OpenID is a lightweight, decentralized identity system that has been gaining prominence. I expect this upcoming year to be a big year for OpenID -- and not just because of the Google trend chart with the recent uptake in search query share.
Here we explore social action. By social action we mean organized activity that seeks to improve human welfare, deepen civic culture and develop group life and commitment to others. Such a definition entails looking at the cultivation of a just and caring
The Decentralized Information Group explores technical, institutional, and public policy questions necessary to advance the development of global, decentralized information environments. The Tabulator project is a generic Semantic Web data browser. Using
Emergent structure vs. intelligent design: This all reflects a fundamental if still incoherent debate. There's one school of thought that says that if you just collect enough data and throw enough algorithms at it, the inherent structure - and the underst
What information will be deemed Proprietary? What information is part of the Information Commons? Who decides? How is it decided? Centralized? Decentralized? Opaque? Transparent?
The World Wide Database is a globally distributed network of data records that reside on millions of nodes around the network which collectively behaves as a giant virtual, decentralized database system...we need a new kind of server for hosting WWDB node
Web architecture from 50,000 feet up... decentralization and tolerance are the life and breath of Internet...If an engine of the future combines a reasoning engine with a search engine...able to construct proofs in a certain number of cases of very real i
The emergence of P2P Inference Engines and domain-specific ontologies in Web 3.0 (aka Semantic Web) will present a major threat to the central “search” engine model. In Web 3.0 (aka Semantic Web) P2P Inference Engines running on millions of users’ P
The past decade has seen a convergence of social and technological networks, with systems such as the World Wide Web characterized by the interplay between rich information content, the millions of individuals and organizations who create it, and the technology that supports it. This course covers recent research on the structure and analysis of such networks, and on models that abstract their basic properties. Topics include combinatorial and probabilistic techniques for link analysis, centralized and decentralized search algorithms, network models based on random graphs, and connections with work in the social sciences.
'Just doing it' - not waiting upon national governments and international organizations to take action - has led to a remarkable outpouring of initiatives around the global environmental crisis. We explore James Gustave Speth's vision of unscripted, volu
Hyperlinking is the foundation of the web. As users add new content, and new sites, it is bound in to the structure of the web by other users discovering the content and linking to it. Much as synapses form in the brain, with associations becoming stronge
[Web] surfing mimics a postmodern, deconstructionist perspective by undermining the authority of texts...no longer awed by received authority...in the form of text, graphics, music or code...[web surfers will use them] for their own purposes.
Building a centralized database to process billions of open-ended queries per day is a mammoth undertaking. It appears that Google, who perhaps is the only company on the planet with enough imagination, incentive, and expertise to effectively build such a
OpenID is a lightweight, decentralized identity system that has been gaining prominence. I expect this upcoming year to be a big year for OpenID -- and not just because of the Google trend chart with the recent uptake in search query share.
We need solutions that can help the many people whose terms and vocabulary are left out of the taxonomy... The simple idea that people’s actions model meaning better than a directory (even a flexible directory) is a critical step forward in thinking ab
H. Nguyen, D. Bozhkov, Z. Ahmadi, N. Nguyen, and T. Doan. Proceedings of the 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, ACM, (July 2022)
Narita. IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue VI):
117-128(November 2019)1. Symantec, 2019 Internet Security Threat Report, Vol. 24, 2019. 2. Akamai, 2019 State of the Internet / Security: Media Under Assault, 2019. https://www.akamai.com 3. J. Xia, S. Vangala, J. Wu, L. Gao, and K. Kwiat, “Effective Worm Detection for Various Scan Technique,” Journal of Computer Security, vol.14, no.4, pp.359–387, 2006. 4. W. Yu, X. Wang, X. Fu, D. Xuan, and W. Zhao, “An Invisible Localization Attack to Internet Threat Monitors,” IEEE Trans. Parallel and Distributed Systems, vol.20, no.11, pp.1611–1625, 2009. 5. M. Narita, K. Ogura, B.B. Bista, and T. Takata, “Evaluating a Dynamic Internet Threat Monitoring Method for Preventing PN Code-Based Localization Attack,” Proc. 17th International Conference on Network-Based Information Systems (NBiS 2014), 2014. 6. M. Narita, B.B. Bista, and T. Takata, “A Practical Study on Noise-Tolerant PN Code-Based Localisation Attacks to Internet Threat Monitors,” Int. J. Space-Based and Situated Computing, vol.3, no.4, pp.215–226, December 2013. 7. W. Yu, S. Wei, G. Ma, X. Fu, and N. Zhang, “On Effective Localization Attacks Against Internet Threat Monitors,” Proc. 2013 IEEE International Conference on Communications (ICC), pp.2011–2015, 2013. 8. UCSD Network Telescope. https://www.caida.org/projects/network telescope/ 9. Guillot, R. Fontugne, P. Winter, P. Me´rindol, A. King, A. Dainotti, and C. Pelsser, “Chocolatine: Outage Detection for Internet Background Radiation,” 10. Proc. Network Traffic Measurement and Analysis Conference (TMA), June 2019. DShield. http://www.dshield.org/ 11. M. Eto, D. Inoue, J. Song, J. Nakazato, K. Ohtaka, and K. Nakao, “nicter: A Large-Scale Network Incident Analysis System: Case Studies for Understanding Threat Landscape,” Proc. 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, pp.37–45, 2011. 12. D. Inoue, M. Eto, K. Suzuki, M. Suzuki, and K. Nakao, “DAEDALUS-VIZ: Novel Real-Time 3D Visualization for Darknet Monitoring-Based Alert System,” Proc. 9th International Symposium on Visualization for Cyber Security, pp.72–79, October 2012. 13. H. Kanehara, Y. Murakami, J. Shimamura, T. Takahashi, D. Inoue and N. Murata, “Real-time botnet detection using nonnegative tucker decomposition,” 14. Proc. the 34th ACM/SIGAPP Symposium on Applied Computing, pp.1337–1344, April 2019. 15. X. Fan, C. Li, and X. Dong, “ A Real-Time Network Security Visualization System Based on Incremental Learning (ChinaVis 2018),” J. Visualization, pp.1–15, October 2018. 16. Y. Shinoda, K. Ikai, and M. Itoh, “Vulnerabilities of Passive Internet Threat Monitors,” Proc. 14th USENIX Security Symposium, pp.209–224, 2005. 17. J. Bethencourt, J. Franklin, and M. Vernon, “Mapping Internet Sensors with Probe Response Attacks,” Proc. 14th USENIX Security Symposium, pp.193– 208, 2005. 18. S. Wei, D. Shen, L. Ge, W. Yu, E.P. Blasch, K.D. Pham, and G. Chen, “Secured Network Sensor-Based Defense System,” Proc. SPIE 9469, Sensors and Systems for Space Applications VIII, 2015. 19. W. Yu, N. Zhang, X. Fu, R. Bettati, and W. Zhao, “Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures,” IEEE Trans. Computers, vol.59, no.12, pp.1655–1668, 2010. 20. ENISA, “Proactive Detection of Network Security Incidents, Report,” https://www.enisa.europa.eu/2011. 21. M. Kamizono et al., “anti Malware engineering WorkShop ~MWS Datasets 2015~,” MWS2015, 2015..
M. Steinke, S. Metzger, and W. Hommel. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, page 1829-1831. ACM, (2016)
F. Hermann, A. Schuller, S. Thiel, C. Knecht, and S. Scerri. Human-Computer Interaction. Users and Contexts of Use, volume 8006 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, (2013)