A Framework for Pervasive Web Content Delivery

Total Page:16

File Type:pdf, Size:1020Kb

A Framework for Pervasive Web Content Delivery A FRAMEWORK FOR PERVASIVE WEB CONTENT DELIVERY HENRY NOVIANUS PALIT (S. Kom., ITS, Surabaya; M. Kom., UI, Jakarta) A THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY DEPARTMENT OF COMPUTER SCIENCE SCHOOL OF COMPUTING NATIONAL UNIVERSITY OF SINGAPORE 2006 Acknowledgements Praise and glory be to the Lord, who has given me strength to pursue my purposes in life, courage to confront any challenge, perseverance to carry on in the midst of turbulence, and wisdom to keep me humble. He is my shepherd and my comfort; I shall not be in want. I would like to take this opportunity to express my utmost gratitude to Prof. Chi Chi Hung for his inspiration, encouragement, and invaluable advice throughout the course of my research. Not only is he the best supervisor to guide me in this research field, but outside of the research work he is also a great mentor, from whom I learn a lot about important things in life. For the time he made available for research discussions, the effort he spent on reading and revising my research papers and thesis, the help he offered when I was in trouble, and the patience he showed against my late progress, I am always thankful. I would also like to thank my replacement supervisor, Asst. Prof. Ken Sung Wing Kin, for allowing me to stay in his laboratory and for assisting me with all the administrative matters. I am sincerely grateful for his tremendous effort to help my research keep on as smoothly as possible. This study would not have been possible without the Research Scholarship I received from the National University of Singapore. Therefore, I thank the University – and the School of Computing, in particular – for giving me the opportunity to pursue my postgraduate study. ii Through my many years in Multimedia Information Laboratory, I had worked with not just colleagues but caring and hospitable friends. I have benefited from many research discussions with Hongguang, William, Junli, Li Xiang, Su Mu, and Choon Keng as much as I have enjoyed their warm and sincere friendship. My interaction with other friends like Meng, Rain Zhang, Akanksha, Wenjie, and Xiao Yan has made my stay there pleasant and lively. Moreover, I am indebted to my brothers and sisters in Christ for their support, prayers, and companionship. In particular, I would like to thank – among others – Eni and Martin, Henny and Karim, Evelyne and Didi, Aini, and my Cell Group’s and Prayer Group’s friends. I thank Heng Thong, my flatmate, for the same support, prayers, and companionship he has given me. An abundance of appreciation and gratitude also goes to Dina, who kept “jia you”-ing me all the way till the completion of this thesis. I really hope one day I can repay you the same favor. Above all, I would like to express my highest appreciation to my parents, sister, and brother for their endless love, compassion, encouragement, and persistent prayers. Forever, I owe them an immense debt of gratitude. To them, I dedicate this thesis. iii Table of Contents Acknowledgements ii Summary x List of Tables xii List of Figures xiv Publications xvii Chapter 1 Introduction 1 1.1 Overview of Web Content Delivery 2 1.2 Challenges in Web Content Delivery 4 1.3 Efforts to Address the Challenges 6 1.3.1 Content Caching and Replication 6 1.3.2 Intelligent Network 9 1.3.3 Multimedia Standard 11 1.4 Motivation: What Will Be the Future Web Content Delivery? 13 1.4.1 Pervasive or Ubiquitous Service 13 1.4.2 Fine-Grained Entities with Heterogeneous Properties 14 1.4.3 On-Demand Delivery with Efficient Data Reuse 14 1.4.4 Rich Meta-data 15 1.5 Objectives and Contributions 16 1.5.1 Objectives 16 1.5.2 Contributions 17 1.6 Scope and Organization of the Thesis 18 iv Chapter 2 Literature Review 20 2.1 Content Caching and Replication 21 2.1.1 HTTP and Web Caching 21 2.1.2 Content Distribution Network 24 2.1.3 Techniques for Reducing Latency 27 2.1.4 Techniques for Handling Dynamic Contents 29 2.2 Intelligent Network 33 2.2.1 Web Protocol’s Support 34 2.2.2 Transcoding Systems 36 2.2.3 ICAP and OPES 47 2.2.4 Semantic Web 52 2.3 Multimedia Standards 55 2.3.1 JPEG 2000 57 2.3.2 MPEG-4 60 2.4 Concluding Remarks 67 Chapter 3 A Fine-Grained, Scalable Data Model 70 3.1 Background 71 3.2 Concept of Object Decomposition and Construction 73 3.3 Specifications of Data Model 77 3.3.1 Definition 1: Object 77 3.3.2 Definition 2: Segment and Atom 79 3.3.3 Definition 3: Representation 80 3.3.4 Definition 4: Supplement 81 3.3.5 Operation 1: Selection 83 v 3.3.6 Operation 2: Inverse-Selection 83 3.3.7 Operation 3: Join 84 3.3.8 Operation 4: Translation 85 3.3.9 How Is It Useful? 86 3.4 Modulation – A Scalable Adaptation 87 3.5 Related Work 93 Chapter 4 Modulation in JPEG 2000 96 4.1 Why Use JPEG 2000? 97 4.2 JPEG 2000 Modulators 98 4.2.1 General Issues 99 4.2.2 Modulator 1: JP2Selector 106 4.2.3 Modulator 2: JP2Joiner 115 4.2.4 Modulator 3: JP2Converter 116 4.3 Related Work 119 Chapter 5 Evaluation: Modulation vs. Transcoding 122 5.1 Rationale of Using Two Different Image Standards 123 5.2 Experimental Setup 124 5.2.1 Experimented Adaptors 124 5.2.2 Image Test Data 126 5.3 Generating Image Representations 129 5.3.1 Bit-Rate Performance 131 5.3.2 Visual Comparison 135 5.4 Processing Time 137 vi 5.4.1 Adaptation in Quality Aspect 137 5.4.2 Adaptation in Resolution Aspect 144 5.4.3 Adaptation in Component Aspect 149 5.5 Concluding Remarks 153 Chapter 6 Framework for Pervasive Web Content Delivery 155 6.1 Proxy- vs. Server-Based Adaptation 156 6.2 Evaluation of Adapting Approaches 158 6.2.1 Scenario 1: First-Time Delivery 161 6.2.2 Scenario 2: Subsequent Delivery 165 6.3 Prediction of Adaptation Delay 170 6.3.1 Adaptation Delay in a Downscaling Operation 172 6.3.2 Adaptation Delay in a Upscaling Operation 178 6.4 Proposed Framework 180 6.4.1 System Architecture 180 6.4.2 Adapting Modules 183 6.4.3 Supporting Meta-Data 184 6.5 Related Work 186 Chapter 7 Model Prototype of Pervasive Web Content Delivery 191 7.1 What Do We Have So Far? 192 7.2 Meta-Data Specifications 193 7.2.1 Client Meta-Data 199 7.2.2 Server Meta-Data 202 7.3 Modifications in Server Application 205 vii 7.4 Modifications in Proxy Application 209 7.4.1 Modified Workflow 211 7.4.2 External Modules 217 7.4.3 Rule-Based Decision Maker 220 7.4.4 Adapting Proxy Commands 225 7.5 Implemented Architecture 228 7.6 Related Work 231 Chapter 8 Performance Evaluation on Proposed Pervasive Web Content 235 Delivery 8.1 Experimental Setup 236 8.1.1 Experimented Adaptors 236 8.1.2 Image Test Data 236 8.1.3 Server Meta-Data Documents 240 8.1.4 Client Meta-Data Documents 242 8.2 Evaluating Adaptation at Web Server 243 8.2.1 Experimental Objectives 244 8.2.2 Response Time Analyses 245 8.2.3 Stress Test 250 8.3 Evaluating Adaptation at Web Server and Proxy 260 8.3.1 Experimental Objectives 262 8.3.2 Response Time Analyses 262 8.3.3 Stress Test 274 8.3.4 Exploration of Data Reuse 282 8.4 Concluding Remarks 287 viii Chapter 9 Conclusions and Future Work 289 9.1 Conclusions 290 9.1.1 Fine-Grained, Scalable Web Data Model 290 9.1.2 Modulation in JPEG 2000 291 9.1.3 Framework for Pervasive Web Content Delivery 292 9.1.4 Model Prototype of Pervasive Web Content Delivery 293 9.2 Future Work 296 9.2.1 Wide Implementation of Modulation 296 9.2.2 Enhanced Adapting Proxy 297 9.2.3 Resource-Friendly Adaptor 297 9.2.4 High Data Reuse vs. Data Replication 298 Bibliography 299 Appendix A: ADP Schema 315 Appendix B: Experimental Server Meta-Data 319 Appendix C: Experimental Client Meta-Data 332 ix Summary The integration of the Internet and the wireless network is inevitable. Consequently, Web clients become more heterogeneous, and therefore, pervasive services are required. This is one major challenge that the Web content providers face nowadays. Other challenges are, among others, increased multimedia data traffic, personalized content, and demand for efficient Web content delivery. Learning from the past researches, this thesis tries to address the challenges as a whole. In doing so, two objectives have been set out. The first objective is to devise a fine-grained, scalable Web data model. The data model is the key factor to attain efficiency, in addition to adaptability, in Web content delivery. According to the data model, an object is heterogeneous as a whole but can be divided into homogeneous “atoms”. The object can be represented by composing some of its atoms; the greater the number of atoms, the better is the object’s presentation. Thus, a variety of representations – along different types of scalability, perhaps – can be generated from the object with less, or even, no complex computations. Modulation , a novel adaptation, was proposed to exploit the data model. Modulation is characterized as fast, exclusive, and reversible.
Recommended publications
  • A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments
    Proceedings on Privacy Enhancing Technologies ; 2020 (2):24–44 Zhiju Yang and Chuan Yue* A Comparative Measurement Study of Web Tracking on Mobile and Desktop Environments Abstract: Web measurement is a powerful approach to 1 Introduction studying various tracking practices that may compro- mise the privacy of millions of users. Researchers have Web tracking is frequently performed over the Internet built several measurement frameworks and performed by various trackers to collect the information of users’ a few studies to measure web tracking on the desk- browsing activities for various purposes including per- top environment. However, little is known about web sonalized advertisement, targeted attacks, and surveil- tracking on the mobile environment, and no tool is lance [12, 21, 32]. Traditionally, stateful HTTP cook- readily available for performing a comparative measure- ies are used as the dominant technique to track online ment study on mobile and desktop environments. In this users [27]. In recent years, advanced stateful tracking work, we built a framework called WTPatrol that allows techniques such as Flash cookies and advanced stateless us and other researchers to perform web tracking mea- tracking techniques such as browser or device finger- surement on both mobile and desktop environments. printing have also become very popular over the Inter- Using WTPatrol, we performed the first comparative net [1, 3, 24, 30]. User privacy has been keeping com- measurement study of web tracking on 23,310 websites promised by trackers that utilize these techniques. that have both mobile version and desktop version web- Web measurement is a powerful approach to study- pages. We conducted an in-depth comparison of the web ing online tracking practices and techniques.
    [Show full text]
  • HTTP Digest Access Authentication
    Internet Engineering Task Force (IETF) R. Shekh-Yusef, Editor Request for Comments: 7616 Avaya Obsoletes: 2617 D. Ahrens Category: Standards Track Independent ISSN: 2070-1721 S. Bremer Netzkonform September 2015 HTTP Digest Access Authentication Abstract The Hypertext Transfer Protocol (HTTP) provides a simple challenge-response authentication mechanism that may be used by a server to challenge a client request and by a client to provide authentication information. This document defines the HTTP Digest Authentication scheme that can be used with the HTTP authentication mechanism. Status of this Memo This is an Internet Standards Track document. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 57411. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc76162. Copyright Notice Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info3) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • An Evaluation of the Webdav Extensions to the HTTP Protocol
    2000:138 MASTER'S THESIS An evaluation of the WebDAV extensions to the HTTP protocol Björn Nilsson Civilingenjörsprogrammet Institutionen för Systemteknik Avdelningen för Datorkommunikation 2000:138 • ISSN: 1402-1617 • ISRN: LTU-EX--00/138--SE An evaluation of the WebDAV extensions to the HTTP protocol Master’s Thesis in Computer Science Björn Nilsson January 2000 An evaluation of the WebDAV extensions to the HTTP protocol Abstract Abstract The HyperText Transfer Protocol (HTTP) is used for the most popular service on the Internet today – World Wide Web. WebDAV is a new extension to the HTTP protocol, which makes it possible to write, edit and share information across intranets and the Internet. In this Master’s Thesis, the WebDAV extensions are examined. A comparison between HTTP with WebDAV and the existing Internet protocols FTP and POP3 is done. Also a behavioral analysis of existing WebDAV applications is made. The conclusions are that HTTP with WebDAV extensions can replace both FTP and POP3. When using HTTP’s pipelining and persistent connections, better performance than with FTP is achieved. It seems like WebDAV can be used as a universal protocol for client-server solutions, gaining the advantages of HTTP such as encryption and caching. An evaluation of the WebDAV extensions to the HTTP protocol Preface Preface This Master’s Thesis has been made as the final part of my Master of Science degree in Computer Science and Engineering at Luleå University of Technology (LTU). The work has been carried out from September 1999 to January 2000 at Telia ProSoft AB in Malmö. I would like to thank my supervisor at Telia ProSoft, Anders Jönsson, for assistance and guidance throughout the work.
    [Show full text]
  • RFC 2617 HTTP Authentication June 1999
    Network Working Group J. Franks Request for Comments: 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc. J. Hostetler AbiSource, Inc. S. Lawrence Agranat Systems, Inc. P. Leach Microsoft Corporation A. Luotonen Netscape Communications Corporation L. Stewart Open Market, Inc. June 1999 HTTP Authentication: Basic and Digest Access Authentication Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Abstract "HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext. This document also provides the specification for HTTP's authentication framework, the original Basic authentication scheme and a scheme based on cryptographic hashes, referred to as "Digest Access Authentication". It is therefore also intended to serve as a replacement for RFC 2069 [6]. Some optional elements specified by RFC 2069 have been removed from this specification due to problems found since its publication; other new elements have been added for compatibility, those new elements have been made optional, but are strongly recommended. Franks, et al. Standards Track [Page 1] RFC 2617 HTTP Authentication June 1999 Like Basic, Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness.
    [Show full text]
  • Normas - ST.90 Página: 3.90.1
    MANUAL DE INFORMACIÓN Y DOCUMENTACIÓN EN MATERIA DE PROPIEDAD INDUSTRIAL Ref.: Normas - ST.90 página: 3.90.1 NORMA ST. 90 RECOMENDACIONES PARA EL TRATAMIENTO Y LA COMUNICACIÓN DE DATOS DE PROPIEDAD INTELECTUAL MEDIANTE INTERFACES DE PROGRAMACIÓN DE APLICACIONES (API) PARA SERVICIOS WEB Adoptada por el Comité de Normas Técnicas de la OMPI (CWS) en su octava sesión, celebrada el 4 de diciembre de 2020 Índice INTRODUCCIÓN ............................................................................................................................................................ 3 DEFINICIONES Y TERMINOLOGÍA .............................................................................................................................. 3 NOTACIONES ................................................................................................................................................................ 4 Notaciones generales ....................................................................................................................................................... 4 Identificadores de normas ................................................................................................................................................ 4 GRADO DE APLICACIÓN .............................................................................................................................................. 5 PRINCIPIOS DE DISEÑO DE UNA API PARA SERVICIOS WEB ................................................................................ 6
    [Show full text]
  • DEXICON Enterprise Webservice-Interface V5.2.0 10/2019
    DEXICON Enterprise Webservice-Interface V5.2.0 10/2019 DEXICON Enterprise Webservice-Interface V5.2.0 Warning and indicating symbols This warning symbol indicates hazards to your health and life (e.g. risk of coming into contact with mains voltage). You should always read and follow the text next to the symbol. This warning symbol indicates hazards that may cause damage to the device or system (malfunction, data loss, material damage, etc.) Text pointed out in this way requires you to do something. This symbol points to information that may facilitate your handling of the product or the use of this manual. DEXICON Enterprise Webservice-Interface V5.2.0 10/2019 PCS Systemtechnik GmbH Pfälzer-Wald-Str. 36, D-81539 Munich, Germany, Phone +49 - 89 - 68004-0 Home page: http://www.pcs.com Technical Support Phone: +49 - 89 - 68004-666 Fax: +49 - 89 - 68004-410 Email: [email protected] Copying this manual in whole or in parts is forbidden without the express authority of PCS Systemtechnik GmbH. The information in this manual is subject to changes so that we can maintain the state of the art at all times. PCS, INTUS, DEXICON, INTUS LBus and „PCS. The Terminal People.“ are trademarks or registered trademark of PCS Systemtechnik GmbH. All other brands and product names are trademarks or registered trademarks of the respective companies and organizations. Copyright 2019 by PCS Systemtechnik GmbH 2 10/2019 DEXICON Enterprise Webservice-Interface V5.2.0 Table of contents Warning and indicating symbols ................................................................................................... 2 1 Preface ........................................................................................................................... 7 1.1 Scope of this document .................................................................................................. 7 1.2 Additional manuals .......................................................................................................
    [Show full text]
  • Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2)
    Journal of Computer and Communications, 2017, 5, 98-111 http://www.scirp.org/journal/jcc ISSN Online: 2327-5227 ISSN Print: 2327-5219 Steganography of Hypertext Transfer Protocol Version 2 (HTTP/2) Biljana Dimitrova, Aleksandra Mileva Faculty of Computer Science, University Goce Delčev, Štip, Republic of Macedonia How to cite this paper: Dimitrova, B. and Abstract Mileva, A. (2017) Steganography of Hyper- text Transfer Protocol Version 2 (HTTP/2). Network steganography consists of different steganographic technics that utilize Journal of Computer and Communications, network protocols for hiding data. We present nine new covert channels which 5, 98-111. utilize the new standard, HTTP/2, and which can be used regardless its trans- https://doi.org/10.4236/jcc.2017.55008 port carrier (TLS or clear TCP). These covert channels use a protocol feature Received: February 22, 2017 that has dual nature (for example, no padding can be represented in two ways); Accepted: March 28, 2017 or a feature that is not mandatory (as streams prioritization and dependencies); Published: March 31, 2017 or random value field (as PING frame payload field); or there is no strict rule Copyright © 2017 by authors and how to obtain new values for some fields (as stream identifiers). As far as we Scientific Research Publishing Inc. know, this is the first research about hiding data in HTTP/2. Also, we give a This work is licensed under the Creative small survey of existing covert channels that can be created using HTTP/1.x, Commons Attribution International License (CC BY 4.0). with the analysis do they work or not work with the HTTP/2.
    [Show full text]
  • OMA-TS-DM Protocol-V2 0-20160209-A
    OMA Device Management Protocol Approved Version 2.0 – 09 Feb 2016 Open Mobile Alliance OMA-TS-DM_Protocol-V2_0-20160209-A 2016 Open Mobile Alliance Ltd. All Rights Reserved. Used with the permission of the Open Mobile Alliance Ltd. under the terms as stated in this document. [OMA-Template-Spec-20160101-I] OMA-TS-DM_Protocol-V2_0-20160209-A Page 2 (105) Use of this document is subject to all of the terms and conditions of the Use Agreement located at http://www.openmobilealliance.org/UseAgreement.html. Unless this document is clearly designated as an approved specification, this document is a work in process, is not an approved Open Mobile Alliance™ specification, and is subject to revision or removal without notice. You may use this document or any part of the document for internal or educational purposes only, provided you do not modify, edit or take out of context the information in this document in any manner. Information contained in this document may be used, at your sole risk, for any purposes. You may not use this document in any other manner without the prior written permission of the Open Mobile Alliance. The Open Mobile Alliance authorizes you to copy this document, provided that you retain all copyright and other proprietary notices contained in the original materials on any copies of the materials and that you comply strictly with these terms. This copyright permission does not constitute an endorsement of the products or services. The Open Mobile Alliance assumes no responsibility for errors or omissions in this document. Each Open Mobile Alliance member has agreed to use reasonable endeavors to inform the Open Mobile Alliance in a timely manner of Essential IPR as it becomes aware that the Essential IPR is related to the prepared or published specification.
    [Show full text]
  • Protecting Users from Third-Party Web Tracking with Trackingfree Browser
    I Do Not Know What You Visited Last Summer: Protecting Users from Third-party Web Tracking with TrackingFree Browser Xiang Pan Yinzhi Cao Yan Chen Northwestern University Columbia University Northwestern University [email protected] [email protected] [email protected] Abstract—Stateful third-party web tracking has drawn the neither of the approaches can completely protect users from attention of public media given its popularity among top Alexa third-party tracking: in addition to browser cookies, a tracker web sites. A tracking server can associate a unique identifier can store user’s unique identifier into many other places on from the client side with the private information contained in the client-side state, such as Flash files [4] [26] [17] and browser referer header of the request to the tracking server, thus recording caches [26] [4] [17]; meanwhile, blacklist tools highly depend the client’s behavior. Faced with the significant problem, existing on all the records in the database and a tracking company can works either disable setting tracking identifiers or blacklist third- party requests to certain servers. However, neither of them can always adopt new domains to track users. completely block stateful web tracking. To address the shortcomings of existing anti-tracking ap- In this paper, we propose TrackingFree, the first anti-tracking proaches, a third-party tracking defense system should achieve browser by mitigating unique identifiers. Instead of disabling the following goals: those unique identifiers, we isolate them into different browser Complete blocking. The system can completely block all principals so that the identifiers still exist but are not unique •existing stateful third-party tracking techniques, such as those among different web sites.
    [Show full text]
  • Swedes Online: You Are More Tracked Than You Think by Joel Purra
    Institutionen för datavetenskap Department of Computer and Information Science Final thesis Swedes Online: You Are More Tracked Than You Think by Joel Purra LIU-IDA/LITH-EX-A--15/007--SE 2015-02-19 Linköpings universitet Linköpings universitet SE-581 83 Linköping, Sweden 581 83 Linköping This page intentionally left blank. Almost. Linköping University Department of Computer and Information Science Final Thesis Swedes Online: You Are More Tracked Than You Think by Joel Purra LIU-IDA/LITH-EX-A--15/007--SE 2015-02-19 Supervisor: Patrik Wallström The Internet Infrastructure Foundation (.SE) Supervisor: Staffan Hagnell The Internet Infrastructure Foundation (.SE) Examiner: Niklas Carlsson Division for Database and Information Techniques (ADIT) This page intentionally left blank. Almost. Master’s thesis Swedes Online: You Are More Tracked Than You Think Joel Purra [email protected], joepu444 http://joelpurra.com/ +46 70 352 1212 v1.0.0 Abstract When you are browsing websites, third-party resources record your online habits; such tracking can be considered an invasion of privacy. It was previously unknown how many third-party resources, trackers and tracker companies are present in the different classes of websites chosen: globally popular websites, random samples of .se/.dk/.com/.net domains and curated lists of websites of public interest in Sweden. The in-browser HTTP/HTTPS traffic was recorded while downloading over 150,000 websites, allowing comparison of HTTPS adoption and third-party tracking within and across the different classes of websites. The data shows that known third-party resources including known trackers are present on over 90% of most classes, that third-party hosted content such as video, scripts and fonts make up a large portion of the known trackers seen on a typical website and that tracking is just as prevalent on secure as insecure sites.
    [Show full text]
  • 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc
    Network Working Group J. Franks Request for Comments: 2617 Northwestern University Obsoletes: 2069 P. Hallam-Baker Category: Standards Track Verisign, Inc. J. Hostetler AbiSource, Inc. S. Lawrence Agranat Systems, Inc. P. Leach Microsoft Corporation A. Luotonen Netscape Communications Corporation L. Stewart Open Market, Inc. June 1999 HTTP Authentication: Basic and Digest Access Authentication Status of this Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (1999). All Rights Reserved. Abstract "HTTP/1.0", includes the specification for a Basic Access Authentication scheme. This scheme is not considered to be a secure method of user authentication (unless used in conjunction with some external secure system such as SSL [5]), as the user name and password are passed over the network as cleartext. This document also provides the specification for HTTP's authentication framework, the original Basic authentication scheme and a scheme based on cryptographic hashes, referred to as "Digest Access Authentication". It is therefore also intended to serve as a replacement for RFC 2069 [6]. Some optional elements specified by RFC 2069 have been removed from this specification due to problems found since its publication; other new elements have been added for compatibility, those new elements have been made optional, but are strongly recommended. Franks, et al. Standards Track [Page 1] RFC 2617 HTTP Authentication June 1999 Like Basic, Digest access authentication verifies that both parties to a communication know a shared secret (a password); unlike Basic, this verification can be done without sending the password in the clear, which is Basic's biggest weakness.
    [Show full text]
  • Trackingsurveillance-Draft.Pdf
    Chapter 5, Tracking and Surveillance Lorrie Faith Cranor, Manya Sleeper, Blase Ur This is the authors’ draft of a chapter that will appear in the IAPP Privacy and Information Technology text book, expected to be published in 2013. 5.1. Introduction ............................................................................................................................... 2 5.2. Internet Monitoring ................................................................................................................. 3 5.2.1. An Overview of Computer Networking ..................................................................................... 3 5.2.1.1. Packets and IP Addresses .......................................................................................................................... 3 5.2.1.2. Email ................................................................................................................................................................... 4 5.2.1.3. The HTTP and HTTPS Protocols ............................................................................................................. 4 5.2.2. Network-Scale Monitoring and Deep Packet Inspection ..................................................... 5 5.2.3. Wi-Fi Eavesdropping ....................................................................................................................... 5 5.2.4. Internet Monitoring for Employers, Schools, and Parents ................................................. 6 5.2.5. Spyware ...............................................................................................................................................
    [Show full text]