Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
|
|
|
- Brooke Mosley
- 10 years ago
- Views:
Transcription
1 Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting on-the-fly SPARQL queries proxy. Conférence Ingénierie des Connaissances (IC 2014), May 2014, France. pp.9. <hal > HAL Id: hal Submitted on 8 Oct 2014 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 Additional mechanisms for SPARQL proxy Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaïsse-Lesteven 1,2, Bruno Grilhères 2 1 GREYC, Team Modèle-Agent-Décision, University of Caen Basse-Normandie, France [email protected] 2 Team Information Processing Control and Cognition, AIRBUS GROUP, Val-de-Reuil, France [email protected] Résumé : A new approach for access management applied to semantic knowledge bases was explored by the WIMMICS team of INRIA. They built a proxy that according to an RDF security policy rewrites on-the-fly SPARQL queries. This work presents some extensions and upgrades applied to the original mechanism that corrects flaws in the application of the security policy. Mots-clés : SPARQL, RDF, proxy, access management, security 1 Introduction Denying or allowing access to a set of resources is a common problem in many computing fields. In the domain of the web of data, the open nature of the domain resulted in many systems that relied on trust in the user. This accessibility to data gave the impression to many institutions that data aren t safe in semantic repositories. In order to tackle this idea, in (Costabello et al., 2012) the authors present a proxy that rewrites on-the-fly user queries according to security policies. However, the proxy presented in (Costabello et al., 2012), despite a very good concept, presents weaknesses and reduces the expressivity of SPARQL, the standard language for requesting semantic data. This work presents the identified flaws and proposals to solve these problems. 2 State of the art Several methods exist to secure a knowledge base exposed as a SPARQL endpoint on the web. The most used one consists of allowing total read-only access, but blocks all the update queries received. A more flexible approach is the use of the standard XACML technologies, which can be adapted for ad-hoc solutions. Deriving from these works, some recommendations now exist for adapting XACML to work with semantic technologies (Tyson, 2010). This approach, which consists of adapting previous technologies to new needs, was followed by many attempts to create new specific semantic data-access management technologies. Many of these systems, such as WAC (W3C, 2014) or AMO (Buffa & Faron-Zucker, 2012) or OAuth system (Tomaszuk & Rybinski, 2011), use an ontology to describe users, resources and user privileges, and so allow the representation of security policy using RDF. However, with these frameworks one can determine if a given access must be authorised or prohibited, but using only semantic technologies, can t filter access to only a part of the protected content dynamically. This is the functionality that the framework SHI3LD proposes.
3 IC The SHI3LD proxy The SHI3LD proxy created by the WIMMICS team of INRIA protects data stored in a graph store according to a set of RDF security policies. When a query is sent to the proxy, it evaluates the request context. It consists mainly of information about the requester such as his identity, his company, his location... Depending on this context and policies, the proxy rewrites the query, and so grants access to some part of the graph store. This mechanism is illustrated in Figure 1. FIGURE 1 General mechanism of SHI3LD (http ://wimmics.inria.fr/projects/shi3ld/) In this example the requester tries to send a SPARQL request of type SELECT. The proxy uses all available information about the user s context, and decides, in compliance with the policies, that among the three graphs stored in the knowledge base( :ng1, ng2 and :ng3 ), the graph :ng1 isn t available. So the proxy rewrites the user query by adding FROM :ng2, :ng3 to it. In that way the user can only access authorized information and can t even evaluate if information exists that he can t access. The authors defined their SHI3LD proxy as a three step process : Query Contextualisation : at request time, the user context of the query is associated to the user query to allow data protection. The user context is stored in the triple store. Access Policy Evaluation : using the user context, the proxy deduces a set of satisfied policies. Graphs protected by these policies are added to the set of the user s accessible graphs. Given this set of authorised graphs, the query is rewritten. Query Execution : The rewritten query is sent to the triple store and the result returned to the client. As policy satisfaction is context dependant, the same user addressing the same request to the proxy could obtain a different result if the context changes. The proxy dynamically adapts its comportment to the user. Additionally, the SHI3LD proxy instead calculates an authorised or prohibited access, it computes a result using the user privileges, and then returns it. In the following sections this document presents some additional mechanisms proposed to extend the query rewriting process, and correct some flaws that concern the query rewriting process. 4 Flaws, limitations and proposals 4.1 Flaw caused by the additive-only nature of the process During the SPARQL proxy query rewriting process all the accessible graphs are added to the user query in FROM clauses. An evident weakness comes from the fact that it is implicitly
4 Additional mechanisms for SPARQL proxy supposed that the users don t send any query that already contains a FROM clause that targets a graph of the triple store. In case of violation of this requirement, someone knowing a graph s URI can access any data in that graph, bypassing totally the proxy. This is illustrated in Figure 2. FIGURE 2 Security flaw due to the additive-only nature of the rewriting process In this example Alice sends a query that accesses a forbidden graph -on this example, as in all the following, the access is evaluated with a static context which entails that Alice can access to the blue graph ( :gr3 ) and Bob to the red ones ( :gr1, :gr2 and :gr3 ). The Access Policy Evaluation process using the policies concludes that Alice can only access the graph :gr3, and so only graph :gr3 is added to the query s range. So, the triple store protected by the proxy receives a query accessing data stored in the authorised graph and in the forbidden one. It results in Alice gathering forbidden data. An easy solution consists of explicitly blocking all queries specifying a set of target graphs. But, considering these facts : Targeting specific graphs is a part of the SPARQL 1.1 standard The RDF policies used with SHI3LD enforce structuring data using graphs (Costabello et al., 2012) demonstrated that accessing fewer graphs improves the response time of queries It seems logical to use the SPARQL language capability to target specific graphs in software, particularly when the location of the information in the triple store is known. In order to allow the use of such queries with the proxy while guaranteeing that access policies won t be violated, the rewriting process must remove targeted graphs whose access is forbidden, as illustrated in Figure The zero target problem There is a second easily identifiable problem that happens if the user can t access any graph at the end of the rewriting process. This can occur in two cases : The user can t access any graph, and at the end of the process no target has been added. The user targeted only forbidden graphs, and the process ends after the removal of the last query s target. Providing that the proxy uses the extension presented in the last part, the second use case obviously tends to appear more frequently than the other because users without any data accessible tend to be rare. This is show in Figure 3
5 IC 2014 FIGURE 3 Security flaw due to the lack of description in the standard Problems come with the fact that in that case the query transmitted to the triple store doesn t specify any target graph. In that case, the triple store executes the query against the default union graph, that is the graph that contains all the triples that aren t stored specifically in a graph. Because of the policies, all the triples are supposed to be stored in specific graphs in order to allow the expression of policies concerning these triples. Moreover, as they aren t in any graph, if such triples exist they aren t supposed to be accessible through the proxy as it provides access only to data stored in accessible graphs. Considering these facts, it is obvious that the result of a rewritten query that doesn t specify any target should be an empty set of results. And here is the problem, the result computed by triple store on query reception depends on its implementation. The W3C standards do not define how a triple store is supposed to manage its default union graph. So, some implementations consider that the default union graph contains only triples not specifically stored in other graphs, as explained before. Meanwhile, others consider that the default union graph contains all the triples of the triple store with the graph dimension sliced out. These different behaviours have been observed on Fuseki and Sesame triple stores, both being standards and references for the domain in the category of open source triple store software. To tackle this problem of no-target queries, the solution proposed consists of adding a new graphp. LetPbe the absorbing graph that always verifies : P = This property must be enforced by a policy that definespas a read access only graph. When, at the end of the accessible graph filtering, a query normally has to be executed on the union default graph of the triple store, the proxy instead forces its execution onpby adding it to the query range. As by construction, P is empty, the query result is necessarily an empty set of bindings. 4.3 Impossible to use both triple and quad patterns Another problem was identified with the rewriting process of SELECT queries. The SPARQL SELECT queries are composed of two parts. The first one consists of a set of variables. This
6 Additional mechanisms for SPARQL proxy set specifies the results returned by the query. Concerning the second part, it contains a pattern describing relations that have to be satisfied by any binding of variables to be correct and returned. Two type of pattern exist, triple patterns and quad patterns. Unlike a triple pattern that only describes a set of conditions to match bindings involving triples, a quad pattern describes relations about graphs that contain triples, and triples themselves. The SPARQL 1.1 standard describes how such patterns must be written and handled by triplestores. The problem is that, as a side effect, the current mechanism invalidates the use of both triple and quad patterns on the triple store in a same query. It has been explained before that all the queries that pass through the proxy contain FROM clauses. The effect of a set of FROM clauses is the restriction of the range of the query to a graph corresponding to the union of all the graphs targeted by these clauses. That means that the graph dimension for the data accessed by the proxy has been removed. On other hand, when the query contains a quad pattern, FROM NAMED clauses are added. In that case the query is executed against a set of delimited and separated graph. Queries using both triple and graph patterns in that case never have any correct binding, and so queries involving the two patterns never have any result. In order to allow the use of the full capability of the SPARQL language it s sufficient to add for each accessible graph, the FROM clause and the FROM NAMED clause targeting the same graph. The addition of these two clauses will result in a query executed on the union of the graph targeted and also on all the independent graphs targeted. This process is illustrated by Figure 4 FIGURE 4 Allowing quad patterns by adding FROM NAMED clauses 4.4 Federated queries problem Finally, a last problem related to the SPARQL syntax comes from the standard capacity to handle federated queries. A federated query allows a query author to direct a portion of a query to a particular SPARQL endpoint. This may cause a flaw in the security of data. In fact when using a proxy like SHI3LD to protect a triple store, the protected triple store is configured to refuse all connections that don t come from the proxy. Indeed, the proxy can t rewrite the subquery associated with a distant endpoint as it doesn t protect this endpoint and so doesn t have to filter data that come from it. So, depending on your triple store software, using a federated query that requests the protected triple store using its local location can result in an unchecked access through the proxy to the data stored. This flaw is illustrated in Figure 5.
7 IC 2014 FIGURE 5 Service used to bypass proxy In order to correct this flaw the proxy must block queries that contain a SERVICE clause with the address of the protected triple store as external SPARQL endpoint. There is no reason to allow such use of the SERVICE clause ; patterns that concern the local triple store should be in the main query. Finally, our works conclude that a improved algorithm for rewriting queries in a SHI3LD-like
8 Additional mechanisms for SPARQL proxy proxy is : Data :Q:aSELECT SPARQL query, andct : the context of the query Result :Q : the query rewritten to match the policies Q Q if Q contains SERVICE clauses then for SERVICE clause C ofqdo iftarget(c)=protected triple store then return fail A {AuthorisedGraphs(Ct)} T {TargetedGraphs(Q)} if T = then for graph G ofado AddFromFromNamedClause(Q,G) else for graph G oft do ifg / A then RemoveFromFromNamedClause(Q,G) T {TargetedGraphs(Q )} if T = then AddFromPitGraph(Q ) returnq This processing allows the use of more capacity of the SPARQL language than the one presented by the WIMMICS team of INRIA while it still provides security for the data stored in the triple store. 5 Experimentations and Validation During this work, given a set of users and a set of policies, we constructed a set of queries to cover SPARQL functionality. At execution time, these queries were executed, and then the obtained results compared to expected ones. The benchmark was executed each time on both Sesame and Jena triplestores. This approach revealed the previously identified flaws of the SHI3LD rewriting process, and conduced to the new process presented in this paper. Members of the team using only SPARQL requests weren t able to access forbidden data with this new process. A subset of these evaluation queries and the comparison between SHI3LD and our proxy is shown in Figure 6. 6 Conclusion Starting from an analysis of the core concept of SHI3LD, this document describes a problem coming from the additive-only nature of the query rewriting process. We propose adding a complementary subtractive approach that corrects this flaw. A second problem appears with
9 IC 2014 FIGURE 6 Service used to bypass proxy
10 Additional mechanisms for SPARQL proxy user queries without any graph target at the end of the rewriting process. This leads to, depending on the implementation of the triple store, a user being allowed to access all the data instead of getting a null result. The use of an absorbing graph added as a target for such queries has been recommended to solve this issue. Then, an analysis of the way triple stores work led us to identify a non-standard comportment with quad patterns due to the rewriting process. The addition of the FROM NAMED clauses during the addition of targeted graphs is sufficient to restore the normal comportment. Finally a security issue is identified coming from federated queries, that s why, if certain conditions are fulfilled, such queries must be blocked. This document ends with an algorithm proposal that contains all these improvements. Références BUFFA M. & FARON-ZUCKER C. (2012). Ontology-based access rights management. In Advances in Knowledge Discovery and Management Studies in Computational Intelligence Volume COSTABELLO L., VILLATA S. & GANDON F. (2012). Context-aware access control for rdf graph stores. In ECAI - 20th European Conference on Artificial Intelligence TOMASZUK D. & RYBINSKI H. (2011). Oauth+uao : A distributed identification mechanism for triplestores. In ICCCI (1). TYSON P. (2010). Xacml and rdf. Accessed : W3C (2014). Web access control. Accessed :
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
Territorial Intelligence and Innovation for the Socio-Ecological Transition
Territorial Intelligence and Innovation for the Socio-Ecological Transition Jean-Jacques Girardot, Evelyne Brunau To cite this version: Jean-Jacques Girardot, Evelyne Brunau. Territorial Intelligence and
A model driven approach for bridging ILOG Rule Language and RIF
A model driven approach for bridging ILOG Rule Language and RIF Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali To cite this version: Valerio Cosentino, Marcos Didonet del Fabro, Adil El Ghali.
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China
An integrated planning-simulation-architecture approach for logistics sharing management: A case study in Northern Thailand and Southern China Pree Thiengburanathum, Jesus Gonzalez-Feliu, Yacine Ouzrout,
Cobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives
Information Technology Education in the Sri Lankan School System: Challenges and Perspectives Chandima H. De Silva To cite this version: Chandima H. De Silva. Information Technology Education in the Sri
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
Application-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
Optimization results for a generalized coupon collector problem
Optimization results for a generalized coupon collector problem Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers, Bruno Sericola To cite this version: Emmanuelle Anceaume, Yann Busnel, Ernst Schulte-Geers,
Virtual plants in high school informatics L-systems
Virtual plants in high school informatics L-systems Janka Majherov To cite this version: Janka Majherov. Virtual plants in high school informatics L-systems. Michael E. Auer. Conference ICL2007, September
Good Practices as a Quality-Oriented Modeling Assistant
Good Practices as a Quality-Oriented Modeling Assistant Vincent Le Gloahec, Régis Fleurquin, Salah Sadou To cite this version: Vincent Le Gloahec, Régis Fleurquin, Salah Sadou. Good Practices as a Quality-Oriented
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
Proposal for the configuration of multi-domain network monitoring architecture
Proposal for the configuration of multi-domain network monitoring architecture Aymen Belghith, Bernard Cousin, Samer Lahoud, Siwar Ben Adj Said To cite this version: Aymen Belghith, Bernard Cousin, Samer
SELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
P2Prec: A Social-Based P2P Recommendation System
P2Prec: A Social-Based P2P Recommendation System Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger To cite this version: Fady Draidi, Esther Pacitti, Didier Parigot, Guillaume Verger. P2Prec:
An Automatic Reversible Transformation from Composite to Visitor in Java
An Automatic Reversible Transformation from Composite to Visitor in Java Akram To cite this version: Akram. An Automatic Reversible Transformation from Composite to Visitor in Java. CIEL 2012, P. Collet,
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development
ControVol: A Framework for Controlled Schema Evolution in NoSQL Application Development Stefanie Scherzinger, Thomas Cerqueus, Eduardo Cunha de Almeida To cite this version: Stefanie Scherzinger, Thomas
DEM modeling of penetration test in static and dynamic conditions
DEM modeling of penetration test in static and dynamic conditions Quoc Anh Tran, Bastien Chevalier, Pierre Breul To cite this version: Quoc Anh Tran, Bastien Chevalier, Pierre Breul. DEM modeling of penetration
Towards Collaborative Learning via Shared Artefacts over the Grid
Towards Collaborative Learning via Shared Artefacts over the Grid Cornelia Boldyreff, Phyo Kyaw, Janet Lavery, David Nutter, Stephen Rank To cite this version: Cornelia Boldyreff, Phyo Kyaw, Janet Lavery,
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Florent Berthelot, Fabienne Nouvel, Dominique Houzet To cite this version: Florent Berthelot,
Business intelligence systems and user s parameters: an application to a documents database
Business intelligence systems and user s parameters: an application to a documents database Babajide Afolabi, Odile Thiery To cite this version: Babajide Afolabi, Odile Thiery. Business intelligence systems
Advantages and disadvantages of e-learning at the technical university
Advantages and disadvantages of e-learning at the technical university Olga Sheypak, Galina Artyushina, Anna Artyushina To cite this version: Olga Sheypak, Galina Artyushina, Anna Artyushina. Advantages
ISO9001 Certification in UK Organisations A comparative study of motivations and impacts.
ISO9001 Certification in UK Organisations A comparative study of motivations and impacts. Scott McCrosson, Michele Cano, Eileen O Neill, Abdessamad Kobi To cite this version: Scott McCrosson, Michele Cano,
Heterogeneous PLC-RF networking for LLNs
Heterogeneous PLC-RF networking for LLNs Cedric Chauvenet, Bernard Tourancheau To cite this version: Cedric Chauvenet, Bernard Tourancheau. Heterogeneous PLC-RF networking for LLNs. CFIP 2011 - Colloque
Cracks detection by a moving photothermal probe
Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model
What Development for Bioenergy in Asia: A Long-term Analysis of the Effects of Policy Instruments using TIAM-FR model Seungwoo Kang, Sandrine Selosse, Nadia Maïzi To cite this version: Seungwoo Kang, Sandrine
Hinky: Defending Against Text-based Message Spam on Smartphones
Hinky: Defending Against Text-based Message Spam on Smartphones Abdelkader Lahmadi, Laurent Delosière, Olivier Festor To cite this version: Abdelkader Lahmadi, Laurent Delosière, Olivier Festor. Hinky:
Adaptive Fault Tolerance in Real Time Cloud Computing
Adaptive Fault Tolerance in Real Time Cloud Computing Sheheryar Malik, Fabrice Huet To cite this version: Sheheryar Malik, Fabrice Huet. Adaptive Fault Tolerance in Real Time Cloud Computing. 2011 IEEE
Contribution of Multiresolution Description for Archive Document Structure Recognition
Contribution of Multiresolution Description for Archive Document Structure Recognition Aurélie Lemaitre, Jean Camillerapp, Bertrand Coüasnon To cite this version: Aurélie Lemaitre, Jean Camillerapp, Bertrand
Running an HCI Experiment in Multiple Parallel Universes
Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.
Florin Paun. To cite this version: HAL Id: halshs-00628978 https://halshs.archives-ouvertes.fr/halshs-00628978
Demand Readiness Level (DRL), a new tool to hybridize Market Pull and Technology Push approaches. Introspective analysis of the new trends in Technology Transfer practices. Florin Paun To cite this version:
Novel Client Booking System in KLCC Twin Tower Bridge
Novel Client Booking System in KLCC Twin Tower Bridge Hossein Ameri Mahabadi, Reza Ameri To cite this version: Hossein Ameri Mahabadi, Reza Ameri. Novel Client Booking System in KLCC Twin Tower Bridge.
Improved Method for Parallel AES-GCM Cores Using FPGAs
Improved Method for Parallel -GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez.
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas
A modeling approach for locating logistics platforms for fast parcels delivery in urban areas Olivier Guyon, Nabil Absi, Dominique Feillet, Thierry Garaix To cite this version: Olivier Guyon, Nabil Absi,
The truck scheduling problem at cross-docking terminals
The truck scheduling problem at cross-docking terminals Lotte Berghman,, Roel Leus, Pierre Lopez To cite this version: Lotte Berghman,, Roel Leus, Pierre Lopez. The truck scheduling problem at cross-docking
Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA
Identifying Objective True/False from Subjective Yes/No Semantic based on OWA and CWA Duan Yucong, Christophe Cruz, Christophe Nicolle To cite this version: Duan Yucong, Christophe Cruz, Christophe Nicolle.
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling
Surgical Tools Recognition and Pupil Segmentation for Cataract Surgical Process Modeling David Bouget, Florent Lalys, Pierre Jannin To cite this version: David Bouget, Florent Lalys, Pierre Jannin. Surgical
Conceptual Workflow for Complex Data Integration using AXML
Conceptual Workflow for Complex Data Integration using AXML Rashed Salem, Omar Boussaid, Jérôme Darmont To cite this version: Rashed Salem, Omar Boussaid, Jérôme Darmont. Conceptual Workflow for Complex
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object
Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France
Design and architecture of an online system for Vocational Education and Training
Design and architecture of an online system for Vocational Education and Training Christos Bouras, Eri Giannaka, Thrasyvoulos Tsiatsos To cite this version: Christos Bouras, Eri Giannaka, Thrasyvoulos
Proactive and reactive collaboration schemes for multi-domain networks monitoring
Proactive and reactive collaboration schemes for multi-domain networks monitoring Aymen Belghith, Siwar Ben Had Said, Bernard Cousin, Samer Lahoud To cite this version: Aymen Belghith, Siwar Ben Had Said,
Multilateral Privacy in Clouds: Requirements for Use in Industry
Multilateral Privacy in Clouds: Requirements for Use in Industry Ina Schiering, Markus Hansen To cite this version: Ina Schiering, Markus Hansen. Multilateral Privacy in Clouds: Requirements for Use in
Publishing Linked Data Requires More than Just Using a Tool
Publishing Linked Data Requires More than Just Using a Tool G. Atemezing 1, F. Gandon 2, G. Kepeklian 3, F. Scharffe 4, R. Troncy 1, B. Vatant 5, S. Villata 2 1 EURECOM, 2 Inria, 3 Atos Origin, 4 LIRMM,
Distributed network topology reconstruction in presence of anonymous nodes
Distributed network topology reconstruction in presence of anonymous nodes Thi-Minh Dung Tran, Alain Y Kibangou To cite this version: Thi-Minh Dung Tran, Alain Y Kibangou Distributed network topology reconstruction
Understanding Big Data Spectral Clustering
Understanding Big Data Spectral Clustering Romain Couillet, Florent Benaych-Georges To cite this version: Romain Couillet, Florent Benaych-Georges Understanding Big Data Spectral Clustering 205 IEEE 6th
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs
IntroClassJava: A Benchmark of 297 Small and Buggy Java Programs Thomas Durieux, Martin Monperrus To cite this version: Thomas Durieux, Martin Monperrus. IntroClassJava: A Benchmark of 297 Small and Buggy
Semantic Interoperability
Ivan Herman Semantic Interoperability Olle Olsson Swedish W3C Office Swedish Institute of Computer Science (SICS) Stockholm Apr 27 2011 (2) Background Stockholm Apr 27, 2011 (2) Trends: from
Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation
Backup Path Classification Based on Failure Risks for Efficient Backup Path Computation Mohand Yazid Saidi, Bernard Cousin, Jean-Louis Le Roux To cite this version: Mohand Yazid Saidi, Bernard Cousin,
Distance education engineering
Distance education engineering Olivier Marty To cite this version: Olivier Marty. Distance education engineering. Working paper. 2012. HAL Id: halshs-00776581 https://halshs.archives-ouvertes.fr/halshs-00776581
Using XACML Policies as OAuth Scope
Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe
How To Design A Distributed Content Management Framework For Digital Museum Exhibitions
Distributed Content Management Framework for Digital Museum Exhibitions Samuel Cruz-Lara, Bai-Hsuen Chen, Jen-Shin Hong To cite this version: Samuel Cruz-Lara, Bai-Hsuen Chen, Jen-Shin Hong. Distributed
Crowdsourcing and digitization
Crowdsourcing and digitization Mathieu Andro To cite this version: Mathieu Andro. Crowdsourcing and digitization. The Ebooks on Demand Conference 2014 (Innsbruck University, April 11th 2014), Apr 2014,
