Privacy Engineering for Social Networks

Total Page:16

File Type:pdf, Size:1020Kb

Privacy Engineering for Social Networks UCAM-CL-TR-825 Technical Report ISSN 1476-2986 Number 825 Computer Laboratory Privacy engineering for social networks Jonathan Anderson December 2012 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2012 Jonathan Anderson This technical report is based on a dissertation submitted July 2012 by the author for the degree of Doctor of Philosophy to the University of Cambridge, Trinity College. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Privacy engineering for social networks Jonathan Anderson In this dissertation, I enumerate several privacy problems in online social net- works (OSNs) and describe a system called Footlights that addresses them. Foot- lights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today’s centralised OSNs, but it does not trust centralised infrastructure to en- force security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users’ interactions with OSNs, providing real control over online sharing. I also demonstrate that today’s OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights’ storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year. It is the foundation for a practical shared filesystem, a perfectly unobservable communications channel and a distributed application platform. The Footlights application platform allows third-party developers to write so- cial applications without direct access to users’ private data. Applications run in a confined environment with a private-by-default security model: applications can only access user information with explicit user consent. I demonstrate that practical applications can be written on this platform. The security of Footlights user data is based on public-key cryptography, but users are able to log in to the system without carrying a private key on a hardware token. Instead, users authenticate to a set of authentication agents using a weak secret such as a user-chosen password or randomly-assigned 4-digit number. The protocol is designed to be secure even in the face of malicious authentication agents. 3 4 ACKNOWLEDGEMENTS I gratefully acknowledge the sponsorship of the Rothermere Foundation. The 2nd Viscount Rothermere, first Chancellor of Memorial University of Newfound- land, endowed the Rothermere Fellowship to aid Memorial students in their pursuit of higher degrees in the United Kingdom. Without this generous support, I would not have been able to pursue my PhD in Cambridge. I am also grateful for the sponsorship I received from the Natural Sciences and Engineering Research Council of Canada (NSERC). The US Defence Advanced Re- search Projects Agency (DARPA) supported projects that I was involved with dur- ing my PhD, although that work is not part of this dissertation. I thank my supervisor, Frank Stajano, for his guidance and mentorship dur- ing my PhD. You gave me freedom to explore my research horizons but kept me grounded in reality when I needed to communicate those ideas or even when I needed to Just Finish. I remember clearly the advice you gave me on the first day I sat in your office; I hope to share it with my own students one day. They say it takes a village to raise a child. My development as a researcher has been immeasurably spurred by collaborations and conversations with many col- leagues. Joseph Bonneau, Claudia Diaz and I collaborated on the work that grew into this dissertation’s subject. Robert Watson once poked his head in my office door to ask, “have you ever hacked OS kernels?”; the subsequent collaboration has greatly influenced my thinking about operating systems and application confine- ment. Luke Church helped open my eyes to alternative viewpoints on security, as well as the existence of users as people rather than rhetorical devices. I am grateful to co-authors Ben Laurie, Kris Kennaway, George Danezis, Sören Preibusch and all of the CTSRD team. My thinking on both security and the nature of research has been aided immeasurably by early advice I received from Ross Anderson, Bruce Christianson and Saar Drimer. I have also received very helpful feedback on drafts of this dissertation from Ross Anderson, Robert Watson, Joseph Bonneau, Anil Mad- havapeddy, Richard Clayton, Wei Ming Khoo and Bjoern Zeeb. Thank you all. I acknowledge my PhD examiners, Bart Preneel and Jon Crowcroft, who en- gaged with and validated my work; our conversation was stimulating and idea-rich, although when it comes to a viva voce examination, I believe that once is enough. 5 I would also like to thank my friends Tom & Julie and Will & Jackie, whose footprints along the doctoral road helped me trace the path to my own PhD. Thanks to Mom & Dad for buying me Lego and for having patience when I took things apart and couldn’t put them back together again. You’ve always supported my creative and academic pursuits, encouraged me to follow my dreams and be- lieved that I could get there. Thank you. I also thank Earl & Barbara and Russell & Cara for believing in me and encour- aging us to go to Cambridge, even though it took Chrissy so very far away. Finally, to Chrissy, my wife: thank you for your love, support, encouragement and constant companionship. When I wasn’t sure I could finish this work, you were there with words of comfort, strength and purpose. I can’t imagine a better friend. I’ve loved every day we’ve spent together, and I look forward to loving every day we spend together in the years to come. Soli Deo gloria. 6 1 AUTHOR PUBLICATIONS JOURNALS [1] R.N.M.WATSON, J. ANDERSON, B. LAURIE, AND K. KENNAWAY. A taste of Capsicum: practical capabilities for UNIX. Communications of the ACM, 55(3):97, Mar. 2012. doi:10.1145/2093548.2093572. CONFERENCES [2] J.ANDERSON, C. DIAZ, J. BONNEAU, AND F. STAJANO. Privacy-enabling social networking over untrusted networks. In WOSN ’09: Proceedings of the Second ACM Workshop on Online Social Networks. ACM, Aug. 2009. doi:10. 1145/1592665.1592667. [3] J.ANDERSON AND F. STAJANO. Not that kind of friend: misleading diver- gences between online social networks and real-world social protocols. In SPW ’09: Proceedings of the Seventeenth International Workshop on Security Proto- cols, Apr. 2009. URL: http://www.cl.cam.ac.uk/~jra40/publications/2009/ SPW-misleading-divergences.pdf. [4] J.ANDERSON AND F. STAJANO. On storing private keys "in the cloud". In SPW 2010: Proceedings of the Eighteenth International Workshop on Security Proto- cols, Mar. 2010. URL: http://www.cl.cam.ac.uk/~jra40/publications/2010/ SPW-key-storage.pdf. [5] J.ANDERSON, F. STAJANO, AND R. N. M. WATSON. How to keep bad papers out of conferences (with minimum reviewer effort). In SPW 2011: Proceedings of the Nineteenth International Workshop on Security Protocols, Mar. 2011. doi: 10.1007/978-3-642-25867-1_34. 7 AUTHOR PUBLICATIONS [6] J.ANDERSON AND R. N. M. WATSON. Stayin’ alive: aliveness as an alterna- tive to authentication. In SPW 2012: Proceedings of the Twentieth International Workshop on Security Protocols, Apr. 2012. URL: http://www.cl.cam.ac.uk/ ~jra40/publications/2012/SPW-stayin-alive.pdf. [7] J.BONNEAU, J. ANDERSON, R. J. ANDERSON, AND F. STAJANO. Eight friends are enough: social graph approximation via public listings. In SNS ’09: Pro- ceedings of the Second ACM EuroSys Workshop on Social Network Systems, pages 13–18. ACM, Mar. 2009. doi:10.1145/1578002.1578005. [8]J.B ONNEAU, J. ANDERSON, AND G. DANEZIS. Prying data out of a so- cial network. In Proceedings of the 2009 International Conference on Advances in Social Networks Analysis and Mining (2009), pages 249–254, 2009. doi: 10.1109/ASONAM.2009.45. [9] R.N.M.WATSON, J. ANDERSON, B. LAURIE, AND K. KENNAWAY. Cap- sicum: practical capabilities for UNIX. In Proceedings of the 19th USENIX Se- curity Symposium. USENIX Association, Aug. 2010. URL: http://portal.acm. org/citation.cfm?id=1929820.1929824. WORKSHOPS (NO PROCEEDINGS) [10] J.ANDERSON. Psychic routing: upper bounds on routing in private DTNs. In Hot Topics in Privacy Enhancing Technologies (HotPETS), 2011. URL: http: //petsymposium.org/2011/papers/hotpets11-final9Anderson.pdf. [11] J.ANDERSON, J. BONNEAU, AND F. STAJANO. Security APIs for online ap- plications. In ASA-3: Third International Workshop on Analysing Security APIs, July 2009. URL: http://www.cl.cam.ac.uk/~jra40/publications/2009/ASA- security-apis-for-online-applications.pdf. [12] J.ANDERSON, J. BONNEAU, AND F. STAJANO. Inglorious installers: security in the application marketplace. In WEIS ’10: The Ninth Workshop on the Eco- nomics of Information Security, pages 1–47, 2010. URL: http://www.cl.cam.ac. uk/~jra40/publications/2010/WEIS-inglorious-installers.pdf. [13] J.BONNEAU, J. ANDERSON, AND L. CHURCH. Privacy suites: shared pri- vacy for social networks (poster). In SOUPS ’09: Symposium on Usable Privacy 8 AUTHOR PUBLICATIONS and Security, 2009. URL: http://cups.cs.cmu.edu/soups/2009/posters/p13- bonneau.pdf. [14] L.CHURCH, J. ANDERSON, J. BONNEAU, AND F. STAJANO. Privacy stories: confidence in privacy behaviors through end user programming (poster). In SOUPS ’09: Symposium on Usable Privacy and Security, 2009. URL: http:// cups.cs.cmu.edu/soups/2009/posters/p3-church.pdf. [15] R.N.M.WATSON AND J.
Recommended publications
  • Operating Systems and Virtualisation Security Knowledge Area (Draft for Comment)
    OPERATING SYSTEMS AND VIRTUALISATION SECURITY KNOWLEDGE AREA (DRAFT FOR COMMENT) AUTHOR: Herbert Bos – Vrije Universiteit Amsterdam EDITOR: Andrew Martin – Oxford University REVIEWERS: Chris Dalton – Hewlett Packard David Lie – University of Toronto Gernot Heiser – University of New South Wales Mathias Payer – École Polytechnique Fédérale de Lausanne © Crown Copyright, The National Cyber Security Centre 2019. Following wide community consultation with both academia and industry, 19 Knowledge Areas (KAs) have been identified to form the scope of the CyBOK (see diagram below). The Scope document provides an overview of these top-level KAs and the sub-topics that should be covered under each and can be found on the project website: https://www.cybok.org/. We are seeking comments within the scope of the individual KA; readers should note that important related subjects such as risk or human factors have their own knowledge areas. It should be noted that a fully-collated CyBOK document which includes issue 1.0 of all 19 Knowledge Areas is anticipated to be released by the end of July 2019. This will likely include updated page layout and formatting of the individual Knowledge Areas. Operating Systems and Virtualisation Security Herbert Bos Vrije Universiteit Amsterdam April 2019 INTRODUCTION In this knowledge area, we introduce the principles, primitives and practices for ensuring security at the operating system and hypervisor levels. We shall see that the challenges related to operating system security have evolved over the past few decades, even if the principles have stayed mostly the same. For instance, when few people had their own computers and most computing was done on multiuser (often mainframe-based) computer systems with limited connectivity, security was mostly focused on isolating users or classes of users from each other1.
    [Show full text]
  • A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation
    TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering TKK Dissertations 140 Espoo 2008 A DATA-ORIENTED NETWORK ARCHITECTURE Doctoral Dissertation Teemu Koponen Dissertation for the degree of Doctor of Science in Technology to be presented with due permission of the Faculty of Information and Natural Sciences for public examination and debate in Auditorium T1 at Helsinki University of Technology (Espoo, Finland) on the 2nd of October, 2008, at 12 noon. Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering Teknillinen korkeakoulu Informaatio- ja luonnontieteiden tiedekunta Tietotekniikan laitos Distribution: Helsinki University of Technology Faculty of Information and Natural Sciences Department of Computer Science and Engineering P.O. Box 5400 FI - 02015 TKK FINLAND URL: http://cse.tkk.fi/ Tel. +358-9-4511 © 2008 Teemu Koponen ISBN 978-951-22-9559-3 ISBN 978-951-22-9560-9 (PDF) ISSN 1795-2239 ISSN 1795-4584 (PDF) URL: http://lib.tkk.fi/Diss/2008/isbn9789512295609/ TKK-DISS-2510 Picaset Oy Helsinki 2008 AB ABSTRACT OF DOCTORAL DISSERTATION HELSINKI UNIVERSITY OF TECHNOLOGY P. O. BOX 1000, FI-02015 TKK http://www.tkk.fi Author Teemu Koponen Name of the dissertation A Data-Oriented Network Architecture Manuscript submitted 09.06.2008 Manuscript revised 12.09.2008 Date of the defence 02.10.2008 Monograph X Article dissertation (summary + original articles) Faculty Information and Natural Sciences Department Computer Science and Engineering Field of research Networking Opponent(s) Professor Jon Crowcroft Supervisor Professor Antti Ylä-Jääski Instructor(s) Dr.
    [Show full text]
  • Communications of the Acm
    COMMUNICATIONS CACM.ACM.ORG OF THEACM 11/2014 VOL.57 NO.11 Scene Understanding by Labeling Pixels Evolution of the Product Manager The Data on Diversity On Facebook, Most Ties Are Weak Keeping Online Reviews Honest Association for Computing Machinery tvx-full-page.pdf-newest.pdf 1 11/10/2013 12:03 3-5 JUNE, 2015 BRUSSELS, BELGIUM Course and Workshop C proposals by M 15 November 2014 Y CM Paper Submissions by MY 12 January 2015 CY CMY K Work in Progress, Demos, DC, & Industrial Submissions by 2 March 2015 Welcoming Submissions on Content Production Systems & Infrastructures Devices & Interaction Techniques Experience Design & Evaluation Media Studies Data Science & Recommendations Business Models & Marketing Innovative Concepts & Media Art TVX2015.COM [email protected] ACM Books M MORGAN& CLAYPOOL &C PUBLISHERS Publish your next book in the ACM Digital Library ACM Books is a new series of advanced level books for the computer science community, published by ACM in collaboration with Morgan & Claypool Publishers. I’m pleased that ACM Books is directed by a volunteer organization headed by a dynamic, informed, energetic, visionary Editor-in-Chief (Tamer Özsu), working closely with a forward-looking publisher (Morgan and Claypool). —Richard Snodgrass, University of Arizona books.acm.org ACM Books ◆ will include books from across the entire spectrum of computer science subject matter and will appeal to computing practitioners, researchers, educators, and students. ◆ will publish graduate level texts; research monographs/overviews of established and emerging fields; practitioner-level professional books; and books devoted to the history and social impact of computing. ◆ will be quickly and attractively published as ebooks and print volumes at affordable prices, and widely distributed in both print and digital formats through booksellers and to libraries and individual ACM members via the ACM Digital Library platform.
    [Show full text]
  • CHERI Instruction-Set Architecture
    UCAM-CL-TR-876 Technical Report ISSN 1476-2986 Number 876 Computer Laboratory Capability Hardware Enhanced RISC Instructions: CHERI Instruction-Set Architecture Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Jonathan Anderson, David Chisnall, Brooks Davis, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Robert Norton, Stacey Son September 2015 15 JJ Thomson Avenue Cambridge CB3 0FD United Kingdom phone +44 1223 763500 http://www.cl.cam.ac.uk/ c 2015 Robert N. M. Watson, Peter G. Neumann, Jonathan Woodruff, Michael Roe, Jonathan Anderson, David Chisnall, Brooks Davis, Alexandre Joannou, Ben Laurie, Simon W. Moore, Steven J. Murdoch, Robert Norton, Stacey Son, SRI International Approved for public release; distribution is unlimited. Sponsored by the Defense Advanced Research Projects Agency (DARPA) and the Air Force Research Laboratory (AFRL), under contracts FA8750-10-C-0237 (“CTSRD”) and FA8750-11-C-0249 (“MRC2”) as part of the DARPA CRASH and DARPA MRC research programs. The views, opinions, and/or findings contained in this report are those of the authors and should not be interpreted as representing the official views or policies, either expressed or implied, of the Department of Defense or the U.S. Government. Additional support was received from St John’s College Cambridge, the SOAAP Google Focused Research Award, the RCUK’s Horizon Digital Economy Research Hub Grant (EP/G065802/1), the EPSRC REMS Programme Grant (EP/K008528/1), the Isaac Newton Trust, the UK Higher Education Innovation Fund (HEIF), and Thales E-Security. Technical reports published by the University of Cambridge Computer Laboratory are freely available via the Internet: http://www.cl.cam.ac.uk/techreports/ ISSN 1476-2986 Abstract This technical report describes CHERI ISAv4, the fourth version of the Capability Hardware Enhanced RISC Instructions (CHERI) Instruction-Set Architecture (ISA)1 being developed by SRI International and the University of Cambridge.
    [Show full text]
  • A VLSI Architecture for Enhancing Software Reliability Kanad Ghose Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1988 A VLSI architecture for enhancing software reliability Kanad Ghose Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Computer Sciences Commons Recommended Citation Ghose, Kanad, "A VLSI architecture for enhancing software reliability " (1988). Retrospective Theses and Dissertations. 9345. https://lib.dr.iastate.edu/rtd/9345 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS The most advanced technology has been used to photo­ graph and reproduce this manuscript from the microfilm master. UMI films the original text directly from the copy submitted. Thus, some dissertation copies are in typewriter face, while others may be from a computer printer. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyrighted material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re­ produced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each oversize page is available as one exposure on a standard 35 mm slide or as a 17" x 23" black and white photographic print for an additional charge.
    [Show full text]
  • NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View
    NORTHWESTERN UNIVERSITY Adopting a Gateway Centric View for Cellular Network Content Delivery A DISSERTATION SUBMITTED TO THE GRADUATE SCHOOL IN PARTIAL FULFILLMENT OF THE REQUIREMENTS for the degree DOCTOR OF PHILOSOPHY Field of Computer Science By John Paul Rula EVANSTON, ILLINOIS June 2017 2 c Copyright by John Paul Rula 2017 All Rights Reserved 3 Committee Fabi´anBustamante (Chair), Northwestern University Aleksandar Kuzmanovic, Northwestern University Peter Dinda, Northwestern University Jon Crowcroft, University of Cambridge 4 ABSTRACT Adopting a Gateway Centric View for Cellular Network Content Delivery John Paul Rula Mobile traffic is expected to grow tenfold by 2019, topping 24 exabytes of monthly traffic and accounting for nearly half of all Internet traffic. This growth is driven by the increasing number of smart phones and tablets, and the data demands of high bandwidth services enabled by next-generation cellular networks such as LTE/5G. As in the wired Internet, network usage is dominated by content consumption, with the vast majority served through content delivery networks (CDNs). CDNs host and replicate popular content across thousands of servers worldwide, directing users to \nearby" servers. This replica selection is a key determinant of client performance, yet replica selection for cellular clients has previously been overlooked, due to high radio latency, inconsistent throughput, and a limited number of ingress locations which dominated end-to-end latency. NGCNs and their improved performance place a renewed emphasis on replica selection policies for cellular clients. We find that the performance of existing replica selection systems in cellular networks is hindered by their opacity, the dynamic assignment of clients to infrastructure components, the emergence of centralized DNS within cellular networks, and the growth of public DNS in global mobile operators.
    [Show full text]
  • National Privacy Research Strategy
    NATIONAL PRIVACY RESEARCH STRATEGY National Science and Technology Council Networking and Information Technology Research and Development Program June 2016 National Privacy Research Strategy About the National Science and Technology Council The National Science and Technology Council (NSTC) is the principal means by which the Executive Branch coordinates science and technology policy across the diverse entities that make up the Federal research and development (R&D) enterprise. One of the NSTC’s primary objectives is establishing clear national goals for Federal science and technology investments. The NSTC prepares R&D packages aimed at accomplishing multiple national goals. The NSTC’s work is organized under five committees: Environment, Natural Resources, and Sustainability; Homeland and National Security; Science, Technology, Engineering, and Mathematics (STEM) Education; Science; and Technology. Each of these committees oversees subcommittees and working groups that are focused on different aspects of science and technology. More information is available at www.whitehouse.gov/ostp/nstc. About the Office of Science and Technology Policy The Office of Science and Technology Policy (OSTP) was established by the National Science and Technology Policy, Organization, and Priorities Act of 1976. OSTP’s responsibilities include advising the President in policy formulation and budget development on questions in which science and technology are important elements; articulating the President’s science and technology policy and programs; and fostering strong partnerships among Federal, state, and local governments, and the scientific communities in industry and academia. The Director of OSTP also serves as Assistant to the President for Science and Technology and manages the NSTC. More information is available at www.whitehouse.gov/ostp.
    [Show full text]
  • 3 Is Not a Crowd, It's an Anecdote
    3 is Not a Crowd, It’s an Anecdote Jon Crowcroft Marconi Professor of Communications Systems, Computer Laboratory University of Cambridge Cambridge, UK [email protected] Abstract has been crowd-sourced from the Internet, we should all be Crowd-sourcing measurements from the Internet, for the extremely aware of this non-trivial risk. In some areas of Internet, and by the Internet, is naturally popular due to the studies (e.g. censorship, hacktivism,cybercrime), the risk cost scaling that this approach offers. It appears to offer a of such re-identification to some members of our crowds low barrier to entry to new researchers, when compared with may be extremely high. We are all social scientists, now. the difficulties in obtaining data about operational networks ACM CCS Concepts: C.2, Networks from their owners. Keywords: Internet Measurement, Crowdsourcing, Privacy In this talk I will outline some precautions that should be taken by researchers, including: Sample Bias – Ground truth must be established about your sample. The very fact that you are using people on the internet prepared (assuming you have informed consent – you do, don’t you?) to be part of an experiment, means you have selection bias. Establish what it is by old fashioned means. Subject Privacy – You may get more buy-in from more users, and in more ways, if you can offer assurances about maintaining their privacy: o “No, this app won’t (unlike 70% of smart phone apps) leak lots of your Personal Data”, o How you achieve this, best practice with sandboxes and cryptography and security processes, o AAA applied to your logging databases, BIO o Long term fate, care and curation.
    [Show full text]
  • A Searchable-By-Content File System
    A Searchable-by-Content File System Srinath Sridhar, Jeffrey Stylos and Noam Zeilberger May 2, 2005 Abstract Indexed searching of desktop documents has recently become popular- ized by applications from Google, AOL, Yahoo!, MSN and others. How- ever, each of these is an application separate from the file system. In our project, we explore the performance tradeoffs and other issues encountered when implementing file indexing inside the file system. We developed a novel virtual-directory interface to allow application and user access to the index. In addition, we found that by deferring indexing slightly, we could coalesce file indexing tasks to reduce total work while still getting good performance. 1 Introduction Searching has always been one of the fundamental problems of computer science, and from their beginnings computer systems were designed to support and when possible automate these searches. This support ranges from the simple-minded (e.g., text editors that allow searching for keywords) to the extremely powerful (e.g., relational database query languages). But for the mundane task of per- forming searches on users’ files, available tools still leave much to be desired. For the most part, searches are limited to queries on a directory namespace—Unix shell wildcard patterns are useful for matching against small numbers of files, GNU locate for finding files in the directory hierarchy. Searches on file data are much more difficult. While from a logical point of view, grep combined with the Unix pipe mechanisms provides a nearly universal solution to content-based searches, realistically it can be used only for searching within small numbers of (small-sized) files, because of its inherent linear complexity.
    [Show full text]
  • A Semantic File System for Integrated Product Data Management', Advanced Engineering Informatics, Vol
    Citation for published version: Eck, O & Schaefer, D 2011, 'A Semantic File System for Integrated Product Data Management', Advanced Engineering Informatics, vol. 25, no. 2, pp. 177-184. https://doi.org/10.1016/j.aei.2010.08.005 DOI: 10.1016/j.aei.2010.08.005 Publication date: 2011 Document Version Publisher's PDF, also known as Version of record Link to publication University of Bath Alternative formats If you require this document in an alternative format, please contact: [email protected] General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 02. Oct. 2021 Advanced Engineering Informatics 25 (2011) 177–184 Contents lists available at ScienceDirect Advanced Engineering Informatics journal homepage: www.elsevier.com/locate/aei A semantic file system for integrated product data management ⇑ Oliver Eck a, , Dirk Schaefer b a Department of Computer Science, HTWG Konstanz, Germany b Systems Realization Laboratory, Woodruff School of Mechanical Engineering, Georgia Institute of Technology, Atlanta, GA, USA article info abstract Article history: A mechatronic system is a synergistic integration of mechanical, electrical, electronic and software tech- Received 31 October 2009 nologies into electromechanical systems. Unfortunately, mechanical, electrical, and software data are Received in revised form 10 June 2010 often handled in separate Product Data Management (PDM) systems with no automated sharing of data Accepted 17 August 2010 between them or links between their data.
    [Show full text]
  • Contribution to Study Period on Privacy Engineering Framework
    PReparing Industry to Privacy-by-design by supporting its Application in REsearch Contribution to Study Period on Privacy Engineering Framework Project: PRIPARE Project Number: ICT -6106 Title: Contribution to Study Period on Privacy Engineering Framework Version: v1.0 Part of the Seventh Date: 06/08/2015 Framework Programme Confidentiality: Public Funded by the EC - DG CNECT Author/s: Antonio Kung, Christophe Jouvray (Trialog), Nicolas Notario, Alberto Crespo (Atos), Samuel Martin, José del Álamo (UPM), Carmela Troncoso (Gradiant). PRIPARE Contribution to Study Period on Privacy Engineering Framework v1.0 Table of Contents SUMMARY ..........................................................................................................4 LIST OF FIGURES ..................................................................................................5 ABBREVIATIONS AND DEFINITIONS .....................................................................5 1 INTRODUCTION ............................................................................................6 2 PRIVACY FRAMEWORK VERSUS PRIVACY ENGINEERING FRAMEWORK .........7 2.1 ABOUT FRAMEWORKS ................................................................................................ 7 2.2 POSITIONING PRIVACY ENGINEERING IN ORGANISATIONS..................................................... 7 2.3 WHY A PRIVACY ENGINEERING FRAMEWORK? ................................................................ 10 2.3.1 Need for Convergence of Terms..................................................................
    [Show full text]
  • Opening & Welcoming Remarks
    Tuesday, April 10 – Wednesday, April 11, 2018, Washington, DC Opening & Welcoming Remarks Speaker 1 Joe Bhatia, President and CEO, ANSI Welcoming Remarks from ANSI Joe Bhatia has been president and CEO of the American National Standards Institute (ANSI) since January 2006. He previously served as executive vice president and COO of the international group at Underwriters Laboratories (UL). Mr. Bhatia serves as vice chairman of the Industry Trade Advisory Committee on Standards and Technical Trade Barriers (ITAC 16), a joint program of the U.S. Department of Commerce and U.S. Trade Representative. He is a member of the International Organization for Standardization (ISO) Council and its Council Standing Committee on Finance, and holds a seat on the Oakton Community College Education Foundation Board. In 2017 he concluded his term as president of the Pan American Standards Commission (COPANT), where he also served as vice president for four years. Speaker 2 Christoph Winterhalter, Chairman of the Executive Board of DIN Welcoming Remarks from DIN After studying computer science at the University of Karlsruhe Winterhalter started his career at ABB. After assignments in Norway, USA and Germany he took over the business units robot automation and robotics products. In 2010 he became director of the German Research Center of ABB until he was promoted global Product Group manager heading ABB’s global Machinery Controls and Automation business and later Hub Business Manager Control Technologies. Since July 2016 he is Chairman of the Executive Board of DIN. Speaker 3 Thomas Sentko, Standards Manager, International of DKE Welcoming remarks from DKE 2 Thomas studied electrical engineering/telecommunications at the University of Applied Sciences Darmstadt and graduated with the degree Dipl.Ing.
    [Show full text]