Holographic storage for distributed applications -- a validating monotonic DHT "backed" by authoritative hashchains for data provenance (a Ceptr sub-project) - holochain/holochain-proto
Lots of tech projects these days, especially crypto-networks, aspire to decentralization. Or their evangelists say they do, because they feel they need to. Decentralization is the new disruption—the…
This [talk] acknowledges the success of mobile social platforms, but shows the need to reinvent them with an open and peer-to-peer protocol. I talk about Scuttlebutt, and how to build apps using its tech stack, and I also highlight the importance of its ‘humane’ stack.
Inrupt’s dedicated team of developers, designers and business people have been working with a core of Solid experts and members of the open-source community to ensure it’s becoming robust, feature-rich and increasingly ready for wide-scale adoption.
Solid (derived from "social linked data") is a proposed set of conventions and tools for building decentralized social applications based on Linked Data principles. Solid is modular and extensible and it relies as much as possible on existing W3C standards and protocols.
What is the centralization that decentralized Web advocates are reacting against? Clearly, it is the domination of the Web by the FANG (Facebook, Amazon, Netflix, Google) and a few other large companies such as the cable oligopoly. These companies came to dominate the Web for economic not technological reasons.
Like XML, blockchains are kinda fundamentally misguided; they don't solve a problem that is actually important. XML solved syntax, which turned out not to be the problem. Blockchains [purport to] solve centralization, which will turn out not to be the problem.
H. Nguyen, D. Bozhkov, Z. Ahmadi, N. Nguyen, and T. Doan. Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, (July 2022)
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
C. Trattner, D. Helic, P. Singer, and M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, page 14. ACM, (2012)
C. Trattner, P. Singer, D. Helic, and M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, page 14:1--14:8. New York, NY, USA, ACM, (2012)
M. Heupel, S. Scerri, M. Bourimi, and D. Kesdogan. Proceedings of the 4th International Workshop on Modeling Social Media, page 3:1--3:4. New York, NY, USA, ACM, (2013)
F. Hermann, A. Schuller, S. Thiel, C. Knecht, and S. Scerri. Human-Computer Interaction. Users and Contexts of Use, volume 8006 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)
M. Steinke, S. Metzger, and W. Hommel. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, page 1829-1831. ACM, (2016)
C. Trattner, D. Helic, P. Singer, and M. Strohmaier. Proceedings of the 12th International Conference on Knowledge Management and Knowledge Technologies, page 14. ACM, (2012)
C. Boris, G. Gutierrez, P. Roy, J. Thomson, and P. Trezentos. 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, IEEE International, (2010)
A. Shakya, H. Takeda, V. Wuwongse, and I. Ohmukai. Poster + Demo Proceedings of the 6th International Semantic Web Conference and the 2nd Asian Semantic Web Conference, 2007 (ISWC 2007+ASWC 2007), Busan, Korea, page 93-94. Busan, Korea, (November 2007)
A. Shakya, H. Takeda, V. Wuwongse, and I. Ohmukai. Proceedings of the IADIS International Conference WWW/Internet 2007, 1, page 371-380. Vila Real, Portugal, International Association for Development of the Information Society, IADIS Press, (October 2007)