50 research outputs found

    HiTrust: building cross-organizational trust relationship based on a hybrid negotiation tree

    Get PDF
    Small-world phenomena have been observed in existing peer-to-peer (P2P) networks which has proved useful in the design of P2P file-sharing systems. Most studies of constructing small world behaviours on P2P are based on the concept of clustering peer nodes into groups, communities, or clusters. However, managing additional multilayer topology increases maintenance overhead, especially in highly dynamic environments. In this paper, we present Social-like P2P systems (Social-P2Ps) for object discovery by self-managing P2P topology with human tactics in social networks. In Social-P2Ps, queries are routed intelligently even with limited cached knowledge and node connections. Unlike community-based P2P file-sharing systems, we do not intend to create and maintain peer groups or communities consciously. In contrast, each node connects to other peer nodes with the same interests spontaneously by the result of daily searches

    Making Legacy LMS adaptable using Policy and Policy templates

    Get PDF
    Koesling, A., Herder, E., De Coi, J., & Abel, F. (2008). Making Legacy LMS adaptable using Policy and Policy templates. In J. Baumeister & M. Atzmüller, Proceedings of the 16th Workshop on Adaptivity and User Modeling in Interactive System, ABIS 2008 (pp. 35-40). October, 6-8, 2008, Würzburg, Germany: University of Würzburg. Website with link to proceedings: http://lwa08.informatik.uni-wuerzburg.de/Wiki.jsp?page=FGABIS08In this paper, we discuss how users and designers of existing learning management systems (LMSs) can make use of policies to enhance adaptivity and adaptability. Many widespread LMSs currently only use limited and proprietary rule systems defining the system behaviour. Personalization of those systems is done based on those rule systems allowing only for fairly restricted adaptation rules. Policies allow for more sophisticated and flexible adaptation rules, provided by multiple stakeholders and they can be integrated into legacy systems. We present the benefits and feasibility of our ongoing approach of extending an existing LMS with policies. We will use the LMS ILIAS as a hands-on example to allow users to make use of system personalization.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org

    Web Rule Languages to Carry Policies

    Full text link
    Recent efforts in the area of Web policy languages show concerns on how to better represent both context and rules of a domain to deal with large number of resources and users. Interaction between domains with different business rules is also another questionable issue in this same area. Web rule languages have been recently introduced as a means to facilitate interaction between parties with dissimilar policies and business rules. Efforts have been placed to further review the possibility of the proposed solutions and extend them to work with other Web technologies. In this paper, we introduce REWERSE Rule Markup Language (R2ML) as a Web rule language that can be employed to make concepts, policies, and elements of a domain digestible by another domain through the use of vocabularies, rules, and annotations. We also show how R2ML elements can model the concepts and elements of different policy languages and assist systems with diverse policies with their interactions. 1

    Dialectics of war in 21st century: character and tendencies

    Get PDF
    В статье актуализированы формы и методы ведения вооруженного противоборства в контексте изменившейся военно-политической ситуации. Авторы акцентируют внимание на широком применении «гибридных» технологий в войнах и вооруженных конфликтах современности. Подчеркивается необходимость учета диалектики и тенденций вооруженного противоборства современности в целях обеспечения военной безопасности государства.The purpose of this article is to highlight forms and methods of warfare in the context of changed military and political situations. Authors emphasize widespread use of «hybrid» technologies in modern wars and armed conflicts. It is necessary to take dialectics and tendencies of modern armed confrontation into consideration in order to achieve military security of state

    Let the Computer Say NO! The Neglected Potential of Policy Definition Languages for Data Sovereignty

    Get PDF
    During interaction with today’s internet services and platform ecosystems, consumer data is often harvested and shared without their consent; that is, consumers seized to be the sovereigns of their own data with the proliferation of the internet. Due to the rapid and abundant nature of interactions in today’s platform ecosystems, manual consent management is impractical. To support development of semi-automated solutions for reestablishing data sovereignty, we investigate the use of policy definition languages as machine-readable and enforceable mechanisms for fostering data sovereignty. We conducted a realist literature review of the capabilities of policy definition languages developed for pertinent application scenarios (e.g., for access control in cloud computing). We consolidate extant literature into a framework of the chances and challenges of leveraging policy definition languages as central building blocks for data sovereignty in platform ecosystems

    A Survey on Trust Computation in the Internet of Things

    Get PDF
    Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things

    Reputation Based Trust Management System Supporting Collaboration in a Medical Application

    Get PDF
    In a small group of people it is quite easy to start a collaboration based on shared trust, because people quickly recognize quality of each other. But this is not true when we move to the highly distributed environment with hundreds of users, not only from one institution or town, but even from different countries. It becomes very complicated task to distinguish experienced an trusted people from malicious users. In the paper a reputation system proposed particularly for a medical environment supporting collaboration among physicians is presented. The system provides tools for sharing knowledge and expertize in form of modules which can be seamlessly connected to each other provided more advanced functionality. The reputation system is designed to help physicians selecting the right (the most reliable) module from set of all modules within the system. The selection is made on trust being managed by the proposed reputation system

    Populist positions in party competition: Do parties strategically vary their degree of populism in reaction to vote and office loss?

    Full text link
    This paper assesses how parties strategically vary their populist positions in party competition. The useful conceptualization of populism as a matter of degree has been established by previous studies. However, we know little about the conditions that drive parties to alter their degree of populism and, importantly, whether this varies between mainstream and populist parties. This paper analyzes the impact of vote and office loss on parties’ populist position-taking. It draws upon German and Austrian parliamentary debate speeches from the 1990s until 2018. Populism is measured using a dictionary method, an automated text analysis approach. The results show that parties react to contextual incentives by altering their degree of populism. Mainstream and populist parties are more populist when in opposition. Electoral losses affect mainstream and populist parties less clearly. The contribution of this paper is to integrate research on populism with a theoretical framework on party competition

    A System to Filter Unwanted Messages from OSN User Walls

    Get PDF
    This paper proposes a system allowing OSN users to have a direct control on the messages posted on their walls. This is achieved through a flexible rule-based system, that allows users to customize the filtering criteria to be applied to their walls, and a Machine Learning based soft classifier automatically labeling messages in support of content-based filtering
    corecore