With computing increasingly becoming more dispersed, relying on mobile devices, distributed computing, cloud computing, etc. there is an increasing threat from adversaries obtaining physical access to some of the comp...
详细信息
privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quite difficult for average users. This de...
详细信息
ISBN:
(纸本)9781450302449
privacy is a huge problem for users of social networking sites. While sites like Facebook allow individual users to personalize fine-grained privacy settings, this has proven quite difficult for average users. This demonstration illustrates a machine learning privacy wizard, or recommendation tool, that we have built at the University of Michigan. The wizard is based on the underlying observation that real users conceive their privacy preferences (which friends should see which data items) based on an implicit structure. Thus, after asking the user a limited number of carefully-chosen questions, it is usually possible to build a machine learning model that accurately predicts the user's privacy preferences. This model, in turn, can be used to recommend detailed privacy settings for the user. Our demonstration wizard runs as a third-party Facebook application. conference attendees will be able to "test-drive" the wizard by installing it on their own Facebook accounts.
Recent research in privacy-preserving data mining (PPDM) has become increasingly popular due to the wide application of data mining and the increased concern regarding the protection of private and personal informatio...
详细信息
The proceedings contain 14 papers. The topics discussed include: authentication in the clouds: a framework and its application to mobile users;content oriented virtual domains for secure information sharing across org...
ISBN:
(纸本)9781450300896
The proceedings contain 14 papers. The topics discussed include: authentication in the clouds: a framework and its application to mobile users;content oriented virtual domains for secure information sharing across organizations;towards a discipline of mission-aware cloud computing;remote data checking for network coding-based distributed storage systems;seeding clouds with trust anchors;privacy preserving EHR system using attribute-based infrastructure;privacy preserving mapping schemes supporting comparison;HengHa: data harvesting detection on hidden databases;a new form of DOS attack in a cloud and its avoidance mechanism;towards incident handling in the cloud: challenges and approaches;first principles vulnerability assessment;and security audits of multi-tier virtual infrastructures in public infrastructure clouds.
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in the cloud. Such hybrid architectures ena...
详细信息
ISBN:
(纸本)9781450302012
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in the cloud. Such hybrid architectures enable enterprises to benefit from cloud-based architectures, while honoring application performance requirements, and privacy restrictions on what services may be migrated to the cloud. We make several contributions. First, we highlight the complexity inherent in enterprise applications today in terms of their multi-tiered nature, large number of application components, and interdependencies. Second, we have developed a model to explore the benefits of a hybrid migration approach. Our model takes into account enterprise-specific constraints, cost savings, and increased transaction delays and wide-area communication costs that may result from the migration. Evaluations based on real enterprise applications and Azure-based cloud deployments show the benefits of a hybrid migration approach, and the importance of planning which components to migrate. Third, we shed insight on security policies associated with enterprise applications in data centers. We articulate the importance of ensuring assurable reconfiguration of security policies as enterprise applications are migrated to the cloud. We present algorithms to achieve this goal, and demonstrate their efficacy on realistic migration scenarios.
The proceedings contain 19 papers. The topics discussed include: adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;a dynamic data middleware cache for rapidly-growing scie...
ISBN:
(纸本)3642169546
The proceedings contain 19 papers. The topics discussed include: adapting distributed real-time and embedded pub/sub middleware for cloud computing environments;a dynamic data middleware cache for rapidly-growing scientific repositories;anonygator: privacy and integrity preserving data aggregation;middleware for a re-configurable distributed archival store based on secret sharing;parametric subscriptions for content-based publish/subscribe networks;the gossple anonymous social network;prometheus: user-controlled P2P social data management for socially-aware applications;bridging the gap between legacy services and web services;enforcing end-to-end applicationsecurity in the cloud;distributed middleware enforcement of event flow security policy;automatically generating symbolic prefetches for distributed transactional memories;and asynchronous lease-based replication of software transactional memory.
暂无评论