Recommending Access Policies in Cross-domain Internet

Nuno Bettencourt, Nuno Silva, João Barroso

Abstract

As the amount of content and the number of users in social relationships is continually growing in the Internet, resource sharing and access policy management is difficult, time-consuming and error-prone. In order to aid users in the resource-sharing process, the adoption of an entity that recommends users with access policies for their resources is proposed, by the analysis of (i) resource content, (ii) user preferences, (iii) users’ social networks, (iv) semantic information, (v) user feedback about recommendation actions and (vi) provenance/ traceability information gathered from action sensors. A hybrid recommendation engine capable of performing collaborative-filtering was adopted and enhanced to use semantic information. Such recommendation engine translates user and resources’ semantic information and aggregates those with other content, using a collaborative filtering technique. Recommendation of access policies over resources promotes the discovery of known-unknown and unknown-unknown resources to other users that could not even know about the existence of such resources. Evaluation to such recommender system is performed.

References

  1. Adomavicius, G. and Alexander, T. (2011). Context-Aware Recommender Systems. In Ricci, F., Rokach, L., Shapira, B., and Kantor, P. B., editors, Media, chapter 7, pages 217-253. Springer US.
  2. Bettencourt, N. and Silva, N. (2010). Recommending Access to Web Resources based on User's Profile and Traceability. In the Tenth IEEE International Conference on Computer and Information Technology, CIT'10, pages 1108-1113, Bradford, UK. IEEE.
  3. Convery, S. (2007). Network Authentication, Authorization, and Accounting: Part One: Concepts, Elements and Approaches. The Internet Protocol Journal, 10(1):2-11.
  4. Ghita, S., Nejdl, W., and Paiu, R. (2005). Semantically Rich Recommendations in Social Networks for Sharing, Exchanging and Ranking Semantic Context. Social Networks, 3729:293-307.
  5. Linden, G., Smith, B., and York, J. (2003). Amazon.com Recommendations: Item-to-Item Collaborative Filtering. IEEE Internet Computing, 7(1):76-80.
  6. MacKinnon, K. A. (2012). User Generated Content vs. Advertising: Do Consumers Trust the Word of Others Over Advertisers? The Elon Journal of Undergraduate Research in Communications, 3(1):14-22.
  7. Nair, S. (2013). XACML Reference Architecture. http://developers.xiomatics.com/blog/index/entry/ xacml-reference-architecture.html. Accessed on May 3, 2015.
  8. Nimmons, S. (2012). Policy Enforcement Point Pattern. http://stevenimmons.org/2012/02/policy-enforcementpoint-pattern/. Accessed on May 4, 2015.
  9. Owen, S., Anil, R., Dunning, T., and Friedman, E. (2011). Mahout in Action. Manning.
  10. Parducci, B. and Lockhart, H. (2013). eXtensible Access Control Markup Language (XACML) Version 3.0. Technical Report January, OASIS.
  11. Resnick, P., Kuwabara, K., Zeckhauser, R., and Friedman, E. (2000). Reputation Systems. Communications of the ACM, 43(12):45-48.
  12. Ruohomaa, S., Kutvonen, L., and Koutrouli, E. (2007). Reputation Management Survey. In Second International Conference on Availability, Reliability and Security, ARES'07, Vienna, Austria.
  13. Said, A., Kille, B., De Luca, E. W., and Albayrak, S. (2011). Personalizing Tags: A Folksonomy-like Approach for Recommending Movies. In Proceedings of the Second International Workshop on Information Heterogeneity and Fusion in Recommender Systems, HetRec'11, pages 53-56, Chicago, IL, USA. ACM.
  14. Schafer, J. B., Konstan, J. A., and Riedl, J. (2001). E-Commerce Recommendation Applications. Data Mining and Knowledge Discovery, 5(1):115-153.
  15. Shardanand, U. and Maes, P. (1995). Social Information Filtering: Algorithms for Automating “Word of Mouth”. In the Proceedings of the ACM Conference on Human Factors in Computing Systems, editor, Katz, I R and Mack, R and Marks, L and Rosson, M B and Nielsen, J, volume 1 of CHI 7895, pages 210-217. ACM Press/Addison-Wesley Publishing Co.
  16. Speier, C., Valacich, J. S., and Vessey, I. (1999). The Influence of Task Interruption on Individual Decision Making: An Information Overload Perspective. Decision Sciences, 30(2):337-360.
  17. Stephen, L., Dettelback, W., and Kaushik, N. (2008). Modernizing Access Control with Authorization Service. Oracle - Developers and Identity Services, (November).
  18. Vollbrecht, J. R., Calhoun, P. R., Farrell, S., Gommans, L., Gross, G. M., de Bruijn, B., de Laat, C. T., Holdrege, M., and Spence, D. W. (2000). AAA Authorization Framework [RFC 2904]. The Internet Society.
  19. Wasserman, S. (2012). The Amazon Effect. http://www. thenation.com/print/article/168125/amazon-effect. Accessed on April 27, 2015.
  20. Wasserman, S. and Faust, K. (1994). Social Network Analysis: Methods and Applications. Structural analysis in the social sciences. Cambridge University Press, 1 edition.
  21. Westerinen, A. and Schnizlein, J. (2001). Terminology for Policy-Based Management [RFC 3198]. The Internet Society.
  22. Yavatkar, R., Pendarakis, D., and Guerin, R. (2000). A Framework for Policy-based Admission Control [RFC2753]. The Internet Society.
Download


Paper Citation


in Harvard Style

Bettencourt N., Silva N. and Barroso J. (2015). Recommending Access Policies in Cross-domain Internet . In Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: KMIS, (IC3K 2015) ISBN 978-989-758-158-8, pages 50-61. DOI: 10.5220/0005600500500061


in Bibtex Style

@conference{kmis15,
author={Nuno Bettencourt and Nuno Silva and João Barroso},
title={Recommending Access Policies in Cross-domain Internet},
booktitle={Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: KMIS, (IC3K 2015)},
year={2015},
pages={50-61},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005600500500061},
isbn={978-989-758-158-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 7th International Joint Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management - Volume 3: KMIS, (IC3K 2015)
TI - Recommending Access Policies in Cross-domain Internet
SN - 978-989-758-158-8
AU - Bettencourt N.
AU - Silva N.
AU - Barroso J.
PY - 2015
SP - 50
EP - 61
DO - 10.5220/0005600500500061