138 research outputs found
Graffiti Networks: A Subversive, Internet-Scale File Sharing Model
The proliferation of peer-to-peer (P2P) file sharing protocols is due to
their efficient and scalable methods for data dissemination to numerous users.
But many of these networks have no provisions to provide users with long term
access to files after the initial interest has diminished, nor are they able to
guarantee protection for users from malicious clients that wish to implicate
them in incriminating activities. As such, users may turn to supplementary
measures for storing and transferring data in P2P systems. We present a new
file sharing paradigm, called a Graffiti Network, which allows peers to harness
the potentially unlimited storage of the Internet as a third-party
intermediary. Our key contributions in this paper are (1) an overview of a
distributed system based on this new threat model and (2) a measurement of its
viability through a one-year deployment study using a popular web-publishing
platform. The results of this experiment motivate a discussion about the
challenges of mitigating this type of file sharing in a hostile network
environment and how web site operators can protect their resources
The Beginnings and Prospective Ending of âEnd-to-Endâ: An Evolutionary Perspective On the Internetâs Architecture
The technology of âthe Internetâ is not static. Although its âend-to- endâ architecture has made this âconnection-lessâ communications system readily âextensible,â and highly encouraging to innovation both in hardware and software applications, there are strong pressures for engineering changes. Some of these are wanted to support novel transport services (e.g. voice telephony, real-time video); others would address drawbacks that appeared with opening of the Internet to public and commercial traffic - e.g., the difficulties of blocking delivery of offensive content, suppressing malicious actions (e.g. âdenial of serviceâ attacks), pricing bandwidth usage to reduce congestion. The expected gains from making âimprovementsâ in the core of the network should be weighed against the loss of the social and economic benefits that derive from the âend-to-endâ architectural design. Even where technological âfixesâ can be placed at the networksâ edges, the option remains to search for alternative, institutional mechanisms of governing conduct in cyberspace.
Semantic discovery and reuse of business process patterns
Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse
Recommended from our members
Immigration Enforcement Within the United States
[From Introduction] An estimated 11 million unauthorized aliens reside in the United States, and this population is estimated to increase by 500,000 annually. Each year, approximately 1 million aliens are apprehended trying to enter the United States illegally. Although most of these aliens enter the United States for economic opportunities and family reunification, or to avoid civil strife and political unrest, some are criminals, and some may be terrorists. All are violating the United Statesâ immigration laws
The Economics of Free and Open Source Software: Contributions to a Government Policy on Open Source Software
This document seeks to lay the groundwork for a government policy on free and open source software. We briefly characterize the extent of the open source software phenomenon. We analyse its pros and cons for the government, in its role as both an engine of economic development and a large user of information and communications technologies. We conclude with a series of recommendations for the government, as both âeconomic and industrial policy makerâ and âlarge user.âfree software, intellectual property rights, free source code, open source code, free operating system, GPL licence, BSD licence, innovation, forking,
- âŚ