With computing increasingly becoming more dispersed, relying on mobile devices, distributed computing, cloud computing, etc. there is an increasing threat from adversaries obtaining physical access to some of the comp...
详细信息
privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quite difficult for average users. This de...
详细信息
ISBN:
(纸本)9781450302449
privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quite difficult for average users. This demonstration illustrates a machine learning privacy wizard, or recommendation tool, that we have built at the University of Michigan. The wizard is based on the underlying observation that real users conceive their privacy preferences (which friends should see which data items) based on an implicit structure. Thus, after asking the user a limited number of carefully-chosen questions, it is usually possible to build a machine learning model that accurately predicts the user's privacy preferences. This model, in turn, can be used to recommend detailed privacy settings for the user. Our demonstration wizard runs as a third-party Facebook application. conference attendees will be able to "test-drive" the wizard by installing it on their own Facebook accounts.
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protection of private and personal informatio...
详细信息
The proceedings contain 14 papers. The topics discussed include: authentication in the clouds: a framework and its application to mobile users;content oriented virtual domains for secure information sharing across org...
ISBN:
(纸本)9781450300896
The proceedings contain 14 papers. The topics discussed include: authentication in the clouds: a framework and its application to mobile users;content oriented virtual domains for secure information sharing across organizations;towards a discipline of mission-aware cloud computing;remote data checking for network coding-based distributed storage systems;seeding clouds with trust anchors;privacy preserving EHR system using attribute-based infrastructure;privacy preserving mapping schemes supporting comparison;HengHa: data harvesting detection on hidden databases;a new form of DOS attack in a cloud and its avoidance mechanism;towards incident handling in the cloud: challenges and approaches;first principles vulnerability assessment;and security audits of multi-tier virtual infrastructures in public infrastructure clouds.
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in the cloud. Such hybrid architectures ena...
详细信息
ISBN:
(纸本)9781450302012
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in the cloud. Such hybrid architectures enable enterprises to benefit from cloud-based architectures, while honoring application performance requirements, and privacy restrictions on what services may be migrated to the cloud. We make several contributions. First, we highlight the complexity inherent in enterprise applications today in terms of their multi-tiered nature, large number of application components, and interdependencies. Second, we have developed a model to explore the benefits of a hybrid migration approach. Our model takes into account enterprise-specific constraints, cost savings, and increased transaction delays and wide-area communication costs that may result from the migration. Evaluations based on real enterprise applications and Azure-based cloud deployments show the benefits of a hybrid migration approach, and the importance of planning which components to migrate. Third, we shed insight on security policies associated with enterprise applications in data centers. We articulate the importance of ensuring assurable reconfiguration of security policies as enterprise applications are migrated to the cloud. We present algorithms to achieve this goal, and demonstrate their efficacy on realistic migration scenarios.
The proceedings contain 19 papers. The topics discussed include: adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;a dynamic data middleware cache for rapidly-growing scie...
ISBN:
(纸本)3642169546
The proceedings contain 19 papers. The topics discussed include: adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;a dynamic data middleware cache for rapidly-growing scientific repositories;anonygator: privacy and integrity preserving data aggregation;middleware for a re-configurable distributed archival store based on secret sharing;parametric subscriptions for content-based publish/subscribe networks;the gossple anonymous social network;prometheus: user-controlled P2P social data management for socially-aware applications;bridging the gap between legacy services and web services;enforcing end-to-end applicationsecurity in the cloud;distributed middleware enforcement of event flow security policy;automatically generating symbolic prefetches for distributed transactional memories;and asynchronous lease-based replication of software transactional memory.
The proceedings contain 118 papers. The topics discussed include: wikipedia and how to use it for semantic document representation;game theory for security: lessons learned from deployed applications;Bees swarm optimi...
ISBN:
(纸本)9780769541914
The proceedings contain 118 papers. The topics discussed include: wikipedia and how to use it for semantic document representation;game theory for security: lessons learned from deployed applications;Bees swarm optimization based approach for web information retrieval;approximate representations in the medical domain;using web-intelligence for excavating the emerging meaning of target-concepts;a computational cognitive model for simulating heuristics retrieval in human problem solving;stochastic simulation of web users;expertise matching via constraint-based optimization;enabling self-organising service level management with automated negotiation;integrating provenance information in reservoir engineering;how to improve your Google ranking: myths and reality;image set classification using multi-layer multiple instance learning with application to cannabis website classification;and towards fully distributed and privacy-preserving recommendations via expert collaborative filtering and RESTful linked data.
The use of electronic health record (EHR) systems by medical professionals enables the electronic exchange of patient data, yielding cost and quality of care benefits. The United States American Recovery and Reinvestm...
详细信息
The proceedings contain 19 papers. The special focus in this conference is on Cloud computing, data management, Publish-Subscribe and Multicast Systems, Social and location-aware middleware, Reliability and legacy, Tr...
ISBN:
(纸本)3642169546
The proceedings contain 19 papers. The special focus in this conference is on Cloud computing, data management, Publish-Subscribe and Multicast Systems, Social and location-aware middleware, Reliability and legacy, Trust and security and Transactional memory. The topics include: A slot allocation scheduling optimizer for mapreduce workloads;adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;enforcing power budget in shared data centers;a dynamic data middleware cache for rapidly-growing scientific repositories;privacy and integrity preserving data aggregation;middleware for a re-configurable distributed archival store based on secret sharing;parametric subscriptions for content-based publish/subscribe networks;a flexible infrastructure for wide-area collaborative applications;fast, reliable application layer multicast for flash dissemination;the gossple anonymous social network;user-controlled P2P social data management for socially-aware applications;a translucent positioning middleware supporting adaptation of internal positioning processes;fault localization in large-scale Peer-to-Peer systems;bridging the gap between legacy services and web services;enforcing End-to-End applicationsecurity in the cloud;lightweight freerider-tracking in gossip;distributed middleware enforcement of event flow security policy;automatically generating symbolic prefetches for distributed transactional memories and asynchronous lease-based replication of software transactional memory.
暂无评论