Search results for "Peer to peer computing"

showing 6 items of 6 documents

Implementation Challenges for Supporting Coworking Virtual Enterprises

2013

The creation of co working alliances is usually restricted to the coworkers in the same workspace. However, they might not necessarily be best partners to take advantage of a collaboration opportunity. To break the spatial constrains and find the best partners irrespective of their co working spaces location, our proposal is to represent and manage the co working alliances as virtual enterprises (VEs) and to develop a multi-agent system (MAS) that serves as Virtual Breeding Environment (VBE). In this paper we provide the basis for the future development of this system. Thus, we introduce the co working VEs distinguishing features and the initial proposals on how to implement the MAS to addr…

AllianceKnowledge managementComputer scienceCo workingbusiness.industryMulti-agent systemHuman resource managementPeer to peer computingWorkspacebusiness2013 IEEE 10th International Conference on e-Business Engineering
researchProduct

Blockchain-Based Proof of Location

2016

Location-Based Services (LBSs) build upon geographic information to provide users with location-dependent functionalities. In such a context, it is particularly important that geographic locations claimed by users are trustworthy. Centralized verification approaches proposed in the last few years are not satisfactory, as they entail a high risk to the privacy of users. In this paper, we present and evaluate a novel decentralized, infrastructure-independent proof-of-location scheme based on blockchain technology. Our scheme guarantees both location trustworthiness and user privacy preservation.

FOS: Computer and information sciencesScheme (programming language)Computer Science - Cryptography and SecurityBlockchainbusiness.industryComputer science020206 networking & telecommunicationsCryptographyContext (language use)02 engineering and technologyComputer securitycomputer.software_genreUser privacyTrustworthinessComputer Science - Distributed Parallel and Cluster Computing020204 information systemsServerC.2.40202 electrical engineering electronic engineering information engineeringPeer to peer computingDistributed Parallel and Cluster Computing (cs.DC)businessCryptography and Security (cs.CR)computercomputer.programming_language2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)
researchProduct

A Survey on Privacy in Decentralized Online Social Networks

2018

Decentralized Online Social Networks (DOSNs) have recently captured the interest of users because of the more control given to them over their shared contents. Indeed, most of the user privacy issues related to the centralized Online Social Network (OSN) services (such as Facebook or Google+) do not apply in the case of DOSNs because of the absence of the centralized service provider. However, these new architectures have motivated researchers to investigate new privacy solutions that allow DOSN’s users to protect their contents by taking into account the decentralized nature of the DOSNs platform. In this survey, we provide a comprehensive overview of the privacy solutions adopted by…

Information privacyData privacy; Decentralized online social network; Access control; Security; Peer to peer computingGeneral Computer ScienceSocial networkbusiness.industryComputer sciencePrivacy policyControl (management)Internet privacyComputer Science (all)020206 networking & telecommunicationsAccess controlPeer to peer computing02 engineering and technologyService providerTheoretical Computer ScienceOverhead (business)0202 electrical engineering electronic engineering information engineeringSecurityDecentralized online social network020201 artificial intelligence & image processingAccess controlEnforcementbusinessData privacy
researchProduct

A trust-based security enforcement in disruption-tolerant networks

2017

We propose an approach to enforce security in disruption- and delay-tolerant networks (DTNs) where long delays, high packet drop rates, unavailability of central trusted entity etc. make traditional approaches unfeasible. We use trust model based on subjective logic to continuously evaluate trustworthiness of security credentials issued in distributed manner by network participants to deal with absence of centralised trusted authorities.

Network packetbusiness.industryComputer science020206 networking & telecommunications02 engineering and technologyComputer securitycomputer.software_genreMedical servicesTrustworthiness020204 information systems0202 electrical engineering electronic engineering information engineeringPeer to peer computingComputational trustUnavailabilitySubjective logicbusinessEnforcementcomputerComputer network2017 9th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS)
researchProduct

Improving Chord Lookup Protocol for P2PSIP-Based Communication Systems

2009

Chord has been suggested as mandatory overlay technology in the future P2PSIP-based communication systems. Chord allows for the available peer/resource lookup in no more than hops, where N is the total number of the peers in the overlay network. However, as a protocol originally designed for background downloading applications, Chord has a few drawbacks when supporting P2PSIP real-time communication systems. These drawbacks are related to ID assignment, the relation between ID and physical location, the routing styles and lack of cache, etc. In this paper, we investigate several approaches that can improve the efficiency of the peer/resource lookup algorithm. After that, we simulate two sys…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSReal time communication systemsOverlay networkOverlayCommunications systemUploadPeer to peer computingCachebusinessChord (peer-to-peer)Computer network2009 International Conference on New Trends in Information and Service Science
researchProduct

Autonomy, Heterogeneity and Trust in Mobile P2P environments

2007

Mobile P2P environments are emerging as a result of rapid expansion of portable terminals that are able to establish direct wireless communication links among themselves. These kinds of terminals are under the control of persons and allowing interactions between their terminals is subject to trust between the individuals and their desire to preserve various aspects of autonomy against each other. In this paper we relate the concepts of node autonomy, heterogeneity and trust with each other, defining also numeric measures for them. We also investigate what kind of interactions (such as transactions, file exchanges) are possible at certain heterogeneity, autonomy and trust level between the t…

business.industryComputer scienceRapid expansionmedia_common.quotation_subjectNode (networking)Control (management)Mobile computingComputer securitycomputer.software_genreTrust levelPeer to peer computingWirelessbusinesscomputerAutonomymedia_common2007 International Conference on Multimedia and Ubiquitous Engineering (MUE'07)
researchProduct