Distributed data usage control for web applications

Author(s):  
Prachi Kumari ◽  
Alexander Pretschner ◽  
Jonas Peschla ◽  
Jens-Michael Kuhn
Author(s):  
Gonzalo Gil ◽  
Aitor Arnaiz ◽  
Francisco Javier Diez ◽  
Maria Victoria Higuero

2021 ◽  
Vol 25 (4) ◽  
pp. 763-787
Author(s):  
Alladoumbaye Ngueilbaye ◽  
Hongzhi Wang ◽  
Daouda Ahmat Mahamat ◽  
Ibrahim A. Elgendy ◽  
Sahalu B. Junaidu

Knowledge extraction, data mining, e-learning or web applications platforms use heterogeneous and distributed data. The proliferation of these multifaceted platforms faces many challenges such as high scalability, the coexistence of complex similarity metrics, and the requirement of data quality evaluation. In this study, an extended complete formal taxonomy and some algorithms that utilize in achieving the detection and correction of contextual data quality anomalies were developed and implemented on structured data. Our methods were effective in detecting and correcting more data anomalies than existing taxonomy techniques, and also highlighted the demerit of Support Vector Machine (SVM). These proposed techniques, therefore, will be of relevance in detection and correction of errors in large contextual data (Big data).


Author(s):  
Aliaksandr Lazouski ◽  
Gaetano Mancini ◽  
Fabio Martinelli ◽  
Paolo Mori
Keyword(s):  

Author(s):  
Wolfgang Hommel

In this chapter, we first summarize an analysis of the differences between Grids and the previously dominant model of inter-organizational collaboration. Based on requirements derived thereof, we specify a security framework that demonstrates how well-established policy-based privacy management architectures can be extended to provide the required Grid-specific functionality. We also discuss the necessary steps for integration into existing service provider and service access point infrastructures. Special emphasis is put on privacy policies that can be configured by users themselves, and distinguishing between the initial data access phase and the later data usage control phase. We also discuss the challenges of practically applying the required changes to real-world infrastructures, including delegated administration, monitoring, and auditing.


Author(s):  
Mohamad Farhan Mohamad Mohsin ◽  
Mohd Noor Abdul Hamid ◽  
Nurakmal Ahmad Mustaffa ◽  
Razamin Ramli ◽  
Kamarudin Abdullah

<span>CSR UUMWiFi is a CSR project under Universiti Utara Malaysia (UUM) that provides unlimited free internet connection for the Changlun community. Launched in 2015, the service has accumulated a huge number of users with diverse background and interest. This paper aims to uncover interesting service users’ behavior by mining the usage data. To achieve that, the access log for 3 months with 24,000 online users were downloaded from the Wi-Fi network server, pre-process and analyzed. The finding reveals that there were many loyal users who have been using this service on a daily basis since 2015 and the community spent 20-60 minutes per session. Besides that, the social media and leisure based application such YouTube, Facebook, Instagram, chatting applications, and miscellaneous web applications were among the top applications accessed by the Changlun community which contributes to huge data usage. It is also found that there were few users have used the CSR UUM WiFi for academic or business purposes. The identified patterns benefits the management team in providing a better quality service for community in future and setting up new policies for the service.</span>


Author(s):  
Flavio Cirillo ◽  
Bin Cheng ◽  
Raffaele Porcellana ◽  
Marco Russo ◽  
Gurkan Solmaz ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document