Sumarul Revistelor Străine Abonate În Anul 2008

Total Page:16

File Type:pdf, Size:1020Kb

Sumarul Revistelor Străine Abonate În Anul 2008 SUMARUL REVISTELOR STRĂINE ABONATE ÎN ANUL 2008 VOL. 105, NO. 4 JULY-AUGUST 2008 325 Advanced Assessment of Cracking due to Heat of Hydration and Internal Restrains – S.-J. Jeon 334 Properties of Concrete after High-Temperature Heating and Cooling – J. Lee, Y. Xi, and K. Willam 342 Methodology to Couple Time-Temperature Effects on Rheology of Mortar – J.-Y. Petit, K. H. Khayat and E. Wirquin 350 Measurement of Reinforcement Corrosion Rate Using Transient Galvanostatic Pulse Method – H.-s. So and S. G. Millard 358 Large-Scale Processing of Engineered Cementitious Composites – M. D. Lepech and V. C. Li 367 Recycling Waste Latex Paint in Concrete with Added Value – A. Mohammed, M. Nehdi, and A. Adawi 375 Validation of Probability-Based Chloride-Induced Corrosion Service-Life Model – G. S. Williamson, R. E. Weyers, M. C. Brown, A. Ramniceanu, and M. M. Sprinkel 381 Prediction of Early-Age Cracking of Fiber-Reinforced Concrete due to Restrained Shrinkage – S. H. Kwon and S. P. Shah 2 390 Simplified Concrete Resistivity and Rapid Chloride Permeability Test Method – K. A. Riding, J. L. Poole, A. K. Schindler, M. C. G. Juenger, and K. J. Folliard 395 Change in Impact-Echo Response during Fatigue Loading of Concrete Bridge T-Girder – S. L. Gassman and A. S. Zein 404 Mechanisms of Radon Exhalation from Hardening Cementitious Materials – K. Kovler 414 Reducing Thermal and Autogenous Shrinkage Contributions to Early-Age Cracking – D. P. Bentz and M. A. Peltz Volume 105, no. 5, July-August 2008 429 Assessment of Damage Gradients Using Dynamic Modulus of Thin Concrete Disks - Ufuk Dilek 438 Impact of Extremely Hot Weather and Mixing Method on Changes in Properties of Ready Mixed Concrete during Delivery - Abdulaziz I. Al- Negheimish and Abdulrahman M. Alhozaimy 445 Maturity Approach Applied to Concrete by Means of Vicat Tests - Alvaro García, Daniel Castro-Fresno, and Juan Antonio Polanco 451 Restored Strength of Cracked Concrete Beam Repaired by Epoxy and Polymethyl Methacrylate - Yu-Cheng Kan, Tsong Yen, and Ming-Gin Lee 459 Parameters Governing Corrosion Protection Efficacy of Fusion-Bonded Epoxy Coatings on Reinforcing Bar - Andrei Ramniceanu, Richard E. Weyers, Judy S. Riffle, and Michael M. Sprinkel 468 Shear Behavior of Fiber-Reinforced Self-Consolidating Concrete Slender Beams - Tom Greenough and Moncef Nehdi 478 Performance of Shrinkage-Reducing Admixtures at Different Humidities and at Early Ages - Jason Weiss, Pietro Lura, Farshad Rajabipour, and Gaurav Sant 487 Use of Ultra-Fine Sugar Cane Bagasse Ash as Mineral Admixture for Concrete - Guilherme Chagas Cordeiro, Romildo Dias Toledo Filho, and Eduardo de Moraes Rego Fairbairn 494 Investigation of Air-Entraining Admixture Dosage in Fly Ash Concrete - M. Tyler Ley, Nathan J. Harris, Kevin J. Folliard, and Kenneth C. Hover 3 499 Effect of Mixture Composition on Restrained Shrinkage Cracking of Self- Consolidating Concrete Used in Repair - Soo-Duck Hwang and Kamal H. Khayat 510 Crack Depth Estimation in Concrete Using Energy Transmission of Surface Waves - Sung Woo Shin, Jinying Zhu, Jiyoung Min, and John S. Popovics 517 High-Temperature Properties of Concrete for Fire Resistance Modeling of Structures - Venkatesh K. R. Kodur, M. M. S. Dwaikat, and M. B. Dwaikat 4 AQUA JOURNAL OF WATER SUPPLY RESEARCH AND TECHNOLOGY Volume 57, no. 1, February 2008 1–11 Adsorptive removal of manganese (II) from the aqueous phase using iron oxide coated sand - R. Buamah, B. Petrusevski and J. C. Schippers 13–21 Water treatment simulators - J. Dudley, G. Dillon and L. C. Rietveld 23–34 Neural networks and genetic algorithms in membrane technology modelling - S. Strugholtz, S. Panglisch, J. Gebhardt and R. Gimbel 35–44 UV absorbance ratio index with size exclusion chromatography (URI- SEC) as an NOM property indicator - Namguk Her, Gary Amy, Jinsik Sohn and Urs von Gunten 35–44 UV absorbance ratio index with size exclusion chromatography (URI- SEC) as an NOM property indicator - Namguk Her, Gary Amy, Jinsik Sohn and Urs von Gunten 45–56 Dynamic modelling for optimisation of pellet softening - K. M. van Schagen, L. C. Rietveld and R. Babuška Practical paper 57–63 Pilot plan protocol for optimization of UV dose required to obtain an appropriate municipal wastewater disinfection - I. Salcedo Dávila, J. A. Andrade Balao, J. M. Quiroga Alonso and E. Nebot Sanz 5 Volume 57, no. 2, February 2008 Review paper 65–77 A review of the existing methods for detection, enumeration and inactivation of Cryptosporidium in surface waters - T. Wohlsen and M. Katouli 79–92 Application of a multiphase CFD modelling approach to improve ozone residual monitoring and tracer testing strategies for full-scale drinking water ozone disinfection processes - Jianping Zhang, Peter M. Huck, Gordon D. Stubley and William B. Anderson 93–100 Removal of pathogens by functionalised self-assembled monolayers - M. de los Reyes, A. Keegan, P. Monis and P. Majewski 101–108 Effect of ultrasonic irradiation on the coagulation and inactivation of Microcystis - Hong-Xing Shi, Jiu-Hui Qu, Hui-Juan Liu, Yin-Ling Mu, Kai-Tao Xiao and Ling Wang 109–113 Improving public perception of tap water in Antalya city, Turkey - Evrim Celik and Habib Muhammetoglu 115–125 Chemical disinfection preceding UV treatment: An assessment of microbial regrowth in a model distribution system - Jennie L. Rand and Graham A. Gagnon Practical Paper 127–132 Loss of chlorine, chloramine or chlorine dioxide concentration following exposure to UV light - Jennie L. Rand and Graham A. Gagnon Volume 57, no. 3, May 2008 133–141 Integrated simulation of drinking water treatment - Luuk Rietveld, Alex van der Helm, Kim van Schagen, René van der Aa and Hans van Dijk 143–151 The behaviour and cholinesterase inhibitory activity of fenthion and its products by light and chlorination - Maiko Tahara, Reiji Kubota, Hiroyuki Nakazawa, Hiroshi Tokunaga and Tetsuji Nishimura 153–163 The chemical water quality in roof-harvested water cisterns in Bermuda - A. J. Peters, K. L. Weidner and C. L. Howley 165–170 The effect of chlorine demand on estimation of the inactivation rate constant - M. Sivaganesan, E. W. Rice and N. J. Adcock 6 171–183 Fixed-bed adsorption in drinking water treatment: a critical review on models and parameter estimation - Eckhard Worch 185–194 Case study: reducing manganese (Mn++) level in surface water with natural manganese-coated sand in Sinopec Shanghai Ltd - Kai Yang, Yingwen Xue, Jiajie He and Xiaojun Yang Practical paper 195–202 Ex-post evaluation of a water distribution network upgrading project - V. K. Kanakoudis Volume 57, no. 4, June 2008 203–224 Biological filtration for membrane pre-treatment and other applications: towards the development of a practically-oriented performance parameter - P. M. Huck and M. M. Sozański 225–238 Application of non-biological surrogates for analysis of sequential disinfection continuous flow systems - Brannon Richards and Joel Ducoste 239–252 Failure prediction and optimal scheduling of replacements in asbestos cement water pipes - Paul Davis, Dhammika De Silva, David Marlow, Magnus Moglia, Scott Gould and Stewart Burn 253–258 Molecular weight distribution variation of assimilable organic carbon during ozonation/BAC process - Shu Shi-hu, Yan Min, Gao Nai-yun and He Wen-Jie 259–272 Rapid water quality characterization for chlorine demand and THM formation in drinking waters - V. Jegatheesan, S. Weragoda and C. Visvanathan Practical paper 273–278 Performance indicators and customer management: ACEA benchmarking experiences in water services in Latin America - Anthony Rouxel, Simona Brofferio and Lætitia Guerin-Schneider 279–288 Freshwater consumption in Kuwait: analysis and forecasting - Jasem M. Alhumoud 7 Eratum 289–289 UV absorbance ratio index with size exclusion chromatography (URI- SEC) as an NOM property indicator - Namguk Her, Gary Amy, Jinsik Sohn and Urs von Gunten Volume 57, no. 5, August 2008 291–305 Cryptosporidium surveillance: investigations on the Loch Katrine water supply to Glasgow - S. J. Robertson, G. Bell, K. A. Punter and F. Reid 307–316 The use of polyacrylamides (PAMs) for removing natural organic matter (NOM) from Paraíba do Sul River (Brazil) - B. C. Conticelli, C. V. S. Conticelli, E. F. Tôrres and E. B. Azevedo 317–327 Pipe network system analysis using simulated annealing - Hund-Der Yeh and Yu-Chung Lin 329–336 Effects of hydrophobe contents of amphiphilic polyelectrolytes on flocs size and removal efficiency of NOM from waters - R. Alnaizy, M. Sayem Mozumder, B. F. Abu-Sharkh and Sk. A. Ali 337–350 Optimum rehabilitation strategy of water distribution systems using the HBMO algorithm - Omid Bozorg Haddad, Barry J. Adams and Miguel A. Mariño Practical paper 351–359 Manganese removal and occurrence of manganese oxidizing bacteria in full-scale biofilters - M. S. Burger, C. A. Krentz, S. S. Mercer and G. A. Gagnon 361–368 Hydrologic model combined with a GIS for estimating hydrologic balance at watershed scale: application to the Macta watershed (north-western Algeria) - A. Mendas, M. Errih and F. Bouchenak 8 AUTOMATION IN CONSTRUCTION Volume 17, no. 1, November 2007 1 Publisher’s Announcement 3 A UAV for bridge inspection: Visual servoing control law with orientation limits – N. Metni and T. Hamel 11 Reasoning about component similarity in building product models from the construction perspective – S. Staub-French and M. P. Nepal 22 A fuzzy simulation model for evaluating the concession items of public- private parternership schemes – S. Thomas Ng, J. Xie, M. Skitmore and Y. K. Cheung 30 A case-based decision support tool for bid mark-up estimation of international construction projects – I. Dikmen, M. T. Birgonul and A. K. Gur 45 Cable-suspended robotic contour crafting system – P. Bosscher, R. L. Williams II, L. S. Bryson and D. Castro-Lacouture 56 Hybrid ANN-CBR model for disputed change orders in construction projects – J.-H. Chen and S. C. Hsu 65 Internet-based preliminary highway construction cost estimating database – J.-S. Chou and J.
Recommended publications
  • Using Whois Based Geolocation and Google Maps API for Support Cybercrime Investigations
    Recent Advances in Telecommunications and Circuits Using Whois Based Geolocation and Google Maps API for support cybercrime investigations Asmir Butkovic*, Fahrudin Orucevic**, Anel Tanovic*** * Sector for Informatics, Police Support Agency of Bosnia and Herzegovina Aleja Bosne Srebrene bb, Sarajevo 71000, Bosnia and Herzegovina ** Department of Computer Science and Informatics University of Sarajevo, Faculty of Electrical Engineering Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina *** Department of Computer Science and Informatics University of Sarajevo, Sarajevo School of Science and Technology Zmaja od Bosne bb, Sarajevo 71000, Bosnia and Herzegovina [email protected], [email protected], [email protected] Abstract: - A major challenge facing all law-enforcement and intelligence-gathering organizations is accurately and efficiently analyzing the growing volumes of crime data. Cybercrime refers to any crime that involves a computer and network, where computer may or may not play an instrumental part in the commission of the crime. Detection and investigation of cybercrime can likewise be difficult because busy network traffic and frequent online transactions generate large amounts of data, only a small portion of which relates to illegal activities. In this paper, we are focusing on technologies that can help to improve the effective investigation of cybercrime, facilitate police work and enable investigators to allocate their time to other tasks. We have developed an IP mapping tool called MIPA that combines online mapping techniques and IP geolocation technology, and uses application functionality from disparate web sources. The emergence of the Web 2.0 and user-friendly online mapping techniques have created public interest in contributing information through Web- enabled geospatial tools.
    [Show full text]
  • The Case of Shared Public Ips at Hotspots
    How Others Compromise Your Location Privacy: The Case of Shared Public IPs at Hotspots Nevena Vratonjic1,K´evin Huguenin1, Vincent Bindschaedler2,and Jean-Pierre Hubaux1 1 School of Computer and Communication Sciences, EPFL, Switzerland 2 Department of Computer Science, UIUC, USA Abstract. Location privacy has been extensively studied over the last few years, especially in the context of location-based services where users purposely disclose their location to benefit from convenient context- aware services. To date, however, little attention has been devoted to the case of users’ location being unintentionally compromised by others. In this paper, we study a concrete and widespread example of such sit- uations, specifically the location-privacy threat created by access points (e.g., public hotspots) using network address translation (NAT). Indeed, because users connected to the same hotspot share a unique public IP, a single user making a location-based request is enough to enable a service provider to map the IP of the hotspot to its geographic coordinates, thus compromising the location privacy of all the other connected users. When successful, the service provider can locate users within a few hundreds of meters, thus improving over existing IP-location databases. Even in the case where IPs change periodically (e.g., by using DHCP), the service provider is still able to update a previous (IP, Location) mapping by inferring IP changes from authenticated communications (e.g., cookies). The contribution of this paper is three-fold: (i) We identify a novel threat to users’ location privacy caused by the use of shared public IPs. (ii) We formalize and analyze theoretically the threat.
    [Show full text]
  • IP Geolocation Through Reverse DNS
    IP Geolocation through Reverse DNS Ovidiu Dan∗ Vaibhav Parikh Brian D. Davison Lehigh University Microsoft Bing Lehigh University Bethlehem, PA, USA Redmond, WA, USA Bethlehem, PA, USA [email protected] [email protected] [email protected] ABSTRACT Table 1: Example of entries from an IP Geolocation database IP Geolocation databases are widely used in online services to map end user IP addresses to their geographical locations. However, they StartIP EndIP Country Region City use proprietary geolocation methods and in some cases they have 1.0.16.0 1.0.16.255 JP Tokyo Tokyo 124.228.150.0 124.228.150.255 CN Hunan Hengyang poor accuracy. We propose a systematic approach to use publicly 131.107.147.0 131.107.147.255 US Washington Redmond accessible reverse DNS hostnames for geolocating IP addresses. Our method is designed to be combined with other geolocation data sources. We cast the task as a machine learning problem where increased user satisfaction and conversely that missing location for a given hostname, we generate and rank a list of potential information leads to user dissatisfaction [2, 7, 25]. IP geolocation location candidates. We evaluate our approach against three state databases are also used in many other applications, including: con- of the art academic baselines and two state of the art commercial tent personalization and online advertising to serve content IP geolocation databases. We show that our work significantly local to the user [2, 18, 26], content delivery networks to direct outperforms the academic baselines, and is complementary and users to the closest datacenter [19], law enforcement to fight cy- competitive with commercial databases.
    [Show full text]
  • Towards IP Geolocation with Intermediate Routers Based on Topology Discovery Zhihao Wang1,2,Hongli1,2*,Qiangli3,Weili4, Hongsong Zhu1,2 and Limin Sun1,2
    Wang et al. Cybersecurity (2019) 2:13 Cybersecurity https://doi.org/10.1186/s42400-019-0030-2 RESEARCH Open Access Towards IP geolocation with intermediate routers based on topology discovery Zhihao Wang1,2,HongLi1,2*,QiangLi3,WeiLi4, Hongsong Zhu1,2 and Limin Sun1,2 Abstract IP geolocation determines geographical location by the IP address of Internet hosts. IP geolocation is widely used by target advertising, online fraud detection, cyber-attacks attribution and so on. It has gained much more attentions in these years since more and more physical devices are connected to cyberspace. Most geolocation methods cannot resolve the geolocation accuracy for those devices with few landmarks around. In this paper, we propose a novel geolocation approach that is based on common routers as secondary landmarks (Common Routers-based Geolocation, CRG). We search plenty of common routers by topology discovery among web server landmarks. We use statistical learning to study localized (delay, hop)-distance correlation and locate these common routers. We locate the accurate positions of common routers and convert them as secondary landmarks to help improve the feasibility of our geolocation system in areas that landmarks are sparsely distributed. We manage to improve the geolocation accuracy and decrease the maximum geolocation error compared to one of the state-of-the-art geolocation methods. At the end of this paper, we discuss the reason of the efficiency of our method and our future research. Keywords: IP geolocation, Network topology discovery, Web landmarks, Relative latency, Statistical learning Introduction In general, IP geolocation methods locate a host with IP geolocation aims to determine the geographical loca- following procedures: tion of an Internet host by its IP address (Muir and Oorschot 2009).
    [Show full text]
  • Geographically Restricted Streaming Content and Evasion of Geolocation
    Michigan Telecommunications and Technology Law Review Volume 19 | Issue 2 2013 Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules Jerusha Burnett University of Michigan Law School Follow this and additional works at: http://repository.law.umich.edu/mttlr Part of the Intellectual Property Law Commons, Internet Law Commons, Privacy Law Commons, and the Science and Technology Law Commons Recommended Citation Jerusha Burnett, Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules, 19 Mich. Telecomm. & Tech. L. Rev. 461 (2013). Available at: http://repository.law.umich.edu/mttlr/vol19/iss2/5 This Note is brought to you for free and open access by the Journals at University of Michigan Law School Scholarship Repository. It has been accepted for inclusion in Michigan Telecommunications and Technology Law Review by an authorized editor of University of Michigan Law School Scholarship Repository. For more information, please contact [email protected]. NOTE GEOGRAPHICALLY RESTRICTED STREAMING CONTENT AND EVASION OF GEOLOCATION: THE APPLICABILITY OF THE COPYRIGHT ANTICIRCUMVENTION RULES Jerusha Burnett* Cite as: Jerusha Burnett, Geographically Restricted Streaming Content and Evasion of Geolocation: The Applicability of the Copyright Anticircumvention Rules, 19 MICH. TELECOMM. & TECH. L. REV. 461 (2012), available at http://www.mttlr.org/volnineteen/burnett.pdf A number of methods currently exist or are being developed to deter- mine where Internet users are located geographicallywhen they access a particularwebpage. Yet regardless of the precautions taken by web- site operators to limit the locationsfrom which they allow access, it is likely that users will find ways to gain access to restricted content.
    [Show full text]
  • Identification of IP Addresses Using Fraudulent Geolocation Data
    BENG INDIVIDUAL PROJECT IMPERIAL COLLEGE LONDON DEPARTMENT OF COMPUTING Identification of IP addresses using fraudulent geolocation data Supervisor: Dr. Sergio Maffeis Author: James Williams Second Marker: Mr. Dominik Harz June 15, 2020 Abstract IP geolocation information is used all over the internet, but is easily faked. A number of differ- ent internet organisations do this – from bulletproof hosting providers attempting to conceal the location of their servers, to VPN providers looking to sell services in countries they don’t have a presence in. Servers using fraudulent IP geolocation in this way may also be more likely to be hosting fraudulent content, making IP geolocation fraud important to detect in the context of in- ternet fraud prevention. In this project, a system has been developed for detecting this kind of IP geolocation fraud. The system developed in this report uses measurements from a global network of measurement servers – an array of 8 servers in 7 different countries managed by Netcraft, and over 10,000 servers in 176 countries through the RIPE Atlas API. Using this system we have analysed the prevalence of geolocation fraud in address space spanning over 4 million IPs, which is, to the best of our knowledge, the largest study of its kind conducted. Despite focusing on only a small part of the IPv4 address space, our analysis has revealed incorrect geolocation being used by over 62,000 internet hosts, targeting 225 out of the 249 possible country codes. In terms of address space, we have discovered incorrect geolocation being used by IP address blocks cumulatively spanning over 2.1 million IPs.
    [Show full text]
  • Secure Client and Server Geolocation Over the Internet
    Secure Client and Server Geolocation Over the Internet AbdelRahman Abdou Paul C. van Oorschot Carleton University, Ottawa, Canada School of Computer Science ETH Zurich,¨ Switzerland Carleton University, Ottawa, Canada [email protected] [email protected] Abstract—In this article, we provide a summary of recent efforts towards achieving Internet geolocation securely, i.e., without allowing the entity being geolocated to cheat about its own geographic location. Cheating motivations arise from many factors, including impersonation (in the case locations are used to reinforce authentication), and gaining location-dependent Fig. 1. Snapshots of the Flagfox browser extension. benefits. In particular, we provide a technical overview of Client Presence Verification (CPV) and Server Location Verification (SLV)—two recently proposed techniques designed to verify the been proposed, but there have been very limited deployment in geographic locations of clients and servers in realtime over the practice. As of this writing, most of the geolocation conducted Internet. Each technique addresses a wide range of adversarial tactics to manipulate geolocation, including the use of IP-hiding in practice relies on the clients’ IP address or GPS coordinates technologies like VPNs and anonymizers, as we now explain. of hand-held devices, as explained below. I. INTRODUCTION A. Geolocation in Practice Internet Geolocation is the process of determining the There are several methods for device geolocation over the geographic location of an Internet-connected device. Secure Internet. If the device belongs to a user that is acting as a geolocating of a web client (a client visiting a website) is web client (i.e., visiting a website), the Geolocation API is a useful for location-aware authentication, location-aware access W3C standard that enables browsers to obtain location infor- control, location-based online voting, location-based social mation of the device they are running on, and communicate networking, and fraud reduction.
    [Show full text]
  • Secure Client and Server Geolocation Over the Internet (PDF)
    SECURITY Secure Client and Server Geolocation over the Internet ABDELRAHMAN ABDOU, PAUL C. VAN OORSCHOT AbdelRahman Abdou is a e provide a summary of recent efforts towards achieving Internet Postdoctoral Researcher in geolocation securely, that is, without allowing the entity being the Department of Computer geolocated to cheat about its own geographic location. Cheating Science at ETH Zurich. He W received his PhD (2015) in motivations arise from many factors, including impersonation (if locations systems and computer engineering from are used to reinforce authentication) and gaining location-dependent bene- Carleton University. His research interests fits. In particular, we provide a technical overview of Client Presence Verifi- include location-aware security, SDN security, cation (CPV) and Server Location Verification (SLV)—two recently proposed and using Internet measurements to solve techniques designed to verify the geographic locations of clients and serv- problems related to Internet security. ers in real time over the Internet. Each technique addresses a wide range of [email protected] adversarial tactics to manipulate geolocation, including the use of IP-hiding Paul C. van Oorschot is a technologies like VPNs and anonymizers, as we now explain. Professor of Computer Science Internet geolocation is the process of determining the geographic location of an Internet- at Carleton University, and connected device. Secure geolocating of a web client (a client visiting a website) is useful for the Canada Research Chair in location-aware
    [Show full text]
  • Smartphone Data Transfer Protection According to Jurisdiction Regulations
    DEPARTMENT OF INFORMATION ENGINEERING AND COMPUTER SCIENCE ICT International Doctoral School University of Trento, Italy Smartphone Data Transfer Protection According to Jurisdiction Regulations Mojtaba Eskandari Advisor Prof. Bruno Crispo, Universit`adegli Studi di Trento, Italy. Co-Advisor Dr. Anderson Santana de Oliveira, SAP Labs, Mougins, France. Examiners Prof. Francesco Bergadano, Universit`adegli Studi di Torino, Italy. Prof. Luigi Vincenzo Mancini, Sapienza-Universit`adi Roma, Italy. Dr. Roberto Carbone, Fondazione Bruno Kessler, Trento, Italy. Submission: 31st January 2017, Revision: 24th June 2017, Defense: 3rd July 2017 Abstract The prevalence of mobile devices and their capability to access high speed Internet have transformed them into a portable pocket cloud interface. The sensitivity of a user's personal data demands adequate level of protection in the cloud. In this regard, the European Union Data Protection regula- tions (e.g., article 25.1) restricts the transfer of European users' personal data to certain locations. The matter of concern, however, is the enforce- ment of such regulations. Since cloud service provision is independent of physical location and data can travel to various servers, it is a challenging task to determine the location of data and enforce jurisdiction policies. In this dissertation, first we demonstrate how mobile apps mishandle personal data collection and transfer by analyzing a wide range of popular Android apps in Europe. Then we investigate approaches to monitor and enforce the location restrictions of collected personal data. Since there are multiple entities such as mobile devices, mobile apps, data controllers and cloud providers in the process of collecting and transferring data, we study each one separately.
    [Show full text]
  • The Future of Participatory Approaches Using Geographic Information: Developing a Research Agenda for the 21St Century Steve Carver
    Volume 15 • APA I • 2003 Journal of the Urban and Regional Information Systems Association CONTENTS REFEREED 5 Introduction to the Special Issues on Access and Participatory Approaches in Using Geographic Information Harlan J. Onsrud and Max Craglia, Co-Editors 9 Toward a Framework for Research on Geographic Information-Supported Participatory Decision-Making Piotr Jankowski and Timothy Nyerges 19 In Search of Rigorous Models for Policy-oriented Research: A Behavioral Approach to Spatial Data Sharing Uta Wehn de Montalvo 29 Cultural and Institutional Conditions for Using Geographic Information; Access and Participation W.H. Erik de Man 35 A New Era of Accessibility? Sarah Niles and Susan Hanson 43 World Status of National Spatial Data Clearinghouses Joep Crompvoets and Arnold Bregt 51 Access to Geographic Information: A European Perspective Max Craglia and Ian Masser 61 The Future of Participatory Approaches Using Geographic Information: developing a research agenda for the 21st Century Steve Carver 73 Transparency – Considerations for PPGIS Research and Development Christina H. Drew Journal Publisher: Urban and Regional Information Systems Association Editor-in-Chief: Stephen J. Ventura Journal Coordinator: Scott A. Grams Electronic Journal: http://www.urisa.org/journal.htm EDITORIAL OFFICE: Urban and Regional Information Systems Association, 1460 Renaissance Drive, Suite 305, Park Ridge, Illinois 60068- 1348; Voice (847) 824-6300; Fax (847) 824-6363; E-mail [email protected]. SUBMISSIONS: This publication accepts from authors an exclusive right of first publication to their article plus an accompanying grant of non- exclusive full rights. The publisher requires that full credit for first publication in the URISA Journal is provided in any subsequent electronic or print publications.
    [Show full text]
  • How to Catch When Proxies Lie Verifying the Physical Locations of Network Proxies with Active Geolocation
    How to Catch when Proxies Lie Verifying the Physical Locations of Network Proxies with Active Geolocation Zachary Weinberg Shinyoung Cho Nicolas Christin Carnegie Mellon University Stony Brook University Carnegie Mellon University [email protected] [email protected] [email protected] Vyas Sekar Phillipa Gill Carnegie Mellon University University of Massachusetts [email protected] [email protected] ABSTRACT 1 INTRODUCTION Internet users worldwide rely on commercial network proxies both Commercial VPN services compete to offer the highest speed, the to conceal their true location and identity, and to control their appar- strongest privacy assurances, and the broadest possible set of server ent location. Their reasons range from mundane to security-critical. locations. One of the services in this study advertises servers in Proxy operators offer no proof that their advertised server loca- all but seven of the world’s sovereign states, including implausible tions are accurate. IP-to-location databases tend to agree with the locations such as North Korea, Vatican City, and Pitcairn Island. advertised locations, but there have been many reports of serious They offer no proof of their claims. IP-to-location databases often errors in such databases. agree with their claims, but these databases have been shown to In this study we estimate the locations of 2269 proxy servers from be full of errors [18, 38, 42]. Worse, they rely on information that ping-time measurements to hosts in known locations, combined VPN providers may be able to manipulate, such as location codes with AS and network information. These servers are operated by in the names of routers [7].
    [Show full text]
  • Adaptive Geolocation of Internet Hosts
    SLAC-PUB-16463 Adaptive Geolocation of Internet Hosts Raja A.A. Khan Anjum Naveed R. Les Cottrell National University of Sciences Faculty of CS and IT SLAC National Accelerator Laboratory, and Technology, Pakistan University of Malaya, Malaysia USA [email protected] [email protected] [email protected] Abstract—IP based geolocation is a widely used geolocation of ground truth from approximately 285000 host pairs. To technique because of its ability to geolocate the hosts where the best of our knowledge, no other research uses such an GPS or other techniques become ineffective or unavailable. intensive infrastructure of real Internet hosts. Analysis of the Measurement-based geolocation techniques utilize landmarks to make end-to-end delay measurements and compute the host collected data and the inferences on data have lead us to location based on delay to distance mappings. Fewer landmarks propose improvements on delay to distance mapping. This and/or inaccurate delay to distance mapping leads to large research contributes to IP based geolocation on three aspects. error margins. In this research an Adaptive-IP-Geolocation (AIG) Firstly, the observation that a distant landmark results in technique is proposed. AIG is based on PingER and PerfSonar a poor location estimate, is used and the landmarks as well worldwide deployments. Based on the analysis of PingER data, AIG uses two tier approach where tier one landmarks identify as targets are grouped into geographical regions. Secondly, the region of a target host. This is followed by geolocation of a variable α is introduced for delay to distance mapping. α the target host using regional landmarks only.
    [Show full text]