The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today, Online Social Networks (OSNs) are ubiquitous means of communication. In order to prevent the misuse of personal user data by OSN providers, various research efforts have produced a multitude of approaches to decentralize OSNs in the past decade. The most critical challenge for these systems is to replace the infrastructure of centralized OSNs. That is, they need to handle the large amounts...
Billions of users are now inter-connected in Online Social Networks (OSNs) and, as they interact with each other, massive amounts of potentially private data are collected at the OSN providers’ (e.g., Facebook or Twitter) premises. Unfortunately, provider-initiated privacy violations on this data are frequent and there is little chance that the providers will grant users effective data-protection...
Online Social Networks (OSNs) have become a rewarding target for attackers. One particularly popular attack is the Sybil attack, in which the adversary creates many fake accounts called Sybils in order to, for instance, distribute spam or manipulate voting results. A first generation of defense systems tried to detect these Sybils by analyzing changes in the structure of the OSN graph---unfortunately...
Virtualization helps to deploy the functionality of expensive and rigid hardware appliances on scalable virtual resources running on commodity servers. However, optimal resource provisioning for non-trivial services is still an open problem. While there have been efforts to answer the questions of when to provision additional resources in a running service, and how many resources are needed, the question...
Writing network policies for Software Defined Networks (SDNs) is not a straightforward task. Abstractions play a major role in easing this task, but they are typically provided for a particular use case. As a consequence, emerging applications will require the development and implementation of new abstractions, and combining the policies of different abstractions becomes difficult. To offer a simpler...
SDN (Software-Defined Networking) promises easier management of complex networks. In abiding by this promise northbound APIs play a major role, as they provide abstractions to ease the process of writing network applications. As more and more of such abstractions emerge, one challenging task is to orchestrate different policies that originate from different abstractions. In an effort to provide automation...
Summary This article is devoted to a variety of applications of fuzzy models in civil engineering, presenting current work of a group of researchers at the University of Innsbruck. With fuzzy methods and possibility theory as an encompassing framework, the following areas are addressed: uncertainties in geotechnical engineering, fuzzy finite element computation of a foundation raft, fuzzy dynamical...
To achieve a widespread deployment of Software-Defined Networks (SDNs) these networks need to be secure against internal and external misuse. Yet, currently, compromised end hosts, switches, and controllers can be easily exploited to launch a variety of attacks on the network itself. In this work we discuss several attack scenarios, which -- although they have a serious impact on SDN -- have not been...
A Sybil attack can inject many forged identities (called Sybils) to subvert a target system. Because of the severe damage that Sybil attacks can cause to a wide range of networking applications, there has been a proliferation of Sybil defense schemes. Of particular attention are those that explore the online social networks (OSNs) of users in a victim system in different ways. Unfortunately, while...
A Sybil attack can inject many forged identities (called Sybils) to subvert a target system. Among various defense approaches, of particular attention are those that explore the online social networks (OSNs) of users in a target system to detect or tolerate Sybil nodes. Albeit different in their working principle, all these approaches assume it is difficult for an attacker to create attack edges to...
Social networking platforms such as Facebook, MySpace, and Twitter have seen a significant increase in user population and user provided information. However, users are increasingly concerned about identity and data privacy since information is controlled by single companies. To address this issue researchers investigated alternative solutions, where the users' data, e.g. profile information, comments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.