络物联网减轻公共大规模枪击事件
Irena Gao
{"title":"Using the Social Network Internet of Things to Mitigate Public Mass Shootings","authors":"Irena Gao","doi":"10.1109/CIC.2016.073","DOIUrl":"https://doi.org/10.1109/CIC.2016.073","url":null,"abstract":"We introduce an intelligent, Internet of Things-based decision support system to evacuate civilians during internal mass shootings in public buildings. Our system is an auction model using a network of doors and rooms. During the emergency, door agents bid against neighboring doors using their safety level. Users are alerted about the safest doors and evacuate. The system is dynamic, avoids the attacker, prevents crowd congestion, and minimizes evacuee panic. We present the protocol and study its application in a sample environment, which attests to its effectiveness.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets tweetriple:了解你的推特用户和你推文的影响
A. Dennett, S. Nepal, Cécile Paris, B. Robinson
{"title":"TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets","authors":"A. Dennett, S. Nepal, Cécile Paris, B. Robinson","doi":"10.1109/CIC.2016.043","DOIUrl":"https://doi.org/10.1109/CIC.2016.043","url":null,"abstract":"Social media platforms have become a main stream communication medium, and many organisations, including government agencies, now routinely employ both Twitter and Facebook to disseminate information and engage with their customer base. A few questions then arise, e.g., what is the effectiveness of one's engagement on social media? Who is being reached? Is it the intended audience? What is the impact? Or, as some ask, what is the Return on Investment (ROI)? In our work, we are attempting to answer these questions. We suggest that the ROI is multifaceted, and present a framework (CAMIO) to study it. We also describe a system, called TweetRipple, built on CAMIO to support for people to start answering these questions.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134166256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library 通过重构Chromium库来强化Android应用中的OAuth-WebView实现
Fadi Mohsen, Mohamed Shehab
{"title":"Hardening the OAuth-WebView Implementations in Android Applications by Re-Factoring the Chromium Library","authors":"Fadi Mohsen, Mohamed Shehab","doi":"10.1109/CIC.2016.036","DOIUrl":"https://doi.org/10.1109/CIC.2016.036","url":null,"abstract":"Today, the Open Standard for Authorization (OAuth) is widely used by many service providers such as Google, Github, and Facebook. The OAuth-WebView implementation is the most widely used approach despite explicit warnings to the developers of its security and privacy risks. Previous researches have discussed these risks and proposed solutions that mandate numerous implementation's changes and/or do not assume strong attacking assumptions. In this work, we introduce SecureOAuth, a whitelist access control protection framework for the Android platform. SecureOAuth is composed of: Android library modifications, service creation, and system app creation. We have implemented a prototype of the SecureOAuth framework and evaluated it on performance and memory overhead. We also showcase examples of security threats that this framework counters. The framework hardens the OAuth-WebView implementation with bounded overhead while keeping the user's involvement to minimum. Moreover, the framework requires no implementations' changes and it assumes attackers with advanced and expert skill levels.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133415298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Statistical Verification of Process Conformance Based on Log Equality Test 基于日志相等性检验的过程一致性统计验证
Hyerim Bae, Sunghyun Sim, Yulim Choi, Ling Liu
{"title":"Statistical Verification of Process Conformance Based on Log Equality Test","authors":"Hyerim Bae, Sunghyun Sim, Yulim Choi, Ling Liu","doi":"10.1109/CIC.2016.040","DOIUrl":"https://doi.org/10.1109/CIC.2016.040","url":null,"abstract":"In Big data and IoT environments, a huge-sized data is created as the result of process execution, some of which are generated by sensors. The main issue of such application has been to analyze the data in order to suggest enhancements to the process. Evaluation of the conformance of process models is of great importance in this regard. For this purpose, previous studies in process mining approach suggested conformance checking by measuring fitness that uses token replay and node-arc relations based on Petri net. However, fitness thus far has not considered statistical significance, but just offers a numeric ratio. We herein propose a statistical verification based on the Kolmogorov-Smirnov test to judge whether two different log data sets are following the same process model. Our method can also judge that a set of event log data is following a process model by playing out the model and generating event log data from the model. We also propose a new concept of 'Maximum Confidence Dependency' to solve the problem of the trade-off between model abstraction and process conformance. We expect that our method can be widely used in many applications which deal with business process enhancement by analyzing process model and execution log.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114443146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users 邀请论文:网络用户的矛盾隐私行为模型
C. Griffin, S. Rajtmajer, A. Squicciarini
{"title":"Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users","authors":"C. Griffin, S. Rajtmajer, A. Squicciarini","doi":"10.1109/CIC.2016.037","DOIUrl":"https://doi.org/10.1109/CIC.2016.037","url":null,"abstract":"Recent privacy research has identified some paradoxical behavior that online users often display, such as claiming to be conservative and then actually oversharing. In particular, recent work by Brandimarte et al. discussed an apparent privacy paradox in online interactions. According to the study, users tend to over-disclose private information if they perceive to have control over the disclosure of their content. In this paper, we formally explain this apparent paradox in user privacy behavior as a straightforward optimization of comfort with sharing and perceived control. We describe the interests of a social network site in managing user privacy options. Namely, a site seeks to maximize perceived user control, while managing costs associated with providing that control. Furthermore, we extend the discussion for the case of ynamic time, and study an optimal control problem for the site as it tries to allocate resources toward user privacy control.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114612884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Trip Route Planning for Bicycle-Sharing Systems 自行车共享系统的出行路线规划
Jiawei Zhang, Philip S. Yu
{"title":"Trip Route Planning for Bicycle-Sharing Systems","authors":"Jiawei Zhang, Philip S. Yu","doi":"10.1109/CIC.2016.057","DOIUrl":"https://doi.org/10.1109/CIC.2016.057","url":null,"abstract":"Bicycle-sharing systems (BSSs) offering shared bike usages to the public are becoming more and more popular nowadays. In bicycle-sharing systems, people can borrow and return bikes at any bike stations in the service region, but the free-ride time is usually limited. Therefore, for long-distance bike trips, individuals need to pre-schedule the bike trip route in advance and change the bike within the free-ride time so no over-time fees will be charged. In this paper, we will study the trip route planning problem for individuals when using the bicycle-sharing systems. Given the trip origin and destination, we aim at identifying the optimal trip route from the origin to the destination through the bike stations. To address the problem, we conduct a thorough analysis about an existing BSS, Divvy, launched in Chicago. Based on the analysis results, a novel bike route planning framework \"BSSs based Trip rOute Planning\" (STOP) is proposed in this paper, which can identify the optimal trip route by mapping the problem into a minimum-cost network flow problem. Extensive experiments conducted on real-world bicycle-sharing system datasets demonstrate the effectiveness of STOP.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133005189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine 基于属性的OpenStack访问控制扩展及其策略机实现
Smriti Bhatt, Farhan Patwa, R. Sandhu
{"title":"An Attribute-Based Access Control Extension for OpenStack and Its Enforcement Utilizing the Policy Machine","authors":"Smriti Bhatt, Farhan Patwa, R. Sandhu","doi":"10.1109/CIC.2016.019","DOIUrl":"https://doi.org/10.1109/CIC.2016.019","url":null,"abstract":"Role-Based Access Control (RBAC) has been the dominant access control model in industry since the 1990s. It is widely implemented in many applications, including major cloud platforms such as OpenStack, AWS, and Microsoft Azure. However, due to limitations of RBAC, there is a shift towards Attribute-Based Access Control (ABAC) models to enhance flexibility by using attributes beyond roles and groups. In practice, this shift has to be gradual since it is unrealistic for existing systems to abruptly adopt ABAC models, completely eliminating current RBAC implementations.In this paper, we propose an ABAC extension with user attributes for the OpenStack Access Control (OSAC) model and demonstrate its enforcement utilizing the Policy Machine (PM) developed by the National Institute of Standards and Technology. We utilize some of the PM's components along with a proof-of-concept implementation to enforce this ABAC extension for OpenStack, while keeping OpenStack's current RBAC architecture in place. This provides the benefits of enhancing access control flexibility with support of user attributes, while minimizing the overhead of altering the existing OpenStack access control framework. We present use cases to depict added benefits of our model and show enforcement results. We then evaluate the performance of our proposed ABAC extension, and discuss its applicability and possible performance enhancements.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125955377","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies 如果你不能衡量它,你就不能管理它:走向隐私政策的量化
Manar Alohaly, Hassan Takabi
{"title":"If You Can't Measure It, You Can't Manage It: Towards Quantification of Privacy Policies","authors":"Manar Alohaly, Hassan Takabi","doi":"10.1109/CIC.2016.082","DOIUrl":"https://doi.org/10.1109/CIC.2016.082","url":null,"abstract":"Despite the best efforts of usable privacy community to ease the burden of understanding privacy policies, there is still a lack in having a notice display that helps users to compare different application alternatives based on their data gathering practices. In this work, we propose an approach to quantify the amount of data collection of an application by analyzing its privacy policy text using natural language processing (NLP) techniques. There are in fact numerous use cases for such a quantitative measure, one of which is designing a visceral notice that relies on an experiential approach to communicate privacy information to users. The results show that our quantification approach holds promise. Using our quantification measure, we propose a new display for nano-sized visceral notice in which we leverage user's familiarity with pie chart as a data measuring tool to communicate information about an app's data collection practice.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124880810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware Systems 分布式群件系统中共享数据的多级一致性事务模型
A. Tripathi
{"title":"A Transaction Model with Multilevel Consistency for Shared Data in Distributed Groupware Systems","authors":"A. Tripathi","doi":"10.1109/CIC.2016.041","DOIUrl":"https://doi.org/10.1109/CIC.2016.041","url":null,"abstract":"In groupware systems a broad range of requirements for user coordination and data consistency need to be supported. The notions of event causality and user awareness are central in such requirements. Traditional transaction models supported in general purpose database management systems with strong consistency guarantees have been found to be unsuitable for groupware systems. Weaker models for data consistency are needed for user awareness and cooperative activities. Objects in the shared workspace need to be managed with different consistency guarantees. Towards such requirements, we examine here the applicability of a distributed transaction management model which supports multilevel consistency. The consistency levels supported in this model include serializable transactions for strong consistency and weaker consistency models such as Causal Snapshot Isolation (CSI), CSI with commutative updates, and CSI with asynchronous updates. We review the coordination and data consistency requirements in groupware systems. We show using two examples how replicated shared data in distributed groupware systems can be managed with multiple consistency levels using this model.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130425110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Information Diffusion Analysis of Rumor Dynamics over a Social-Interaction Based Model 基于社会互动模型的谣言动态信息扩散分析
De Wang, A. Musaev, C. Pu
{"title":"Information Diffusion Analysis of Rumor Dynamics over a Social-Interaction Based Model","authors":"De Wang, A. Musaev, C. Pu","doi":"10.1109/CIC.2016.049","DOIUrl":"https://doi.org/10.1109/CIC.2016.049","url":null,"abstract":"Rumors may potentially cause undesirable effect such as the widespread panic in the general public. Especially, with the unprecedented growth of different types of social and enterprise networks, rumors could reach a larger audience than before. Many researchers have proposed different approaches to analyze and detect rumors in social networks. However, most of them either study on theoretical models without real data experiments or use content-based analysis and limited information diffusion analysis without fully considering social interactions. In this paper, we propose a social interaction based model FAST by taking four major properties of social interactions into account including familiarity, activeness, similarity, and trustworthiness. Also, we evaluate our model on real data from Sina Weibo (Twitter-like social network in China), which contains around 200 million tweets and 14 million Weibo users. Based on our model, we create a new metrics Fractional Directed Power Community Index (FD-PCI) derived from μ-PCI to identify the influential spreaders in social networks. FD-PCI shows better performance than conventional metrics such as K-core index and PageRank. Moreover, we obtain interesting influential features to detect rumors by the comparison between rumor and real news dynamics.","PeriodicalId":438546,"journal":{"name":"2016 IEEE 2nd International Conference on Collaboration and Internet Computing (CIC)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128315839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信