ACM DL

Internet Technology (TOIT)

Menu

Search Issue
enter search term and/or author name

Archive


ACM Transactions on Internet Technology (TOIT) - Special Issue on Artificial Intelligence for Secruity and Privacy and Regular Papers, Volume 18 Issue 3, May 2017

Section: Special Issue on Artificial Intelligence for Security and Privacy

Guest Editors’ Introduction
Özgür Kafali, Natalia Criado, Martin Rehak, Jose M. Such, Pinar Yolum
Article No.: 26
DOI: 10.1145/3177884

Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer Networks
Igor Saenko, Igor Kotenko
Article No.: 27
DOI: 10.1145/3093898

To create solutions for providing the required access control in computer networks it is not sufficient to have only tools and protocols in the network that are needed for it. It is necessary to create corresponding configuration, or scheme, of...

Quantifying Privacy Leakage in Multi-Agent Planning
Michal Štolba, Jan Tožička, Antonín Komenda
Article No.: 28
DOI: 10.1145/3133326

Multi-agent planning using MA-STRIPS–related models is often motivated by the preservation of private information. Such a motivation is not only natural for multi-agent systems but also is one of the main reasons multi-agent planning...

Decision Networks for Security Risk Assessment of Critical Infrastructures
Daniele Codetta-Raiteri, Luigi Portinale
Article No.: 29
DOI: 10.1145/3137570

We exploit Decision Networks (DN) for the analysis of attack/defense scenarios in critical infrastructures. DN extend Bayesian Networks (BN) with decision and value nodes. DN inherit from BN the possibility to naturally address uncertainty at...

SHARE: A Stackelberg Honey-Based Adversarial Reasoning Engine
Sushil Jajodia, Noseong Park, Edoardo Serra, V. S. Subrahmanian
Article No.: 30
DOI: 10.1145/3137571

A “noisy-rich” (NR) cyber-attacker (Lippmann et al. 2012) is one who tries all available vulnerabilities until he or she successfully compromises the targeted network. We develop an adversarial foundation, based on Stackelberg...

Fine-Grained Access Control via Policy-Carrying Data
Julian A. Padget, Wamberto W. Vasconcelos
Article No.: 31
DOI: 10.1145/3133324

We address the problem of associating access policies with datasets and how to monitor compliance via policy-carrying data. Our contributions are a formal model in first-order logic inspired by normative multi-agent systems to regulate data...

Section: Regular Papers

Collaborative Location Recommendation by Integrating Multi-dimensional Contextual Information
Lina Yao, Quan Z. Sheng, Xianzhi Wang, Wei Emma Zhang, Yongrui Qin
Article No.: 32
DOI: 10.1145/3134438

Point-of-Interest (POI) recommendation is a new type of recommendation task that comes along with the prevalence of location-based social networks and services in recent years. Compared with traditional recommendation tasks, POI recommendation...

Toward Efficient Short-Video Sharing in the YouTube Social Network
Haiying Shen, Harrison Chandler, Haoyu Wang
Article No.: 33
DOI: 10.1145/3137569

The past few years have seen an explosion in the popularity of online short-video sharing in YouTube. As the number of users continue to grow, the bandwidth required to maintain acceptable quality of service (QoS) has greatly increased....

Cross-Browser Differences Detection Based on an Empirical Metric for Web Page Visual Similarity
Zhen Xu, James Miller
Article No.: 34
DOI: 10.1145/3140544

This article aims to develop a method to detect visual differences introduced into web pages when they are rendered in different browsers. To achieve this goal, we propose an empirical visual similarity metric by mimicking human mechanisms of...

A Learning-Based Framework for Improving Querying on Web Interfaces of Curated Knowledge Bases
Wei Emma Zhang, Quan Z. Sheng, Lina Yao, Kerry Taylor, Ali Shemshadi, Yongrui Qin
Article No.: 35
DOI: 10.1145/3155806

Knowledge Bases (KBs) are widely used as one of the fundamental components in Semantic Web applications as they provide facts and relationships that can be automatically understood by machines. Curated knowledge bases usually use Resource...

Are We There Yet? IPv6 in Australia and China
Sebastian Zander, Xuequn Wang
Article No.: 36
DOI: 10.1145/3158374

IP (Internet Protocol) version 6 (IPv6) was standardised in 1998 to address the expected runout of IP version 4 (IPv4) addresses. However, the transition from IPv4 to IPv6 has been very slow in many countries. We investigate the state of IPv6...

Duplicate Detection in Programming Question Answering Communities
Wei Emma Zhang, Quan Z. Sheng, Jey Han Lau, Ermyas Abebe, Wenjie Ruan
Article No.: 37
DOI: 10.1145/3169795

Community-based Question Answering (CQA) websites are attracting increasing numbers of users and contributors in recent years. However, duplicate questions frequently occur in CQA websites and are currently manually identified by the moderators....

Providing Geo-Elasticity in Geographically Distributed Clouds
Tian Guo, Prashant Shenoy
Article No.: 38
DOI: 10.1145/3169794

Geographically distributed cloud platforms are well suited for serving a geographically diverse user base. However, traditional cloud provisioning mechanisms that make local scaling decisions are not adequate for delivering the best possible...

Interest-Aware Content Discovery in Peer-to-Peer Social Networks
Yonghong Guo, Lu Liu, Yan Wu, James Hardy
Article No.: 39
DOI: 10.1145/3176247

With the increasing popularity and rapid development of Online Social Networks (OSNs), OSNs not only bring fundamental changes to information and communication technologies, but also make an extensive and profound impact on all aspects of our...