Search results for " networking"
showing 10 items of 1264 documents
Improving RF Fingerprinting Methods by Means of D2D Communication Protocol
2019
Radio Frequency (RF) fingerprinting is widely applied for indoor positioning due to the existing Wi-Fi infrastructure present in most indoor spaces (home, work, leisure, among others) and the widespread usage of smartphones everywhere. It corresponds to a simple idea, the signal signature in a location tends to be stable over the time. Therefore, with the signals received from multiple APs, a unique fingerprint can be created. However, the Wi-Fi signal is affected by many factors which degrade the positioning error range to around a few meters. This paper introduces a collaborative method based on device-to-device (D2D) communication to improve the positioning accuracy using only fingerprin…
A formal model based on Game Theory for the analysis of cooperation in distributed service discovery
2016
New systems can be designed, developed, and managed as societies of agents that interact with each other by offering and providing services. These systems can be viewed as complex networks where nodes are bounded rational agents. In order to deal with complex goals, they require cooperation of the other agents to be able to locate the required services. The aim of this paper is formally and empirically analyze under which circumstances cooperation emerges in decentralized search of services. We propose a repeated game model that formalizes the interactions among agents in a search process where agents are free to choose between cooperate or not in the process. Agents make decisions based on…
Implications of Theories of Language for Information Systems
1985
This article demonstrates how language views can be adopted into an information systems context. We distinguish here between five language views: denotational, generative, cognitive, behavioristic, and interactionist. These views differ in their assumptions about he origin of linguistic behavior, the primary functions of language, elements of language, and the nature of linguistic knowledge. Information system development approaches can be characterized by their underlying language views. This explains great differences in development methods and research. Thus, language views have implications and should be chosen continency for a given information system context.
Identity and Access Management for Remote Maintenance Services in Business Networks
2007
Access to information systems across corporate boundaries with high demands to privacy and trust result into ambitious research and development targets. This study provides motivation and a roadmap for approaching integrated security management solutions in a business network of partners with heterogeneous ICT and security infrastructures. We aim at describing specifics of identity and access management in inter-organizational collaboration, and a vision and arguments for identity and access management in a business network. A case study with Metso Paper, Inc., the leading manufacturer of paper machinery and related services, validates the results, thus providing a motivating example of the…
The Evolution of Blockchain Virtual Machine Architecture Towards an Enterprise Usage Perspective
2019
Virtualization in the context of blockchain systems represents an essential phase in the development and migration of services from public chains to enterprise logic. Most of the ongoing blockchain uses-cases are using the existing public ledgers, but for business products and services, there is a need for custom tailored solutions to ensure flexibility and security. The Ethereum Virtual Machine has opened new ways to solve problems that require a public proof by executing logic on a decentralized ecosystem. In a natural evolutive process, virtualization logic was shaped by numerous architectures and business requirements. Beside performance and scalability, enterprise virtual machines are …
Distributed Coverage of Ego Networks in F2F Online Social Networks
2016
Although most online social networks rely on a centralized infrastructure, several proposals of Distributed Online Social Networks (DOSNs) have been recently presented. Since in DOSNs user profiles are stored on the peers of the users belonging to the network, one of the main challenges comes from guaranteeing the profile availability when the owner of the data is not online. In this paper, we propose a DOSN based on a friend-to-friend P2P overlay where the user's data is stored only on friend peers. Our approach is based on the ego-network concept, which models the social network from the local point of view of a single user. We propose a distributed algorithm which is based on the notion …
Privacy and temporal aware allocation of data in decentralized online social networks
2017
Distributed Online Social Networks (DOSNs) have recently been proposed to grant users more control over the data they share with the other users. Indeed, in contrast to centralized Online Social Networks (such as Facebook), DOSNs are not based on centralized storage services, because the contents shared by the users are stored on the devices of the users themselves. One of the main challenges in a DOSN comes from guaranteeing availability of the users' contents when the data owner disconnects from the network. In this paper, we focus our attention on data availability by proposing a distributed allocation strategy which takes into account both the privacy policies defined on the contents an…
A Survey on Privacy in Decentralized Online Social Networks
2018
Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…
An Efficient and Secure Multidimensional Data Aggregation for Fog-Computing-Based Smart Grid
2021
International audience; The secure multidimensional data aggregation (MDA) has been widely investigated in smart grid for smart cities. However, previous proposals use heavy computation operations either to encrypt or to decrypt the multidimensional data. Moreover, previous fault-tolerant mechanisms lead to an important computation cost, and also a high communication cost when considering a separate identification phase. In this article, we propose an efficient and secure MDA scheme, named ESMA. Unlike existing schemes, the multidimensional data in ESMA are structured and encrypted into a single Paillier ciphertext and thereafter, the data are efficiently decrypted. For privacy preserving, …