27 research outputs found
Trust Put to the Test: a Testcase for a Cognitive Trust Model
International audienceThe wide diffusion of open and decentralized environments like the Web makes it possible for actors to interact with previously unknown peers. As a consequence, trust has become a hot topic in the field of computer science. Many attempts to formalize concepts like trust and reputation have been carried out in the literature, most remarkably the one by Herzig et al. [1]. However, Herzig et al. focus on describing a conceptual framework but do not provide any concrete instantiation of it, thereby not showing any evidence about the effectiveness of their approach. This paper fills the gap by presenting such an instantiation based on agent technologies. Although our instantiation targets a Wikipedia-related scenario and exploits the Jason [2] and CArtAgO [3], [4] frameworks, the methodology we present is general and can be applied to different scenarios and agent technologies
Security control brought back to the user
The activity of the Ph.D. student Juri Luca De Coi involved the research field of policy languages and can be divided in three parts.
The first part of the Ph.D. work investigated the state of the art in policy languages, ending up with:
(i) identifying the requirements up-to-date policy languages have to fulfill;
(ii) defining a policy language able to fulfill such requirements (namely, the Protune policy language); and
(iii) implementing an infrastructure able to enforce policies expressed in the Protune policy language.
The second part of the Ph.D. work focused on simplifying the activity of defining policies and ended up with:
(i) identifying a subset of the controlled natural language ACE to express Protune policies;
(ii) implementing a mapping between ACE policies and Protune policies; and
(iii) adapting the ACE Editor to guide users step by step when defining ACE policies.
The third part of the Ph.D. work tested the feasibility of the chosen approach by applying it to meaningful real-world problems, among which:
(i) development of a security layer on top of RDF stores; and
(ii) efficient policy-aware access to metadata stores.
The research activity has been performed in tight collaboration with the Leibniz Universität Hannover and further European partners within the projects REWERSE, TENCompetence and OKKAM
Making Legacy LMS adaptable using Policy and Policy templates
Koesling, A., Herder, E., De Coi, J., & Abel, F. (2008). Making Legacy LMS adaptable using Policy and Policy templates. In J. Baumeister & M. Atzmüller, Proceedings of the 16th Workshop on Adaptivity and User Modeling in Interactive System, ABIS 2008 (pp. 35-40). October, 6-8, 2008, Würzburg, Germany: University of Würzburg.
Website with link to proceedings: http://lwa08.informatik.uni-wuerzburg.de/Wiki.jsp?page=FGABIS08In this paper, we discuss how users and designers
of existing learning management systems
(LMSs) can make use of policies to enhance
adaptivity and adaptability. Many widespread
LMSs currently only use limited and proprietary
rule systems defining the system behaviour. Personalization
of those systems is done based on
those rule systems allowing only for fairly restricted
adaptation rules. Policies allow for more
sophisticated and flexible adaptation rules, provided
by multiple stakeholders and they can be
integrated into legacy systems. We present the
benefits and feasibility of our ongoing approach
of extending an existing LMS with policies. We
will use the LMS ILIAS as a hands-on example
to allow users to make use of system personalization.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org
User Profile Based Activities in Flexible Processes
International audienceCOOPER platform is a collaborative, open environment that leverages on the idea of flexible, user-centric process support. It allows cooperating team members to define collaborative processes and flexibly modify the process activities even during process execution. In this paper we describe how the incorporation of decentralized user data through mashups, allows the COOPER platform to support the definition and execution of the so called user profile based activities, i.e., process activities that are adapted based on the preferences of the process actors. We define two basic types of user profile based activities, namely user adapted activities and user conditional activities. The first are modeled according to the user profile data, while the second employs the same user data to enable automatic workflow decisions
The Comprehensive Health Information System: a Platform for Privacy-Aware and Social Health Monitoring
International audienceRapid ageing of world population makes the traditional hospitalization therapy more and more expensive, new forms of medical care are hence required. At the same time, the medical community perceives the availability of vital data as an essential prerequisite to acquire objective information about patients. Finally, the patients themselves show willingness to provide such data, in order for their health conditions to be regularly monitored. This paper presents the last developments of the Comprehensive Health Information System (CHISel'd), a platform for continuous health monitoring whose main goal is to show how information technologies can be exploited to provide a feasible alternative to the traditional hospitalization therapy. Remarkable features of CHISel'd are its capability to process patient data according to a dynamically evolving set of data mining techniques and to share them among stakeholders (doctors, researchers, friends...) according to patient-defined access policies and in the frame of e-communities. These features enable CHISel'd to address the needs perceived by patients and the medical community
ID5.15: New Core specifications v2
Mazzetti, A., Dicerto, M., Grigorov, A., Zerr, S., De Coi, J. L., Kawase, R., Perez, M., Roldan, A., Mittal, P. (2009). ID5.15: New Core specifications v2.This document describes the new functionalities for LearnWeb/KRService, which will be implemented in the new version called V0.3 and which will be available in late spring 2009.
The main topics cover: resource functionalities, integration with other TENCompetence tools and social functionalities. This document describes LearnWeb/KRService in terms of:
ARCHITECTURE,
USER INTERFACE,
RESOURCE FUNCTIONALITIES,
INTEGRATION FUNCTIONALITIES,
SOCIAL FUNCTIONALITIES.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org
The TENCompetence approach to authorization
This document contains a software documentation of the TENCompetence Authorization Service.This report is the first version of a document which is meant to track
the progress in authorization-related issues within TENCompetence. It
contains (i) an introduction to the PROTUNE framework (ii) a TENCompetence authorization scenario and (iii) the current state of the implementation.The work on this publication has been sponsored by the TENCompetence Integrated Project that is funded by the European Commission's 6th Framework Programme, priority IST/Technology Enhanced Learning. Contract 027087 [http://www.tencompetence.org
Reputation Put to the Test: a Testcase for a Cognitive Reputation Model
International audienceThe wide diffusion of open and decentralized environments like the Web makes it possible for actors to interact with previously unknown peers. As a consequence, trust has become a hot topic in the field of computer science. Many attempts to formalize concepts like trust and reputation have been carried out in the literature, most remarkably the one by Herzig et al. However, Herzig et al. focus on describing a conceptual framework but do not provide any concrete instantiation of it, thereby not showing any evidence about the effectiveness of their approach. This paper fills the gap by presenting such an instantiation based on agent technologies. Although our instantiation targets a Wikipedia- related scenario and exploits the Jason and CArtAgO frameworks, the methodology we present is general and can be applied to different scenarios and agent technologies