L. Verona, Jonice Oliveira, José Vitor da Cunha Hisse, M.L. Machado Campos
{"title":"Metrics for network power based on Castells’ Network Theory of Power: a case study on Brazilian elections","authors":"L. Verona, Jonice Oliveira, José Vitor da Cunha Hisse, M.L. Machado Campos","doi":"10.1186/s13174-018-0092-5","DOIUrl":"https://doi.org/10.1186/s13174-018-0092-5","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"9 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2018-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-018-0092-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65834340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jeancarlo C. Leão, Michele A. Brandão, Pedro O. S. Vaz de Melo, Alberto H. F. Laender
{"title":"Who is really in my social circle?","authors":"Jeancarlo C. Leão, Michele A. Brandão, Pedro O. S. Vaz de Melo, Alberto H. F. Laender","doi":"10.1186/s13174-018-0091-6","DOIUrl":"https://doi.org/10.1186/s13174-018-0091-6","url":null,"abstract":"Tie strength allows to classify social relationships and identify different types of them. For instance, social relationships can be classified as persistent and similar based respectively on the regularity with which they occur and the similarity among them. On the other hand, rare and somewhat similar relationships are random and cause noise in a social network, thus hiding the actual structure of the network and preventing an accurate analysis of it. In this article, we propose a method to handle social network data that exploits temporal features to improve the detection of communities by existing algorithms. By removing random relationships, we observe that social networks converge to a topology with more pure social relationships and better quality community structures.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"15 1","pages":"1-17"},"PeriodicalIF":3.5,"publicationDate":"2018-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Carlos Eduardo Da Silva, Thomás Diniz, Nelio Cacho, Rogério de Lemos
{"title":"Self-adaptive authorisation in OpenStack cloud platform","authors":"Carlos Eduardo Da Silva, Thomás Diniz, Nelio Cacho, Rogério de Lemos","doi":"10.1186/s13174-018-0090-7","DOIUrl":"https://doi.org/10.1186/s13174-018-0090-7","url":null,"abstract":"Although major advances have been made in protection of cloud platforms against malicious attacks, little has been done regarding the protection of these platforms against insider threats. This paper looks into this challenge by introducing self-adaptation as a mechanism to handle insider threats in cloud platforms, and this will be demonstrated in the context of OpenStack. OpenStack is a popular cloud platform that relies on Keystone, its identity management component, for controlling access to its resources. The use of self-adaptation for handling insider threats has been motivated by the fact that self-adaptation has been shown to be quite effective in dealing with uncertainty in a wide range of applications. Insider threats have become a major cause for concern since legitimate, though malicious, users might have access, in case of theft, to a large amount of information. The key contribution of this paper is the definition of an architectural solution that incorporates self-adaptation into OpenStack Keystone in order to handle insider threats. For that, we have identified and analysed several insider threats scenarios in the context of the OpenStack cloud platform, and have developed a prototype that was used for experimenting and evaluating the impact of these scenarios upon the self-adaptive authorisation system for the cloud platforms.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"48 1","pages":"1-17"},"PeriodicalIF":3.5,"publicationDate":"2018-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Caetano, H. S. Lima, Mateus F. Santos, H. T. Marques-Neto
{"title":"Using sentiment analysis to define twitter political users’ classes and their homophily during the 2016 American presidential election","authors":"J. Caetano, H. S. Lima, Mateus F. Santos, H. T. Marques-Neto","doi":"10.1186/s13174-018-0089-0","DOIUrl":"https://doi.org/10.1186/s13174-018-0089-0","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"9 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2018-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-018-0089-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65834270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanna Mäenpää, Simo Mäkinen, Terhi Kilamo, Tommi Mikkonen, Tomi Männistö, Paavo Ritala
{"title":"Organizing for openness: six models for developer involvement in hybrid OSS projects","authors":"Hanna Mäenpää, Simo Mäkinen, Terhi Kilamo, Tommi Mikkonen, Tomi Männistö, Paavo Ritala","doi":"10.1186/s13174-018-0088-1","DOIUrl":"https://doi.org/10.1186/s13174-018-0088-1","url":null,"abstract":"This article examines organization and governance of commercially influenced Open Source Software development communities by presenting a multiple-case study of six contemporary, hybrid OSS projects. The findings provide in-depth understanding on how to design the participatory nature of the software development process, while understanding the factors that influence the delicate balance of openness, motivations, and governance. The results lay ground for further research on how to organize and manage developer communities where needs of the stakeholders are competing, yet complementary.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"19 1","pages":"1-14"},"PeriodicalIF":3.5,"publicationDate":"2018-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"B-space: dynamic management and assurance of open systems of systems","authors":"Daniel Schneider, Mario Trapp","doi":"10.1186/s13174-018-0084-5","DOIUrl":"https://doi.org/10.1186/s13174-018-0084-5","url":null,"abstract":"Connected cars, freely configurable operating rooms, or autonomous harvesting fleets: dynamically emerging open systems of systems will shape a new generation of systems opening up a vast potential for new kinds of applications. In light of the hard-to-predict structure and behavior of such systems, assuring their safety will require some disruptive changes of established safety paradigms. Combining current research results from different disciplines with industrial experience, this paper dares to think out of the box and look beyond the limits of traditional safety assurance. It structures upcoming challenges posed by the emergence of open systems of systems, tries to shift existing paradigms to meet those new challenges, and proposes an abstract conceptual framework building on comprehensive interlinked multi-concern runtime models for dynamically assuring the safety as well as other properties of open systems of systems. As there currently is no comprehensive realization of the framework, we discuss what kind of approaches could fit into which parts of the framework and exemplify this for the case of conditional safety certificates.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"23 1","pages":"1-16"},"PeriodicalIF":3.5,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Karima Velasquez, David Perez Abreu, Marcio R. M. Assis, Carlos Senna, Diego F. Aranha, Luiz F. Bittencourt, Nuno Laranjeiro, Marilia Curado, Marco Vieira, Edmundo Monteiro, Edmundo Madeira
{"title":"Fog orchestration for the Internet of Everything: state-of-the-art and research challenges","authors":"Karima Velasquez, David Perez Abreu, Marcio R. M. Assis, Carlos Senna, Diego F. Aranha, Luiz F. Bittencourt, Nuno Laranjeiro, Marilia Curado, Marco Vieira, Edmundo Monteiro, Edmundo Madeira","doi":"10.1186/s13174-018-0086-3","DOIUrl":"https://doi.org/10.1186/s13174-018-0086-3","url":null,"abstract":"Recent developments in telecommunications have allowed drawing new paradigms, including the Internet of Everything, to provide services by the interconnection of different physical devices enabling the exchange of data to enrich and automate people’s daily activities; and Fog computing, which is an extension of the well-known Cloud computing, bringing tasks to the edge of the network exploiting characteristics such as lower latency, mobility support, and location awareness. Combining these paradigms opens a new set of possibilities for innovative services and applications; however, it also brings a new complex scenario that must be efficiently managed to properly fulfill the needs of the users. In this scenario, the Fog Orchestrator component is the key to coordinate the services in the middle of Cloud computing and Internet of Everything. In this paper, key challenges in the development of the Fog Orchestrator to support the Internet of Everything are identified, including how they affect the tasks that a Fog service Orchestrator should perform. Furthermore, different service Orchestrator architectures for the Fog are explored and analyzed in order to identify how the previously listed challenges are being tackled. Finally, a discussion about the open challenges, technological directions, and future of the research on this subject is presented.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"254 1","pages":"1-23"},"PeriodicalIF":3.5,"publicationDate":"2018-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vianney Kengne Tchendji, Yannick Florian Yankam, Jean Frédéric Myoupo
{"title":"Conflict-free rerouting scheme through flow splitting for virtual networks using switches","authors":"Vianney Kengne Tchendji, Yannick Florian Yankam, Jean Frédéric Myoupo","doi":"10.1186/s13174-018-0085-4","DOIUrl":"https://doi.org/10.1186/s13174-018-0085-4","url":null,"abstract":"The weaknesses of the Internet led to the creation of a new network paradigm – network virtualization. Virtualization is a very successful technique for sharing and reusing resources, which results in higher efficiency. Despite its advantages, including flexibility in network architecture, virtualization imposes many challenges, such as physical resource allocation to virtual devices. An efficient allocation strategy for these resources can ensure good Quality of Service (QoS) in virtual networks, whether in node or link failure events. This paper presents a conflict-free rerouting scheme with efficient additional capacity usage for link and node failure resilience in a virtual network using switches. Combining an IP Fast Rerouting approach and flow-splitting strategy, this scheme provides short reaction time, stable performance and low complexity because the rerouting calculation and configuration are performed in advance. We show that rerouting by traffic splitting based on the entering arc and destination is sufficient to address all link-failure situations in the network, assuming that the network is two-link connected. After modelling the dimensioning problem as an Integer Linear Programme, we demonstrate through practical implementation of our rerouting scheme on different networks that the scheme can substantially minimize the additional capacity draw on the substrate network. A solution using multiple virtual planes is also provided to solve several conflict problems in the case of simultaneous multiple link failures.","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"24 1","pages":"1-15"},"PeriodicalIF":3.5,"publicationDate":"2018-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Boutaba, M. A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada Solano, O. Rendón
{"title":"A comprehensive survey on machine learning for networking: evolution, applications and research opportunities","authors":"R. Boutaba, M. A. Salahuddin, Noura Limam, Sara Ayoubi, Nashid Shahriar, Felipe Estrada Solano, O. Rendón","doi":"10.1186/s13174-018-0087-2","DOIUrl":"https://doi.org/10.1186/s13174-018-0087-2","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"9 1","pages":"1-99"},"PeriodicalIF":3.5,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-018-0087-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45901951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Edmilson P. da Costa Júnior, Carlos Eduardo da Silva, Marcos Pinheiro, S. Sampaio
{"title":"A new approach to deploy a self-adaptive distributed firewall","authors":"Edmilson P. da Costa Júnior, Carlos Eduardo da Silva, Marcos Pinheiro, S. Sampaio","doi":"10.1186/s13174-018-0083-6","DOIUrl":"https://doi.org/10.1186/s13174-018-0083-6","url":null,"abstract":"","PeriodicalId":46467,"journal":{"name":"Journal of Internet Services and Applications","volume":"9 1","pages":""},"PeriodicalIF":3.5,"publicationDate":"2018-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1186/s13174-018-0083-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"65834212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}