3,979 research outputs found
A Common API for Transparent Hybrid Multicast
Group communication services exist in a large variety of flavors and technical
implementations at different protocol layers. Multicast data distribution is
most efficiently performed on the lowest available layer, but a heterogeneous
deployment status of multicast technologies throughout the Internet requires
an adaptive service binding at runtime. Today, it is difficult to write an
application that runs everywhere and at the same time makes use of the most
efficient multicast service available in the network. Facing robustness
requirements, developers are frequently forced to use a stable upper-layer
protocol provided by the application itself. This document describes a common
multicast API that is suitable for transparent communication in underlay and
overlay and that grants access to the different flavors of multicast. It
proposes an abstract naming scheme that uses multicast URIs, and it discusses
mapping mechanisms between different namespaces and distribution technologies.
Additionally, this document describes the application of this API for building
gateways that interconnect current Multicast Domains throughout the Internet.
It reports on an implementation of the programming Interface, including
service middleware. This document is a product of the Scalable Adaptive
Multicast (SAM) Research Group
An Event Driven Hybrid Identity Management Approach to Privacy Enhanced e-Health
Credential-based authorization offers interesting advantages for ubiquitous scenarios involving limited devices such as sensors and personal mobile equipment: the verification can be done locally; it offers a more reduced computational cost than its competitors for issuing, storing, and verification; and it naturally supports rights delegation. The main drawback is the revocation of rights. Revocation requires handling potentially large revocation lists, or using protocols to check the revocation status, bringing extra communication costs not acceptable for sensors and other limited devices. Moreover, the effective revocation consent—considered as a privacy rule in sensitive scenarios—has not been fully addressed.This paper proposes an event-based mechanism empowering a new concept, the sleepyhead credentials, which allows to substitute time constraints and explicit revocation by activating and deactivating authorization rights according to events. Our approach is to integrate this concept in IdM systems in a hybrid model supporting delegation, which can be an interesting alternative for scenarios where revocation of consent and user privacy are critical. The delegation includes a SAML compliant protocol, which we have validated through a proof-of-concept implementation. This article also explains the mathematical model describing the event-based model and offers estimations of the overhead introduced by the system. The paper focus on health care scenarios, where we show the flexibility of the proposed event-based user consent revocation mechanism.This work was partially founded by the Spanish Ministry of Science and Innovation under the project TEC2010-20572-C02-01 (CONSEQUENCE) and by the State of Madrid (Spain) under the contract number S2009/TIC-1650 (e-Madrid). Moreover, the authors would like to thank to the anonymous referees for comments and recommendations for the paper improvement
Tutorial: Identity Management Systems and Secured Access Control
Identity Management has been a serious problem since the establishment of the Internet. Yet little progress has been made toward an acceptable solution. Early Identity Management Systems (IdMS) were designed to control access to resources and match capabilities with people in well-defined situations, Today’s computing environment involves a variety of user and machine centric forms of digital identities and fuzzy organizational boundaries. With the advent of inter-organizational systems, social networks, e-commerce, m-commerce, service oriented computing, and automated agents, the characteristics of IdMS face a large number of technical and social challenges. The first part of the tutorial describes the history and conceptualization of IdMS, current trends and proposed paradigms, identity lifecycle, implementation challenges and social issues. The second part addresses standards, industry initia-tives, and vendor solutions. We conclude that there is disconnect between the need for a universal, seamless, trans-parent IdMS and current proposed standards and vendor solutions
Dark Patterns in the Design of Games
Game designers are typically regarded as advocates for players. However, a game creator’s interests may not align with the players’. We examine some of the ways in which those opposed interests can manifest in a game’s design. In particular, we examine those elements of a game’s design whose purpose can be argued as questionable and perhaps even unethical. Building upon earlier work in design patterns, we call these abstracted elements Dark Game Design Patterns. In this paper, we develop the concept of dark design patterns in games, present examples of such patterns, explore some of the subtleties involved in identifying them, and provide questions that can be asked to help guide in the specification and identification of future Dark Patterns. Our goal is not to criticize creators but rather to contribute to an ongoing discussion regarding the values in games and the role that designers and creators have in this process
Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study
This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives
- …