659 research outputs found

    D.3.1 – Privacy Breach Scenarios in SocioPlug

    Get PDF
    GDD_HCERES2020In SocioPlug, we have particular concerns about data protection. Services proposed by SocioPlug will conform to European regulations, during personal data collection and data access. In particular the right to oblivion, collection and access purposes should be explicitly determined by data owners. SocioPlug’s architecture is fully distributed and has no centralized server, thereafter, there is no centralized control about data and applications of users. The goal is to avoid the existence of a “big brother” vigilating every person of the social cloud. Nevertheless, collaboration implies accessing personal data of other users. As services and data will be distributed in a social cloud, participants must be responsible of their data but also of other’s data they collect and use. Thus, they must define usage policies for each shared data and people that collects and uses other’s data must preserve stated policies.From application scenarios described in deliverable D.4.1, in this report, we identify some important privacy breach scenarios that may appear in SocioPlug

    Tracking Federated Queries in the Linked Data

    Get PDF
    Federated query engines allow data consumers to execute queries over the federation of Linked Data (LD). However, as federated queries are decomposed into potentially thousands of subqueries distributed among SPARQL endpoints, data providers do not know federated queries, they only know subqueries they process. Consequently, unlike warehousing approaches, LD data providers have no access to secondary data. In this paper, we propose FETA (FEderated query TrAcking), a query tracking algorithm that infers Basic Graph Patterns (BGPs) processed by a federation from a shared log maintained by data providers. Concurrent execution of thousand subqueries generated by multiple federated query engines makes the query tracking process challenging and uncertain. Experiments with Anapsid show that FETA is able to extract BGPs which, even in a worst case scenario, contain BGPs of original queries

    Personal Linked Data: A Solution to Manage User's Privacy on the Web

    Get PDF
    National audienceWhile using modern applications, personal digital data is spread over hundreds of servers all around the world and users have very poor control over these data. To tackle this issue, based on the semantic Web, we are developing a framework, named Privacy-Lookout, to allow people to be on the lookout for transgressions of their personal data privacy. Concretely, we propose to construct a personal linked data view of individuals to organize and semantically enrich the meta information of their personal data existing in the Web. The mean idea is to allow users to know if the information the Web posses about them respects their privacy principles. This paper introduces the first ideas of such approach

    Evaluating WUW, a service to enhance users' satisfaction in Content-Based Peer-to-Peer Networks

    Get PDF
    International audienceNowadays, Peer-to-Peer (P2P) architectures are becoming more popular in content delivery applications thanks to their valuable characteristics as scalability, performance and low maintenance costs. In those systems, peers share their resources automatically (bandwidth, storage, etc.) and not only download content but also upload content to other peers organized in a neighbourhood. Each peer' neighbourhood is based basically on QoS-related parameters (available bandwidth, number of connections, etc.) and the amount of exchanged content. We consider that peers are under control of users that are autonomous and free persons having rights, preferences and interests. As users' resources are the richness of P2P systems, we think it is important to satisfy their preferences beyond the QoS. In this paper we present first experimental results of WUW (What Users Want), a service located on top of a P2P layer and proposed to satisfy users' preferences during content exchange. In the current implementation we use the BitTorrent protocol for measuring to which extent users' preferences influence the P2P behaviour when WUW is used. We describe how the experimental scenarios are built using the resources provided by Grid'5000. Our preliminary results are encouraging because they show a low overhead of WUW on the global content sharing performance

    Mobile Transaction Supports for DBMS

    Get PDF
    National audienceIn recent years data management in mobile environments has generated a great interest. Several proposals concerning mobile transactions have been done. However, it is very difficult to have an overview of all these approaches. In this paper we analyze and compare several contributions on mobile transactions and introduce our ongoing research: the design and implementation of a Mobile Transaction Service. The focus of our study is on execution models, the manner ACID properties are provided and the way geographical movements of hosts (during transaction executions) is supported

    Exploring the population genetic consequences of the colonization process with spatio-temporally explicit models: insights from coupled ecological, demographic and genetic models in montane grasshoppers

    Full text link
    Understanding the genetic consequences of shifting species distributions is critical for evaluating the impact of climate-induced distributional changes. However, the demographic expansion associated with the colonization process typically takes place across a heterogeneous environment, with population sizes and migration rates varying across the landscape. Here we describe an approach for coupling ecological-niche models (ENMs) with demographic and genetic models to explore the genetic consequences of distributional shifts across a heterogeneous landscape. Analyses of a flightless grasshopper from the sky islands of the Rocky Mountains of North America are used to show how biologically informed predictions can be generated about the genetic consequences of a colonization process across a spatially and temporally heterogeneous landscape (i.e. the suitability of habitats for the montane species differs across the landscape and is itself not static, with the displacement of contemporary populations into glacial refugia). By using (i) ENMs for current climatic conditions and the last glacial maximum to (ii) parameterize a demographic model of the colonization process, which then (iii) informs coalescent simulations, a set of models can be generated that capture different processes associated with distributional shifts. We discuss how the proposed approach for model generation can be integrated into a statistical framework for estimating key demographic parameters and testing hypotheses about the conditions for which distributional shifts may (or may not) enhance species divergence, including the importance of habitat stability, past gene-flow among currently isolated populations, and maintenance of refugial populations in multiple geographic regions.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/79315/1/MEC_4702_sm_Supplemental-Tables.pdfhttp://deepblue.lib.umich.edu/bitstream/2027.42/79315/2/j.1365-294X.2010.04702.x.pd

    An Algorithm Based on the Continuous Wavelet Transform with Splines for the Automatic Measurement of QT Dispersion: Validation and Application in Chronic Kidney Disease

    Get PDF
    Chronic kidney disease (CKD) is considered a risk factor for the development of cardiovascular disease. QT interval is an electrocardiographic parameter that quantifies the duration of ventricular repolarization. An increase of its spatial variability measured from the selected leads of a standard electrocardiogram (ECG), named QT dispersion (QTd), is considered a risk factor for malign ventricular arrhythmias and sudden death in the CKD. An algorithm for automatic measurement of QTd in the ECG leads DI, aVF and V2 using the continuous wavelet transform with splines is presented. Validation of QRS complex detection has been done on records from MIT-BIH database, and the accuracy is 99.5%. Validation of detection of QRS wave onset and T wave end has been done on records from CSE and QT databases, and the measurements were within the tolerance limits for deviations with respect to the manual measurements defined by the experts. The algorithm was applied in two studies. In the first study, QTd was evaluated in normal subjects and patients with CKD. In the second study, QTd was analyzed in patients with CKD before, during and after the hemodialysis treatment. In both studies, the algorithm had a good performance for the QTd analysis

    Performances de protocoles transactionnels en environnement mobile

    Get PDF
    National audience. L'omniprĂ©sence d'unitĂ©s mobiles et le dĂ©veloppement des rĂ©seaux sans fil motivent des avancĂ©es en matiĂšre de supports d'exĂ©cution pour une grande variĂ©tĂ© d'applications en envi-ronnement mobile. Des efforts importants sont faits pour offrir une bonne gestion des donnĂ©es malgrĂ© les caractĂ©ristiques limitĂ©es de tels environnements. La notion de transaction a Ă©tĂ© rĂ©-Ă©tudiĂ©e pour proposer des modĂšles et des protocoles permettant d'assurer certaines propriĂ©tĂ©s transactionnelles. Les algorithmes et protocoles proposĂ©s tentent d'optimiser l'utilisation des ressources des unitĂ©s mobiles et de surmonter les limitations du rĂ©seau mobile. Dans cet article nous nous intĂ©ressons spĂ©cifiquement aux protocoles de validation de transactions rĂ©parties sur plusieurs unitĂ©s dont certaines mobiles. Nous prĂ©sentons ici les rĂ©sultats d'un travail qui iden-tifie des propriĂ©tĂ©s qualitatives et des indices de performance quantitatifs, et Ă©tudie ceux-ci sur quatre protocoles (2PC, UCM, CO2PC et TCOT). Trois de ces protocoles sont des propositions spĂ©cifiques pour des environnements mobiles et sont reprĂ©sentatifs des propositions actuelles. Nous nous intĂ©ressons Ă  la phase de validation des transactions, ainsi qu'Ă  l'influence des dif-fĂ©rents protocoles sur les performances du dĂ©roulement de l'ensemble des transactions. ABSTRACT. This is an abstract. The omnipresence of mobile devices and wireless networks lead to a growing interest in supporting a wide variety of applications in mobile environments. Numerous efforts in providing appropriate data managements for such environments are made. Transaction supports have been revisited to propose adapted transaction models and properties. Proposed algorithms and protocols try to optimise the use of mobile units resources and to overcome wireless network limitations. This work concerns protocols to commit transactions distributed over several mobile and fixed units. Results presented here concern the identification of qualitative properties and quantitative performance indices that are studied on four protocols (2PC, UCM, CO2PC et TCOT). Three of them are specifics propositions for mobile environments and are representative of current proposals. The analysis concerns the transaction validation phase as well as the impact of the protocols on the performances during a transaction execution itself. MOTS-CLÉS : transactions mobiles , evaluation de performances, protocoles de validation

    Trust Evaluation of a System for an Activity

    Get PDF
    International audienceWhen users need to perform a digital activity, they evaluate available systems according to their functionality, ease of use, QoS, and/or economical as- pects. Recently, trust has become another key factor for such evaluation. Two main issues arise in the trust management research community. First, how to de- fine the trust in an entity, knowing that this can be a person, a digital or a physical resource. Second, how to evaluate such value of trust in a system as a whole for a particular activity. Defining and evaluating trust in systems is an open problem because there is no consensus on the used approach. In this work we propose an approach applicable to any kind of system. The distinctive feature of our pro- posal is that, besides taking into account the trust in the different entities the user depends on to perform an activity, it takes into consideration the architecture of the system to determine its trust level. Our goal is to enable users to have a per- sonal comparison between different systems for the same application needs and to choose the one satisfying their expectations. This paper introduces our approach, which is based on probability theory, and presents ongoing results

    System Modeling and Trust Evaluation of Distributed Systems

    Get PDF
    International audienceNowadays, digital systems are connected through complex architectures. These systems involve persons, physical and digital resources such that we can consider that a system consists of elements from two worlds, the social world and the digital world, and their relations. Users perform activities like chatting, buying, sharing data, etc. Evaluating and choosing appropriate systems involve aspects like functionality, performance, QoS, ease of use, or price. Recently, trust appeared as another key factor for such an evaluation. In this context, we raise two issues, (i) how to formalize the entities that compose a system and their relations for a particular activity? and (ii) how to evaluate trust in a system for this activity? This work proposes answers to both questions. On the one hand, we propose SOCIOPATH, a metamodel based on first order logic, that allows to model a system considering entities of the social and digital worlds and their relations. On the other hand, we propose two approaches to evaluate trust in systems, namely, SOCIOTRUST and SUBJECTIVETRUST. The former is based on probability the- ory to evaluate users’ trust in systems for a given activity. The latter is based on subjective logic to take into account uncertainty in trust values
    • 

    corecore