Dissertation

Total Page:16

File Type:pdf, Size:1020Kb

Dissertation DISSERTATION Titel der Dissertation An Infrastructure for the Development of Semantic Desktop Applications Verfasser Bernhard Schandl Angestrebter akademischer Grad Doktor der technischen Wissenschaften (Dr. techn.) Wien, im August 2009 Studienkennzahl lt. Studienblatt: A 786 881 Dissertationsgebiet lt. Studienblatt: Informatik Betreuer: Univ.Prof. Dr. Wolfgang Klas Zweitbetreuer: Univ.Prof. DDr. Gerald Quirchmayr ii Abstract The extent to which our daily lives are digitized is continuously growing. Many of our every- day activities manifest themselves in digital form; either in an explicit way, when we actively use digital information for work or spare time; or in an implicit way, when information is in- directly created or manipulated as a consequence of our action. A large fraction of these data volumes can be considered as personal information, that is, information that has a certain class of relationship to us as human beings. The storage and processing capacity of the devices that we use to interact with these data has been enormously increasing over the last years, and we can expect this development to continue in the future. However, while the power of physical data storage is permanently increasing, the development of logical data organization power of personal devices has been stagnating since the invention of the first personal computers. Still, hierarchical file systems are the de-facto standard for data organization on personal devices. File systems represent information as a set of discrete data units (files) that are ar- ranged as leaves on a tree of labeled nodes (directories). This structure, on the one hand, can be easily understood by humans, since the separation into small information units supports the manual manageability of the personal data space, in comparison to systems that employ continuous data structures. On the other hand, hierarchical structures suffer from a number of deficiencies which have negative impact on the quality of personal information management, and it lacks of expressive mechanisms which in turn would help to improve information re- trieval according to user needs. Significant research effort has been invested in order to improve the mechanisms for per- sonal information management. The resulting works represent potential alternatives or sup- plements for systems in place, but sometimes run the risk of over-formalizing information management; a problem that is especially apparent in situations where a non-expert end user is the direct consumer of such services. The contribution of this thesis is to present an alternative organizational model for man- agement of personal data that strikes a balance between the unstructured nature of file systems and the highly formal characteristics of logic-based systems. After a comparative analysis of the current situation and recent research effort in this direction, it describes this organizational metaphor on three levels: First, on a conceptual level, it discusses an abstract data model, a corresponding query algebra, and a set of abstract operations on this data model. This for- mal framework is suitable to represent common data structures and usage patterns that can be found in personal information management, but on the same time does not enforce a complete paradigm shift away from established systems. Second, on a representation level, it discusses how this model can be efficiently processed, stored, and exchanged between different systems. Third, on an implementation level, it describes how concrete realizations of this data model can be built and used in various application scenarios. iii iv Zusammenfassung In einem permanent wachsenden Ausmaß wird unser Leben digital organisiert. Viele tag- tägliche Aktivitäten manifestieren sich (auch) in digitaler Form: einerseits explizit, wenn digi- tale Informationen für Arbeitsaufgaben oder in der Freizeit entstehen und verwendet werden; andererseits auch implizit, wenn Informationen indirekt, als Konsequenz unseres Handelns, erzeugt oder manipuliert wird. Ein großer Teil dieser Informationsbestände ist persönlicher Natur, d.h., diese Information hat einen bestimmten Bezug zu uns als Person. Die Speicher- und Rechenleistung der Geräte, mit denen wir üblicherweise mit solchen persönlichen Daten interagieren, wurde in den letzten Jahren kontinuierlich erhöht, und es besteht Grund zur Annahme, dass sich diese Entwicklung in der Zukunft fortsetzt. Während also die physische Leistung von Datenspeichern enorm erhöht wurde, hat deren logische und organisatorische Leistung seit der Erfindung der ersten Personal Computer praktisch stag- niert. Nach wie vor sind hierarchische Dateisysteme der de-facto-Standard für die Organisation von persönlichen Daten. Solche Dateisysteme repräsentieren Daten als diskrete Einheiten (Dateien), die Blätter eines Baums von beschrifteten Knoten (Verzeichnisse) darstellen. Die Unterteilung des persönlichen Datenraums in kleine Einheiten unterstützt die Handhabung solcher Strukturen durch den Menschen, allerdings können viele Arten von Organisationsin- formation nicht adäquat in einer Baumstruktur dargestellt werden. Dies wirkt sich negativ auf die Qualität der Datenorganisation aus. Aktuelle Forschung im Bereich Personal Information Management liefert zwar mögliche Ansätze, um hierarchische Systeme zu ersetzen, tendiert jedoch manchmal dazu, die Arbeit mit Information überzuformalisieren. Dies ist insbesondere kritisch, weil der durchschnit- tliche Anwender von PIM-Systemen über keine Erfahrung mit komplexen logischen Systemen verfügt. Diese Arbeit präsentiert ein alternatives Organisationsmodell für persönliche Daten, die darauf abzielt, eine Balance zwischen der unstrukturierten Charakteristik von Dateisystemen und den formalen Eigenschaften von logik-basierten Systemen zu finden. Nach einer ver- gleichenden Studie der aktuellen Forschungssituation im Bereich Semantic Desktop und Per- sonal Information Management wird dieses Modell auf drei Ebenen vorgestellt. Zunächst wird ein abstraktes Modell sowie eine Abfrage-Algebra in Form von abstrakten Operationen auf dieses Modell vorgestellt. Dieses Modell erlaubt die Abbildung von im Personal Informa- tion Management gebräuchlichen Daten, aber erfordert keine völlige Umstellung auf Seiten des Benutzers. Anschließend wird dieses abstrakte Modell in konkreten Repräsentationen übergeführt, und es wird gezeigt, wie diese Repräsentationen effizient bearbeitet, gespeichert, und ausgetauscht werden können. Schließlich wird die Anwendung dieses Modells anhand von konkreten prototypischen Implementierungen gezeigt. v vi Acknowledgements I would like to thank my supervisor, Prof. Dr. Wolfgang Klas, who thoughtfully guided and helped me throughout the work on this thesis, and my second advisor, Prof. DDr. Gerald Quirchmayr, for his kind support and encouragement. I gratefully thank my parents who supported me throughout my years of study in every aspect of life, and who encouraged me to start this thesis. I would like to express my special appreciation to my former colleagues Stefan, Diman, and Arash, who did a great job in implementing parts of the work presented in this thesis, and always provided a strong wall to reflect my ideas and fallacies. I would like to thank my colleagues Stefan, Wolfgang, Bernhard, Niko, and Stefan, with whom I had the pleasure to work with during the past years, and who provided not only excellent ideas and input, but made work really fun. Equally I would like to thank Jan, Peter, Manuela, Diana, and Ramona for keeping the department running. Finally, from the deepest of my heart I thank my love Anna, who endured life with a PhD researcher without any complaints throughout the years. I dedicate this work to my beloved son Laurin, who constantly reminds me that there are much more important things in life than a PhD thesis. vii viii Contents 1 Introduction 1 1.1 Motivating Scenarios . 2 1.2 Research Methodology . 4 1.3 Contributions . 4 1.4 Organization . 5 I Background and Related Work 7 2 A Comparative Study on Technologies for Desktop Data Management 9 2.1 File Systems . 9 2.2 The Semantic Web: Expressing Knowledge about Resources . 26 2.3 Semantic Technologies for the Desktop . 33 II Concepts 47 3 Siles: An Abstract Model for Semantic Representation of Data Assets on the Desktop 49 3.1 Design Considerations . 49 3.2 Data Model . 56 3.3 A Query Framework for Siles . 61 3.4 Summary . 67 4 An Application Programming Interface for Siles 69 4.1 API Specification . 69 4.2 Usage Examples . 81 4.3 Summary . 84 III Implementation 85 5 Digital Manifestation of Siles 87 5.1 A Core Ontology for the Sile Model . 87 5.2 Representation of Sile Data as RDF . 91 5.3 Transforming Sile Filters to SPARQL Queries . 95 5.4 Discussion of Alternative Representations . 104 5.5 Summary . 107 6 Serializing Sile Data 109 ix 6.1 Silepacks: Transportable Sile Containers . 110 6.2 Sile Systems as Part of the Web of Data . 113 6.3 Distributing Sile Systems via XML-RPC . 115 6.4 Enriching WebDAV with Sile Annotations . 127 6.5 Summary . 131 7 Case Studies of Sile Repository Implementations 133 7.1 The SemDAV Server: A Triple Store-based Sile Repository . 133 7.2 silefiles: A Semantic File System Extension . 138 7.3 SileMail: Semantic Extensions to E-Mail . 140 7.4 Summary . 141 8 The Semplorer: A User Interface for Sile Management 143 8.1 Design Considerations . 144 8.2 Interface Design . 146 8.3 Summary . 152 IV Conclusions 153 9 Discussion and Experimental Results 155 9.1 Comparison and Differentiation . 155 9.2 Experimental Results . 158 10
Recommended publications
  • Bibliography of Erik Wilde
    dretbiblio dretbiblio Erik Wilde's Bibliography References [1] AFIPS Fall Joint Computer Conference, San Francisco, California, December 1968. [2] Seventeenth IEEE Conference on Computer Communication Networks, Washington, D.C., 1978. [3] ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, Los Angeles, Cal- ifornia, March 1982. ACM Press. [4] First Conference on Computer-Supported Cooperative Work, 1986. [5] 1987 ACM Conference on Hypertext, Chapel Hill, North Carolina, November 1987. ACM Press. [6] 18th IEEE International Symposium on Fault-Tolerant Computing, Tokyo, Japan, 1988. IEEE Computer Society Press. [7] Conference on Computer-Supported Cooperative Work, Portland, Oregon, 1988. ACM Press. [8] Conference on Office Information Systems, Palo Alto, California, March 1988. [9] 1989 ACM Conference on Hypertext, Pittsburgh, Pennsylvania, November 1989. ACM Press. [10] UNIX | The Legend Evolves. Summer 1990 UKUUG Conference, Buntingford, UK, 1990. UKUUG. [11] Fourth ACM Symposium on User Interface Software and Technology, Hilton Head, South Carolina, November 1991. [12] GLOBECOM'91 Conference, Phoenix, Arizona, 1991. IEEE Computer Society Press. [13] IEEE INFOCOM '91 Conference on Computer Communications, Bal Harbour, Florida, 1991. IEEE Computer Society Press. [14] IEEE International Conference on Communications, Denver, Colorado, June 1991. [15] International Workshop on CSCW, Berlin, Germany, April 1991. [16] Third ACM Conference on Hypertext, San Antonio, Texas, December 1991. ACM Press. [17] 11th Symposium on Reliable Distributed Systems, Houston, Texas, 1992. IEEE Computer Society Press. [18] 3rd Joint European Networking Conference, Innsbruck, Austria, May 1992. [19] Fourth ACM Conference on Hypertext, Milano, Italy, November 1992. ACM Press. [20] GLOBECOM'92 Conference, Orlando, Florida, December 1992. IEEE Computer Society Press. http://github.com/dret/biblio (August 29, 2018) 1 dretbiblio [21] IEEE INFOCOM '92 Conference on Computer Communications, Florence, Italy, 1992.
    [Show full text]
  • Network Working Group H. Birkholz Internet-Draft Fraunhofer SIT Intended Status: Informational C
    Network Working Group H. Birkholz Internet-Draft Fraunhofer SIT Intended status: Informational C. Vigano Expires: January 4, 2018 Universitaet Bremen C. Bormann Universitaet Bremen TZI July 03, 2017 Concise data definition language (CDDL): a notational convention to express CBOR data structures draft-greevenbosch-appsawg-cbor-cddl-11 Abstract This document proposes a notational convention to express CBOR data structures (RFC 7049). Its main goal is to provide an easy and unambiguous way to express structures for protocol messages and data formats that use CBOR. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire on January 4, 2018. Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
    [Show full text]
  • SARIF) Version 2.1.0 Committee Specification Draft 01 / Public Review Draft 01 27 May23 July 2019
    Static Analysis Results Interchange Format (SARIF) Version 2.1.0 Committee Specification Draft 01 / Public Review Draft 01 27 May23 July 2019 This version: https://docs.oasis-open.org/sarif/sarif/v2.1.0/csprd01/sarif-v2.1.0-csprd01.docx (Authoritative) https://docs.oasis-open.org/sarif/sarif/v2.1.0/csprd01/sarif-v2.1.0-csprd01.html https://docs.oasis-open.org/sarif/sarif/v2.1.0/csprd01/sarif-v2.1.0-csprd01.pdf https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.docx (Authoritative) https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.html https://docs.oasis-open.org/sarif/sarif/v2.1.0/cs01/sarif-v2.1.0-cs01.pdf Previous version: N/A Latest version: https://docs.oasis-open.org/sarif/sarif/v2.1.0/sarif-v2.1.0.docx (Authoritative) https://docs.oasis-open.org/sarif/sarif/v2.1.0/sarif-v2.1.0.html https://docs.oasis-open.org/sarif/sarif/v2.1.0/sarif-v2.1.0.pdf Technical Committee: OASIS Static Analysis Results Interchange Format (SARIF) TC Chairs: David Keaton ([email protected]), Individual Member Luke Cartey ([email protected]), Semmle Editors: Michael C. Fanning ([email protected]), Microsoft Laurence J. Golding ([email protected]), Microsoft Additional artifacts: This prose specification is one component of a Work Product that also includes: • JSON schemas: https://docs.oasis-open.org/sarif/sarif/v2.1.0/csprd01/schemas/ Related work: This specification replaces or supersedes: • Static Analysis Results Interchange Format (SARIF) Version 2.0.
    [Show full text]
  • Secure Public Instant Messaging
    Secure Public Instant Messaging By Mohammad Abdul Mannan A thesis submitted to the Faculty of Graduate Studies and Research in partial fulfilment of the requirements for the degree of Master of Computer Science Ottawa-Carleton Institute for Computer Science School of Computer Science Carleton University Ottawa, Ontario, Canada August 2005 ©Copyright Mohammad Abdul Mannan, 2005 Reproduced with permission of the copyright owner. Further reproduction prohibited without permission. Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A 0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 0-494-10118-0 Our file Notre reference ISBN: 0-494-10118-0 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce,Canada de reproduire, publier, archiver, publish, archive, preserve, conserve,sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lnternet, preter, telecommunication or on the Internet,distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform,et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these. this thesis. Neither the thesis Ni la these ni des extraits substantiels de nor substantial extracts from it celle-ci ne doivent etre imprimes ou autrement may be printed or otherwise reproduits sans son autorisation.
    [Show full text]
  • Draft-Soilandreyes-Arcp-03.Html
    The University of Manchester Research The Archive and Package (arcp) URI scheme Document Version Submitted manuscript Link to publication record in Manchester Research Explorer Citation for published version (APA): Soiland-Reyes, S., & Cáceres, M. (2018). The Archive and Package (arcp) URI scheme: Internet-Draft. Internet Engineering Task Force. https://tools.ietf.org/id/draft-soilandreyes-arcp-03.html Citing this paper Please note that where the full-text provided on Manchester Research Explorer is the Author Accepted Manuscript or Proof version this may differ from the final Published version. If citing, it is advised that you check and use the publisher's definitive version. General rights Copyright and moral rights for the publications made accessible in the Research Explorer are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Takedown policy If you believe that this document breaches copyright please refer to the University of Manchester’s Takedown Procedures [http://man.ac.uk/04Y6Bo] or contact [email protected] providing relevant details, so we can investigate your claim. Download date:24. Sep. 2021 Network Working Group S. Soiland-Reyes Internet-Draft The University of Manchester Intended status: Informational M. Caceres Expires: August 9, 2018 Mozilla Corporation February 05, 2018 The Archive and Package (arcp) URI scheme draft-soilandreyes-arcp-03 Abstract This specification define the Archive and Package URI scheme "arcp". arcp URIs can be used to consume or reference hypermedia resources bundled inside a file archive or an application package, as well as to resolve URIs for archive resources within a programmatic framework.
    [Show full text]
  • 8089 QUT Updates: 1738 February 2017 Category: Standards Track ISSN: 2070-1721
    Internet Engineering Task Force (IETF) M. Kerwin Request for Comments: 8089 QUT Updates: 1738 February 2017 Category: Standards Track ISSN: 2070-1721 The "file" URI Scheme Abstract This document provides a more complete specification of the "file" Uniform Resource Identifier (URI) scheme and replaces the very brief definition in Section 3.10 of RFC 1738. It defines a common syntax that is intended to interoperate across the broad spectrum of existing usages. At the same time, it notes some other current practices around the use of file URIs. Status of This Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 7841. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc8089. Copyright Notice Copyright (c) 2017 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust’s Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • Core Java® Volume II—Advanced Features Tenth Edition This Page Intentionally Left Blank Core Java® Volume II—Advanced Features Tenth Edition
    Core Java® Volume II—Advanced Features Tenth Edition This page intentionally left blank Core Java® Volume II—Advanced Features Tenth Edition Cay S. Horstmann Boston • Columbus • Indianapolis • New York • San Francisco • Amsterdam • Cape Town Dubai • London • Madrid • Milan • Munich • Paris • Montreal • Toronto • Delhi • Mexico City São Paulo • Sydney • Hong Kong • Seoul • Singapore • Taipei • Tokyo The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. For information about buying this title in bulk quantities, or for special sales opportunities (which may include electronic versions; custom cover designs; and content particular to your business, training goals, marketing focus, or branding interests), please contact our corporate sales department at [email protected] or (800) 382-3419. For government sales inquiries, please contact [email protected]. For questions about sales outside the United States, please contact [email protected]. Visit us on the Web: informit.com/ph Library of Congress Catalog Number: 2016952666 Copyright © 2017 Oracle and/or its affiliates. All rights reserved. 500 Oracle Parkway, Redwood Shores, CA 94065 Portions © 2017 Cay S. Horstmann All rights reserved. Printed in the United States of America. This publication is protected by copyright, and permission must be obtained from the publisher prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means, electronic, mechanical, photocopying, recording, or likewise.
    [Show full text]
  • ES 201 873-10 V3.4.1 (2008-07) ETSI Standard
    Final draft ETSI ES 201 873-10 V3.4.1 (2008-07) ETSI Standard Methods for Testing and Specification (MTS); The Testing and Test Control Notation version 3; Part 10: TTCN-3 Documentation Comment Specification 2 Final draft ETSI ES 201 873-10 V3.4.1 (2008-07) Reference RES/MTS-00108-10 T3 ed341 DOC Keywords methodology, MTS, testing, TTCN ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice Individual copies of the present document can be downloaded from: http://www.etsi.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing on ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http://portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http://portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission.
    [Show full text]
  • Uniform Resource Identifier (URI): Generic Syntax
    Network Working Group T. Berners-Lee Request for Comments: 3986 W3C/MIT Obsoletes: 2732, 2396, 1808 R. Fielding STD: 66 Day Software Updates: 1738 L. Masinter Category: Standards Track Adobe Systems January 2005 Uniform Resource Identifier (URI): Generic Syntax Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright © The Internet Society (2005). All Rights Reserved. Abstract A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. RFC 3986 URI Generic Syntax January 2005 Table of Contents 1. Introduction..............................................................................................................................................................4
    [Show full text]
  • Uniform Resource Identifier (URI): Generic Syntax
    Network Working Group T. Berners-Lee Request for Comments: 3986 W3C/MIT Obsoletes: 2732, 2396, 1808 R. Fielding STD: 66 Day Software Updates: 1738 L. Masinter Category: Standards Track Adobe Systems January 2005 Uniform Resource Identifier (URI): Generic Syntax Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright © The Internet Society (2005). All Rights Reserved. Abstract A Uniform Resource Identifier (URI) is a compact sequence of characters that identifies an abstract or physical resource. This specification defines the generic URI syntax and a process for resolving URI references that might be in relative form, along with guidelines and security considerations for the use of URIs on the Internet. The URI syntax defines a grammar that is a superset of all valid URIs, allowing an implementation to parse the common components of a URI reference without knowing the scheme-specific requirements of every possible identifier. This specification does not define a generative grammar for URIs; that task is performed by the individual specifications of each URI scheme. RFC 3986 URI Generic Syntax January 2005 Table of Contents 1. Introduction..............................................................................................................................................................4
    [Show full text]
  • URI Use and Abuse
    URI Use and Abuse Nathan McFeters – Senior Security Advisor, Ernst & Young Billy Rios – SeniorErnst Researcher, & Young’s Advanced Microsoft Security Cente r – URI Use and Abuse Rob Carter – Security Advisor, Ernst1 & Young Intended Audience This paper assumes the reader has a solid understanding of web application security principles, Cross Site Scripting, and web browser security mechanisms. This paper will provide information on the discovery of, access of, and exploitation of various URI’s supported by various browsers. Please see the reference section of this paper for more information regarding individual types of attacks. Contributing Authors Version 1.2 Nathan McFeters – Senior Security Advisor – Ernst & Young Advanced Security Center, Houston Billy Kim (BK) Rios – Senior Researcher – Microsoft, Seattle Rob Carter – Security Advisor – Ernst & Young Advanced Security Center, Houston Ernst & Young’s Advanced Security Center – URI Use and Abuse ii Table of Contents INTENDED AUDIENCE ............................................................................................................................ II CONTRIBUTING AUTHORS ................................................................................................................... II CHAPTER 1 – UNIVERSAL RESOURCE INDICATORS (URIS) ........................................................ 5 1. OVERVIEW .............................................................................................................................................. 5 2. INTERACTION WITH BROWSERS
    [Show full text]
  • Enterprise Application Integration Architecture Recovery
    Enterprise Application Integration Architecture Recovery Ossi Galkin School of Science Thesis submitted for examination for the degree of Master of Science in Technology. Espoo 21.5.2019 Supervisor Prof. Mikko Kivelä Advisor M.Sc. (Tech.) Minttu Mustonen Copyright ⃝c 2019 Ossi Galkin Aalto University, P.O. BOX 11000, 00076 AALTO www.aalto.fi Abstract of the master’s thesis Author Ossi Galkin Title Enterprise Application Integration Architecture Recovery Degree programme Life Science Technologies Major Complex Systems Code of major SCI3060 Supervisor Prof. Mikko Kivelä Advisor M.Sc. (Tech.) Minttu Mustonen Date 21.5.2019 Number of pages 55 Language English Abstract Large and medium-sized enterprise has multiple business applications, such as cus- tomer relations management (CRM) and enterprise resource planning (ERP) software. Business applications need data from each other, but they rarely communicate with each other out of the box. An enterprise application integration (EAI) platform is used to tie them together. Automating communication between business applications is called orchestration. As EAI is used to implement communication between business applications, in theory, it could be used to map the architecture of the orchestration layer. As companies evolve, so does the software they use. Either documentation is never done, or it is not updated. Overall, the frequent problem is that the company loses track of what software systems it has and how they are used. This work studies the feasibility of building software that can automatically recover orchestration architecture. The orchestration architecture is then represented as a network to enable further analysis and visualization. This research investigates whether it is possible to use that network to detect business applications that are being used and whether the production environment is separate from the testing environment.
    [Show full text]