The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The following topics are dealt with: virtual environment; security; privacy; online social networks; collaborative editing; peer-to-peer; sensor networks; modeling; access control; trust; Web service; health care computing; distributed networking; collaborative architecture; and information sharing.
CollaborateCom is an annual international forum for dissemination of original ideas and research results in collaborative computing networks, systems, and applications. A major goal and feature of CollaborateCom is to bring together researchers from networking, systems, CSCW, and collaborative learning and education areas. CollaborateCom 2010 in Chicago, USA is the sixth conference of the series and...
Collaborators use vocabulary germane to the domain in context. Collaboration applications and collaborating systems use vocabularies at different (lower) layers that are specific to the state in which they execute. Distributed, yet collaborative domain-specific applications have demonstrated success when lower layer vocabularies are well defined. These standard vocabularies enable platform neutral,...
Nowadays, most proxy signature schemes are based on the difficulty of DLP (Discrete Logarithm Problem) or ECDLP (Elliptical Curve Discrete Logarithm Problem). As though many proxy signature schemes based on DLP or ECDLP have been proposed, it makes us discouraged that some disadvantages can be found after a new or modified proxy signature scheme was designed after short time. How to solve the question?...
The number of scientific publications is constantly increasing, and the results published on Empirical Software Engineering are growing even faster. Some software engineering publishers have began to collaborate with research groups to make available repositories of software engineering empirical data. However, these initiatives are limited due to issues related to the available search tools. As a...
Protection of personal healthcare information (PHI) has been as a significant hindrance to the acceptance, adoption and continued use of healthcare information technology (HIT). As nations and corporations encourage innovation in the healthcare sector for better outcomes for all its stakeholders, they are proceeding under a latent assumption - the equation of data stewardship with data ownership....
In this paper, we motivate the need for new models for Secure Information Sharing (SIS) in the specific domain of community cyber security. We believe that similar models will be applicable in numerous other domains. The term community in this context refers to a county or larger city size unit with a clearly demarcated geographical boundary aligned more or less with a governance boundary. Our choice...
Cloud computing has drawn much attention in recent years. One of its delivery models, called infrastructure as a service (IaaS), provides users with infrastructure services such as computation and data storage, heavily dependent upon virtualization techniques that offers benefits such as elasticity and cost efficiency. Most of current IaaS service providers have adopted a user-based service model,...
Television and video consumption are growing rapidly worldwide, driving usage of second and third screens for related interactions and information. Since television has a proven impact on consumer purchase behaviors, there is commercial interest in technologies that model viewers' intent, interests and engagement. However, the ecosystem currently faces two challenges - audience fragmentation and a...
There is still significant investment in legacy healthcare information technology (HIT). Current systems are a diverse mix of technologies, standards, platforms and versions. Many of which were never intended to be used together to achieve a common goal. In order to deliver care effectively and efficiently, point-of-care software must navigate this complex maze, coordinating multiple disparate systems,...
We report on our experiences in developing a hardware based security solution for a demonstration prototype of a novel, smart-grid enabled energy services delivery model. This model is based on establishing and maintaining trusted, secure dynamic collaborations with agreed, policy driven usage and billing metrics between energy service providers, energy supply companies, and the consumers' residences...
Adaptive Educational Hypermedia systems (AEH) enhance learning by adaptation and personalisation. As a consequence, wide ranging knowledge and learning content are needed. Problems then emerge in the provision of suitable authoring tools to carry out the authoring process which is complex and time consuming. Based on the fact that former research studies on authoring have identified drawbacks in collaboration,...
Millions of new domains are registered every day and the many of them are malicious. It is challenging to keep track of malicious domains by only Web content analysis due to the large number of domains. One interesting pattern in legitimate domain names is that many of them consist of English words or look like meaningful English while many malicious domain names are randomly generated and do not...
Social information systems - popularized by Facebook, Wikipedia, Twitter, and other social websites - are emerging as a powerful new paradigm for distributed social-powered information management. While there has been growing interest in these systems by businesses, government agencies, and universities, there remain important open challenges that must be addressed if the potential of these social...
We foresee the need for dynamically clustering nodes in Wireless Sensor Networks (WSNs) according to a multitude of disparate co-existing contexts. To this end, we propose a distributed, low-overhead context-aware clustering protocol for WSNs. We employ Affinity Propagation (AP) for clustering nodes based on multiple criteria including location, residual energy, and contextual data sensed from the...
With the growth of Massively Multiuser Virtual Environments (MMVEs) and increasingly interactive social net working platforms, it is widely accepted that their convergence renders today's centralized hosting approaches impracticable. To handle virtual environments of such massive scale, decentralized systems are necessary that also involve the resources of clients. The expedient design of techniques...
Cloud computing is an emerging computing paradigm where computing resources are provided as services over Internet while residing in a large data center. Even though it enables us to dynamically provide servers with the ability to address a wide range of needs, this paradigm brings forth many new challenges for the data security and access control as users outsource their sensitive data to clouds,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.