• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1
  • 1
  • Tagged with
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Toward Attack-Resistant Distributed Information Systems by Means of Social Trust

Sirivianos, Michael January 2010 (has links)
<p>Trust has played a central role in the design of open distributed systems that span distinct administrative domains. When components of a distributed system can assess the trustworthiness of their peers, they are in a better position to interact with them. There are numerous examples of distributed systems that employ trust inference techniques to regulate the interactions of their components including peer-to-peer file sharing systems, web site and email server reputation services and web search engines.</p> <p>The recent rise in popularity of Online Social Networking (OSN) services has made an additional dimension of trust readily available to system designers: social trust. By social trust, we refer to the trust information embedded in social links as annotated by users of an OSN. This thesis' overarching contribution is methods for employing social trust embedded in OSNs to solve two distinct and significant problems in distributed information systems. </p> <p>The first system proposed in this thesis assesses the ability of OSN users to correctly classify online identity assertions. The second system assesses the ability of OSN users to correctly configure devices that classify spamming hosts. In both systems, an OSN user explicitly ascribes to his friends a value that reflects how trustworthy he considers their classifications. In addition, both solutions compare the classification input of friends to obtain a more accurate measure of their pairwise trust. Our solutions also exploit trust transitivity over the social network to assign trust values to the OSN users. These values are used to weigh the classification input by each user in order to derive an aggregate trust score for the identity assertions or the hosts.</p> <p>In particular, the first problem involves the assessment of the veracity of assertions on identity attributes made by online users. Anonymity is one of the main virtues of the Internet. It protects privacy and freedom of speech, but makes it hard to assess the veracity of assertions made by online users concerning their identity attributes (e.g, age or profession.) We propose FaceTrust, the first system that uses OSN services to provide lightweight identity credentials while preserving a user's anonymity. FaceTrust employs a ``game with a purpose'' design to elicit the</p> <p>opinions of the friends of a user about the user's self-claimed identity attributes, and uses attack-resistant trust inference to compute veracity scores for the attributes. FaceTrust then provides credentials, which a user can use to corroborate his online identity assertions. </p> <p>We evaluated FaceTrust using a crawled social network graph as well as a real-world deployment. The results show that our veracity scores strongly correlate with the ground truth, even when a large fraction of the social network users are dishonest. For example, in our simulation over the sample social graph, when 50% of users were dishonest and each user employed 1000 Sybils, the false assertions obtained approximately only 10% of the veracity score of the true assertions. We have derived the following lessons from the design and deployment of FaceTrust: a) it is plausible to obtain a relatively reliable measure of the veracity of identity assertions by relying on the friends of the user that made the assertion to classify them, and by employing social trust to determine the trustworthiness of the classifications; b) it is plausible to employ trust inference over the social graph to effectively mitigate Sybil attacks; c) users tend to mostly correctly classify their friends' identity assertions.</p> <p>The second problem in which we apply social trust involves assessing the trustworthiness of reporters (detectors) of spamming hosts in a collaborative spam mitigation system. Spam mitigation can be broadly classified into two main approaches: a) centralized security infrastructures that rely on a limited number of trusted monitors (reporters) to detect and report malicious traffic; and b) highly distributed systems that leverage the experiences of multiple nodes within distinct trust domains. The first approach offers limited threat coverage and slow response times, and it is often proprietary. The second approach is not widely adopted, partly due to the </p> <p>lack of assurances regarding the trustworthiness of the reporters. </p> <p>Our proposal, SocialFilter, aims to achieve the trustworthiness of centralized security services and the wide coverage, responsiveness, and inexpensiveness of large-scale collaborative spam mitigation. It enables nodes with no email classification functionality to query the network on whether a host is a spammer. SocialFilter employs trust inference to weigh the reports concerning spamming hosts that collaborating reporters submit to the system. To the best of our knowledge, </p> <p>it is the first collaborative threat mitigation system that assesses the trustworthiness of the reporters by both auditing their reports and by leveraging the social network of the reporters' human administrators. Subsequently, SocialFilter weighs the spam reports according to the trustworthiness of their reporters to derive a measure of the system's belief that a host is a spammer. </p> <p>We performed a simulation-based evaluation of SocialFilter, which indicates its potential: </p> <p>during a simulated spam campaign, SocialFilter classified correctly 99% of spam, while yielding no false positives. The design and evaluation of SocialFilter offered us the following lessons: a) it is plausible to introduce Sybil-resilient OSN-based trust inference mechanisms to improve the reliability and the attack-resilience of collaborative spam mitigation; b) using social links to obtain the trustworthiness of reports concerning spammers (spammer reports) can result in comparable spam-blocking effectiveness with approaches that use social links to rate-limit spam (e.g., Ostra); c) unlike Ostra, SocialFilter yields no false positives. We believe that the design lessons from SocialFilter are applicable to other collaborative entity classification systems.</p> / Dissertation
2

La scène musicale populaire autochtone au Québec : dynamiques relationnelles et identitaires

Audet, Véronique 04 1900 (has links)
La musique, pour les Autochtones au Québec, joue un rôle fondamental pour l’expression et la consolidation identitaire, la mise en relation interpersonnelle, interculturelle et spirituelle ainsi que pour exercer un pouvoir d’action et de transformation sur soi et le milieu environnant. Cette thèse dresse un panorama de la scène musicale populaire autochtone contemporaine au Québec, en s’attardant plus particulièrement au milieu algonquien du Nord, tout en démontrant un lien de continuité évident avec le sens des traditions musicales et des rassemblements ancestraux. La musique populaire autochtone y est considérée comme un mode d’affirmation identitaire et de relation au monde, la scène de la musique populaire autochtone au Québec comme un réseau relationnel, et les événements musicaux comme des points de rencontre et de convergence (foyers) d’une communauté autochtone s’y reconnaissant et s’y reliant de façons différenciées. Le cadre théorique arrime les concepts de scène dans le contexte de culture populaire, des politiques/poétiques de l’identité, d’intersubjectivité, de résonance, de nomadisme, d’ontologie relationnelle, de poétiques de l’habiter (of dwelling), d’indigénisation et de transformation des identités et des modes d'être au monde autochtones dans le contexte contemporain. Selon les traditions algonquiennes, les actes musicaux servent à s’identifier en tant que personne particulière et membre d’une collectivité et du cosmos ainsi qu’à entretenir des relations avec les autres personnes du cosmos (humains et non humains) afin de vivre bien et de se donner du pouvoir sur soi et son environnement. Cette thèse démontre que les musiques populaires contemporaines et ses événements associés, bien que sous d’autres formes, poursuivent ce sens relationnel et identitaire des traditions musicales ancestrales et de leurs contextes de manifestation. Le réseau contemporain de la scène musicale populaire autochtone est ainsi formé d’espaces investis par les Autochtones de différentes nations, où ils se créent un chez-nous, un « espace à nous » et se redéfinissent des identités. Chanter, notamment dans leur langue, est ainsi un acte d’« habitation » du monde, de cohabitation, de communication, une inscription identitaire dans un environnement ainsi habité et senti. / For Aboriginal people in Quebec, music plays a fundamental role in the consolidation and expression of identity in interpersonal, intercultural and spiritual relationships, but also in terms of personal empowerment. This thesis provides an overview of the contemporary Aboriginal popular music scene in Quebec, focusing more specifically on Algonquian communities and demonstrating continuity with musical traditions and ancestral gatherings. Aboriginal popular music is considered as a way of asserting identity and a relationship to the world; the aboriginal popular music scene in Quebec is presented as a network of relationships, and musical events are seen as focal points of an aboriginal community that connect individuals and groups in differentiated ways. According Algonquian traditions, musical acts are used to identify oneself as a particular person and member of a community and the cosmos as well as to maintain relationships with others in the cosmos (human and nonhuman). Different forms of musical practice are desirable in order to live well and to empower the self in a particular environment. This thesis demonstrates that contemporary popular music and its associated events, albeit in other forms, are continuing a relational sense of ancestral musical traditions in various performative contexts. The contemporary Aboriginal popular music scene network is forged through spaces invested by Aboriginal people of different nations, where they create a "home", a "space for us", and redefine identity in unexpected ways. Singing, especially in Aboriginal languages, is an act of dwelling and cohabitation in an environment that is lived and felt.

Page generated in 0.105 seconds