Network Application

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 360 Experts worldwide ranked by ideXlab platform

Thorsten Strufe - One of the best experts on this subject based on the ideXlab platform.

  • Safebook: A privacy-preserving online social Network leveraging on real-life trust
    IEEE Communications Magazine, 2009
    Co-Authors: Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe
    Abstract:

    Online social Network Applications severely suffer from various security and privacy exposures. This article suggests a new approach to tackle these security and privacy problems with a special emphasis on the privacy of users with respect to the Application provider in addition to defense against intruders or malicious users. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social Network Application. The second strong point of the suggested approach is to capitalize on the trust relationships that are part of social Networks in real life in order to cope with the problem of building trusted and privacy- preserving mechanisms as part of the online Application. The combination of these design principles is Safebook, a decentralized and privacy- preserving online social Network Application. Based on the two design principles, decentralization and exploiting real-life trust, various mechanisms for privacy and security are integrated into Safebook in order to provide data storage and data management functions that preserve users' privacy, data integrity, and availability. Preliminary evaluations of Safebook show that a realistic compromise between privacy and performance is feasible.

Yezid Donoso - One of the best experts on this subject based on the ideXlab platform.

  • delay disruption tolerant Network based message forwarding for a river pollution monitoring wireless sensor Network Application
    Sensors, 2016
    Co-Authors: Carlos Velasquezvillada, Yezid Donoso
    Abstract:

    Communications from remote areas that may be of interest is still a problem. Many innovative projects applied to remote sites face communications difficulties. The GOLDFISH project was an EU-funded project for river pollution monitoring in developing countries. It had several sensor clusters, with floating WiFi antennas, deployed along a downstream river’s course. Sensor clusters sent messages to a Gateway installed on the riverbank. This gateway sent the messages, through a backhaul technology, to an Internet server where data was aggregated over a map. The communication challenge in this scenario was produced by the antennas’ movement and Network backhaul availability. Since the antennas were floating on the river, communications could be disrupted at any time. Also, 2G/3G availability near the river was not constant. For non-real-time Applications, we propose a Delay/Disruption Tolerant Network (DTN)-based solution where all nodes have persistent storage capabilities and DTN protocols to be able to wait minutes or hours to transmit. A mechanical backhaul will periodically visit the river bank where the gateway is installed and it will automatically collect sensor data to be carried to an Internet-covered spot. The proposed forwarding protocol delivers around 98% of the messages for this scenario, performing better than other well-known DTN routing protocols.

Leucio Antonio Cutillo - One of the best experts on this subject based on the ideXlab platform.

  • Safebook: A privacy-preserving online social Network leveraging on real-life trust
    IEEE Communications Magazine, 2009
    Co-Authors: Leucio Antonio Cutillo, Refik Molva, Thorsten Strufe
    Abstract:

    Online social Network Applications severely suffer from various security and privacy exposures. This article suggests a new approach to tackle these security and privacy problems with a special emphasis on the privacy of users with respect to the Application provider in addition to defense against intruders or malicious users. In order to ensure users' privacy in the face of potential privacy violations by the provider, the suggested approach adopts a decentralized architecture relying on cooperation among a number of independent parties that are also the users of the online social Network Application. The second strong point of the suggested approach is to capitalize on the trust relationships that are part of social Networks in real life in order to cope with the problem of building trusted and privacy- preserving mechanisms as part of the online Application. The combination of these design principles is Safebook, a decentralized and privacy- preserving online social Network Application. Based on the two design principles, decentralization and exploiting real-life trust, various mechanisms for privacy and security are integrated into Safebook in order to provide data storage and data management functions that preserve users' privacy, data integrity, and availability. Preliminary evaluations of Safebook show that a realistic compromise between privacy and performance is feasible.

Deborah Estrin - One of the best experts on this subject based on the ideXlab platform.

  • a sensor Network Application construction kit snack
    International Conference on Embedded Networked Sensor Systems, 2004
    Co-Authors: Ben Greenstein, Eddie Kohler, Deborah Estrin
    Abstract:

    We propose a new configuration language, component and service library, and compiler that make it easier to develop efficient sensor Network Applications. Our goal is the construction of smart Application service libraries: high-level libraries that implement concepts like routing trees and periodic sensing, and that combine automatically into efficient programs. Important language features include flexible control over component sharing and transitive arrow connections, which let independently-implemented services knit themselves into integrated control flow paths. Our language, library, and compiler are collectively called SNACK (Sensor Network Application Construction Kit). We describe them, and present and evaluate a simple SNACK-based multihop data collection Application. This Application uses SNACK language features to provide both simplicity (excluding reusable service definitions, its description is three lines long) and efficiency (it performs comparably to the well-known Surge Application).

Zhang Xiaolong - One of the best experts on this subject based on the ideXlab platform.

  • method for realizing message handling in instant messaging open platform and system for realizing message handling in instant messaging open platform
    2014
    Co-Authors: Zhang Xiaolong
    Abstract:

    The present invention provides a method for realizing message handling in an instant messaging open platform, and a system for realizing message handling in the instant messaging open platform. The method comprises the steps of receiving a message sent to a Network Application, wherein the Network Application is an Application accessed in the instant messaging open platform; pushing the received message to an access address of the Network Application; receiving a reply message returned by the Network Application according to the message, and forwarding the reply message. The system comprises a receiving module used for receiving the message sent to the Network Application, wherein the Network Application is the Application accessed in the instant messaging open platform; a pushing module used for pushing the received message to the access address of the Network Application; and a reply processing module used for receiving the reply message returned by the Network Application according to the message, and forwarding the reply message. According to the present invention, the Network Application can be prevented from pushing messages at will.