859 research outputs found
05411 Abstracts Collection -- Anonymous Communication and its Applications
From 09.10.05 to 14.10.05, the Dagstuhl Seminar 05411 ``Anonymous Communication and its Applications\u27\u27 was held in the International Conference and Research Center (IBFI), Schloss Dagstuhl.
During the seminar, several participants presented their current
research, and ongoing work and open problems were discussed. Abstracts of
the presentations given during the seminar as well as abstracts of
seminar results and ideas are put together in this paper. The first section
describes the seminar topics and goals in general.
Links to extended abstracts or full papers are provided, if available
Lifelong privacy – privacy and identity management for life.
Abstract. The design of identity management preserving an individual's privacy must not stop at supporting the user in managing her/his present identities. Instead, since any kind of privacy intrusion may have implications on the individual's future life, it is necessary that we identify and understand the issues related to longterm aspects of privacyenhancing identity management. Only that way, according solutions can be developed, which enable users to control the disclosure of their personal data throughout their whole lives, comprising past, present, and future. This paper will give a general overview about concepts supporting privacyenhancing identity management. Further, it introduces the reader to the problem field of privacy management by means of privacy-enhancing identity management during various stages of life as well as in various areas of life. Statements about required mechanisms will be given as well as directions regarding the three most important aspects to consider when managing one's identities: communication infrastructure as well as selection of communication partners and tools
Runtime Monitoring of Metric First-order Temporal Properties
We introduce a novel approach to the runtime monitoring of complex
system properties. In particular, we present an online algorithm for
a safety fragment of metric first-order temporal logic that
is considerably more expressive than the logics supported by prior
monitoring methods. Our approach, based on automatic structures,
allows the unrestricted use of negation, universal and existential
quantification over infinite domains, and the arbitrary nesting of
both past and bounded future operators. Moreover, we show how
to optimize our approach for the common case where
structures consist of only finite relations, over possibly infinite
domains. Under an additional restriction, we prove that the space
consumed by our monitor is polynomially bounded by the cardinality
of the data appearing in the processed prefix of the temporal
structure being monitored
Domino: exploring mobile collaborative software adaptation
Social Proximity Applications (SPAs) are a promising new area for ubicomp software that exploits the everyday changes in the proximity of mobile users. While a number of applications facilitate simple file sharing between co–present users, this paper explores opportunities for recommending and sharing software between users. We describe an architecture that allows the recommendation of new system components from systems with similar histories of use. Software components and usage histories are exchanged between mobile users who are in proximity with each other. We apply this architecture in a mobile strategy game in which players adapt and upgrade their game using components from other players, progressing through the game through sharing tools and history. More broadly, we discuss the general application of this technique as well as the security and privacy challenges to such an approach
The Impossibility Of Secure Two-Party Classical Computation
We present attacks that show that unconditionally secure two-party classical
computation is impossible for many classes of function. Our analysis applies to
both quantum and relativistic protocols. We illustrate our results by showing
the impossibility of oblivious transfer.Comment: 10 page
Towards quantum-based privacy and voting
The privacy of communicating participants is often of paramount importance,
but in some situations it is an essential condition. A typical example is a
fair (secret) voting. We analyze in detail communication privacy based on
quantum resources, and we propose new quantum protocols. Possible
generalizations that would lead to voting schemes are discussed.Comment: 5 pages, improved description of the protoco
Framework für die Entwicklung einer universellen kollaborativen eLearning-Plattform
Mit dem Begriff des eLearnings verknüpfen sich viele sehr unterschiedliche Konzepte, die auf Grund ihrer spezifischen Ausprägung häufig Grenzen für ihre Benutzung errichten. Um diese zu überwinden, wurde ein Framework konzipiert und implementiert, welches den Anspruch der Universalität in Hinblick auf Anwendungs- und Inhaltsorganisation sowie Funktionalität erhebt. In der kollaborativen eLearning-Plattform BluES erfuhr das Framework eine Beispielimplementierung. Diese diente gleichzeitig als Grundlage für die Validierung unterschiedlicher Aspekte des Frameworks. Als Ergebnis der Arbeit konnte gezeigt werden, dass maximale Flexibilität der Anwendung durch die Systemarchitektur gewährleistet werden kann. Dadurch werden Restriktionen in der Gestaltung der Anwendungsumgebung vermieden und die Anwender bei der Detailkonzeption ihrer Arbeit flexibel unterstützt
Visually Analyzing Company-wide Software Service Dependencies: An Industrial Case Study
Managing dependencies between software services is a crucial task for any
company operating cloud applications. Visualizations can help to understand and
maintain these complex dependencies. In this paper, we present a force-directed
service dependency visualization and filtering tool that has been developed and
used within SAP. The tool's use cases include guiding service retirement as
well as understanding service deployment landscapes and their relationship to
the company's organizational structure. We report how we built and adapted the
tool under strict time constraints to address the requirements of our users. We
further share insights on how we enabled internal adoption. For us, starting
with a minimal viable visualization and then quickly responding to user
feedback was essential for convincing users of the tool's value. The final
version of the tool enabled users to visually understand company-wide service
consumption, supporting data-driven decision making.Comment: 5 pages, 3 figures, 1 table, 11th IEEE Working Conference on Software
Visualization (VISSOFT 2023
- …