Extended Identity for Social Networks
|
|
- Phebe Freeman
- 6 years ago
- Views:
Transcription
1 Extended Identity for Social Networks Antonio Tapiador, Antonio Fumero, and Joaquín Salvachúa Universidad Politécnica de Madrid, ETSI Telecomunicación, Avenida Complutense 30, Madrid, Spain Abstract. Nowadays we are experiencing the consolidation of social networks (SN). Although there are trends trying to integrate SN platforms. they remain as data silos between each other. Information can't be exchanged between them. In some cases, it would be desirable to connect this scattered information, in order to build a distributed identity. This contribution proposes an architecture for distributed social networking. Based on distributed user-centric identity, our proposal extends it by attaching user information. It also bridges the gap between distributed identity and distributed publishing capabilities. Keywords: WWW, social networks, social software, digital identity, architecture. 1 Introduction Social networks (SN) is one of the key words when we talk about the Web 2.0 realm. We are experiencing nowadays the consolidation of the SN platforms. The recent launching of the Facebook platform has officially opened up the opportunity for issuing the next wave of value added applications for the next generation SN platforms. When we talk about SN in general terms, we are considering a wide scope of web services ranging basically between content and contact oriented social networks, that could be understood as wide and narrow sense social networks. The former are platforms which main goal is content publication, and social relations are a side effect of the interactions. The last are specialized on contacts creation and management, and so they are social networks in a narrow sense. The trend seems to have the contact oriented platforms integrating content sharing services, being Facebook again the best example. Meanwhile we still have in place a lot of independent, isolated content sharing services (e.g. Flickr, blip.tv, Youtube, Slideshare) and contact management centered social networks (e.g. Xing, LinkedIn) we'll be using for a while. The social networking services scenario is living a consolidation stage in terms of platforms (e.g. Xing A.G. has acquired the two major professional networks in Spain) and, at the same time, with the announcement of the Open Social initiative from Google, all the actors in such a scenario are positioning themselves for starting the race for that value added services. At this time, we have the Web plenty of a wide offer of social network services. Users develop their personal or professional activities in different platforms. A user J.G. Breslin et al. (Eds.): BlogTalk 2008/2009, LNCS 6045, pp , Springer-Verlag Berlin Heidelberg 2010
2 Extended Identity for Social Networks 163 may use a blogging platform to express her thoughts, a photo platform to publish her images, and a social network platform to be in contact with her friends. But all these platforms ignore the activity the same user is developing in the rest of web sites. This is sometimes desirable for privacy reasons, but in other multiple cases interoperability is an added value. Things would be easier if images show available in the blogging platform to be integrated within posts, and last posts appear in the social network user's profile. This contribution describes an architecture for distributed SN that supports this interoperability. It proposes a distributed model for contacts and content integration. It's is build around distributed user-centric identity frameworks, such as OpenID. 2 Distributed Identity Such 'new age' services will be depending on the basic functionalities we will be delivering from our open platforms. One of the key functionalities of such platforms is the identity. We are still using as de-facto standard the ancient user/pass combination for identifying ourselves on them. As we have a lot of different services appearing on the Web 2.0 explosion, we have to manage not only a lot of different passwords for a variety of services, but a growing number of different profiles in a series of distributed platforms all around the world. This situation represents a fragmentation of user activity along all the SNs. There isn't a coherence between different user's profiles created in every SN. Furthermore, there is no way to combine digital contents created on every platform. Current scenario can be desirable for privacy reasons. Sometimes we don't want our activities traced and bound between every place we log in. But other times, Fig. 1. Digital identity is distributed among SN platforms
3 164 A. Tapiador, A. Fumero, and J. Salvachúa specially when we want to build a coherent identity and reputation, such interoperability would make things easier. In these cases, from the user point-of-view, it will be desirable to have one single profile that could be validated against any service she would be accessing. The decentralized, user-centric, soft identity schemes are a way of implementing such a requirement. The most popular of these schemes is OpenID [1]. It's being implemented within the main development communities of the Web 2.0, e.g. Wordpress or Blogger from blogging platforms segment. Some security problems [2] have been identified, so a different kind of decentralized, user-centric identity framework should be used in cases where the security requirements are harder. 3 Architecture for Extended Identity The idea behind our proposal is the qualitative leap that entails using a dereferenceable IDs, like OpenID. Until now, using a new SN platform implies providing a login and a password. In most cases, an address is also required. The address will be verified by the web site, which sends an including a link that will confirm the validity of the address. If we analyze the information the SN platform has about us at this point, it is limited to some credentials to authenticate in the web site, and an address to contact with the user. On the other hand, we have authentication frameworks like OpenID. In these frameworks, we provide the SN platform with a dereferenceable ID, that is, an URI representing a resource that can be located and fetched. If the SN platform can dereference the ID, then it will be able to obtain extended information from it. Upon an OpenID URI we are able to get an HTML document, which can contain a lot of information about the user. We can use this ID for registering ourselves in a whole bunch of web services. These web services could include blogging, photo, slide, video sharing services, and narrow sense social networking services. Those service obtain more information about usdereferencing the ID, and discovering information attached to it. We also incorporate information back from web services to the ID. In such a way, we are able to connect information to sites. We will, for instance, allow our blog to know where our photos are (or some of them) or our friends knowing where are our videos are. 3.1 Architecture Components Our proposed architecture is client-server solution, and it is composed by three elements: Client Agents, Identity Servers and Resources Servers. Client Agent. A client agent (CA) is any application environment in a local machine or device controlled by a user. Examples of CA are mobile applications and browsers running in a PC. Network connection is assumed. The environment where the CA is running can provide it with API facilities such as authentication, resources fetching or content publishing. Identity Server. An identity server (IS) provides users with user-centric, decentralized IDs belonging to a given identity framework. Users authenticate with their IS and then have a mechanism for identifying themselves in the rest of SN platforms.
4 Extended Identity for Social Networks 165 It is an "OpenID Provider" in the OpenID world, with extended capabilities. It also supports mechanisms for allowing other parties to access private resources, using protocols like OAuth [3]. The IS acts as a user proxy. It stores the main, authoritative user profile. This profile is composed by links to user resources (such as presence, geo-localization, personal data) and collections (e.g. contacts lists, blogs, albums, podcasts). It also may provide information to edit these resources and post new resources to collections. Fig. 2. Example of the described architecture, including a client agent, a identity server and two resources servers Profile information is controlled by access control lists. Users control granting or restricting access to their resources and collections stored in the IS. The IS should provide mechanisms to manage different profile data sets easily. Users typically want to show different kinds of profile to different SNs. We want to provide the minimum required information to some SNs, but detailed information to other trusted SNs. This is also the case for other IDs apart from ours. Other users are expected to query IS to obtain more information about somebody when they discover her ID and want to know more about that person. The IDs should be, therefore, dereferenceable URIs. CAs obtain the main or favorite editable resources and collections. When the user logs into her IS using the CA, she obtains not only authentication capabilities, but also publish information usable by the CA. This information facilitates the CA to write blog entries, post photos or videos, even in other SN platforms. These are the resources servers.
5 166 A. Tapiador, A. Fumero, and J. Salvachúa Resources server. A resources server (RS) is any web service providing resources management. Examples of RS are content oriented web services (e.g. blogs, podcasts, social bookmarking), but also contact oriented ones. We can also think contacts as resources. Any SN platform can be a RS if it allows users to sign up and posting resources. RS supports authentication using a distributed identity framework. It is a "Relaying Party" in the OpenID world. They relay authentication in ISs. A user sings up into a RS using the identity framework provided by her IS. At this step, she selects which kind of profile she will show to this new RS. Then the RS obtains profile information from the user by querying the IS. RS publish resource collections owned by users, like IS may do. CAs obtain from each RS a complete list of user information generated from the user in this specific RS. Users can bookmark this information in their IS, controlling who can access them. This way, they build their authoritative and main profile, which resides in her IS. The user also controls in the IS which information (e.g. collections and resources) show to other RSs. In this way, RSs can discover and mashup resources and collections from their users. Access to RS resources is controlled by the the RS itself. There may be resources announced at the IS but not accessible at the RS and vice-versa. Synchronization between IS ACLs and RS ACLs should be specified. 4 Information Flows The main information attached to a user of this architecture is composed by his ID, along with the resources and collections associated with it. The ID is entered by the user when logging in the RS, which discovers the IS location, as we explained before. This procedure is described in the specification of the OpenID protocol [1]. Later, there may be exchanges of information between the IS and the RSs, which have two ways, from the RS point of view. 4.1 Pull The RS obtains more information about the ID asking the IS. This allows the SN platforms to know more about the user, finding out the latest entries in her blog or her contacts network, for example. The following technologies currently support this information exchanges. OpenID Attribute Exchange. OpenID Attribute Exchange [4] is an OpenID protocol extension that supports the exchange of key-value pairs between the Relaying Party (the RS in our architecture) and the Identity Provider (the IS). This technique is limited by the format of the attributes. HTML. OpenID identifiers are typically HTTP URLs. The RS can dereference the URL and get the HTML document. This document provides information about the ID. Two different formats are available: 1. Microformats [5] are semi-structured information embedded in the HTML markup. Currently, there are formats defined for personal cards (hcard), events (hcalendar) and tags (rel-tag). Other object types are in the definition process.
6 Extended Identity for Social Networks HEAD links: the HTML <head> section provides support for <link> tags. These tags are already used for providing extended information about the HTML document, e.g. blog suscriptions in RSS or Atom format. Other data formats. The HTTP protocol supports a mechanism for requesting documents in a specific format. This is achieved including the Content-Type header in the request. This mechanism, along with the former of HEAD links, allow us to obtain the representation of the ID in different formats. One example are Atom feeds [6], a format used for content syndication. Other example is RDF (Resource Description Framework) and their schemas (RDFs, OWL), the base of the Semantic Web. FOAF [7] is a RDF based vocabulary used to describe agents (Users, Groups, Organizations) and their attributes. The experimental property foaf:openid supports the association of the user profile information with her ID. SIOC (Semantic Interlinked Online Communities) [8] provides a vocabulary for describing resources and resource collections. 4.2 Push The RS publishes information about the user in her IS. This case is interesting, for example, so the IS gathers the activity the user generates in the SN she participates. OpenID Attribute Exchange. The OpenID extension works in both ways. It can also be used by RSs to store key-value pairs in the IS. Atom Publishing Protocol. AtomPub [9] is a protocol designed by the IETF for publishing and editing web resources. One of the documents defined by the specification are Service documents. Service documents describe available Collections grouped in Workspaces. Collections are sets of resources. The Service document describes what kind of resources can be posted to a Collection. AtomPub can be extended, so Collections could also describe which kind of resources contains, for a better integration with CA publishing and management capabilities of the resources. 5 Validation OpenSocial [10] is one of the last technologies emerging in social software. OpenSocial is a public API launched by Google in late It provides management support on three kinds of resources attached to user's personal information; contacts, activities in SN platforms and persistent data support. OpenSocial proposal fits smoothly in our architecture model. In OpenSocial, user's contacts and activities are exported using Atom feeds. Activities publishing uses the Atom protocol. Finally, persistent data support shares the same principles with OpenID Attribute Exchange extension. To achieve a practical validation of the architecture, we are working on a plugin [11] for Ruby on Rails web development framework. This plugin provides an application with an authentication framework, supporting several authentication schemes including OpenID. It also provides authorization and contents and contact generation. We plan to evaluate the technologies mentioned in the previous section that support information exchanges between IS and RS. This plugin is currently used in several
7 168 A. Tapiador, A. Fumero, and J. Salvachúa SN platforms, which include the VCC [12] a rich web content management system that gives support to conferences. 6 Conclusions This article proposes an architecture that solves the problem of fragmented user identities on SN platforms. The architecture is based in OpenID, a user-centric distributed identity framework. The IS stores the authoritative user information. The RSs use the IS to obtain the extended identity about the users, as well as publishing new information about user's activities. There are currently several technologies supporting information flows among IS and RS. In this sense, we are working on a Ruby on Rails plugin supporting several of this technologies. This plugin is used as the base of SN platforms that will validate the proposed architecture. Finally, the proposed architecture fits with the last protocols emerging in the field, such as Google's Social API. References 1. Recordon, D., Reed, D.: OpenID 2.0: a Platform for User-Centric Identity Management. In: Proceedings of the second ACM workshop on Digital identity management, pp (2006) 2. Brands, S.: The problem(s) with OpenID, 3. OAuth, An open protocol to allow secure API authentication in a simple and standard method from desktop and web applications, 4. Hart, D., Bufu, J., Hoyt, J.: OpenID Attribute Exchange 1.0 Final, 5. Khare, R.: Microformats: the next (small) thing on the semantic Web? IEEE Internet Computing 10(1), (2006) 6. Nottingham, M., Sayre, R.: The Atom Syndication Format, RFC 4287 (2005), 7. Brickley, D., Miller, L.: FOAF Vocabulary Specification (2007), 8. Semantic Interlinked Online Communities, 9. Gregorio, J., de hora, B.: The Atom Publishing Protocol. RFC 5023 (2007), OpenSocial, Rails Station Engine, Virtual Conference Center,
Porting Social Media Contributions with SIOC
Porting Social Media Contributions with SIOC Uldis Bojars, John G. Breslin, and Stefan Decker DERI, National University of Ireland, Galway, Ireland firstname.lastname@deri.org Abstract. Social media sites,
More informationOpen Federated Social Networks Oscar Rodríguez Rocha
Open Federated Social Networks Oscar Rodríguez Rocha 178691 Federated document database Documents are stored on different servers Access through browsers Any individual, company, or organization can own
More informationMapping between Digital Identity Ontologies through SISM
Mapping between Digital Identity Ontologies through SISM Matthew Rowe The OAK Group, Department of Computer Science, University of Sheffield, Regent Court, 211 Portobello Street, Sheffield S1 4DP, UK m.rowe@dcs.shef.ac.uk
More informationSocial Networks and Data Portability using Semantic Web technologies
Social Networks and Data Portability using Semantic Web technologies Uldis Bojārs1, Alexandre Passant2, John Breslin1, Stefan Decker1 1 Digital Enterprise Research Institute, National University of Ireland,
More informationGraaasp: a Web 2.0 Research Platform for Contextual Recommendation with Aggregated Data
Graaasp: a Web 2.0 Research Platform for Contextual Recommendation with Aggregated Data Evgeny Bogdanov evgeny.bogdanov@epfl.ch Sandy El Helou Sandy.elhelou@epfl.ch Denis Gillet denis.gillet@epfl.ch Christophe
More informationHTML 5 and CSS 3, Illustrated Complete. Unit M: Integrating Social Media Tools
HTML 5 and CSS 3, Illustrated Complete Unit M: Integrating Social Media Tools Objectives Understand social networking Integrate a Facebook account with a Web site Integrate a Twitter account feed Add a
More informationFunctionality, Challenges and Architecture of Social Networks
Functionality, Challenges and Architecture of Social Networks INF 5370 Outline Social Network Services Functionality Business Model Current Architecture and Scalability Challenges Conclusion 1 Social Network
More informationWeb 2.0, AJAX and RIAs
Web 2.0, AJAX and RIAs Asynchronous JavaScript and XML Rich Internet Applications Markus Angermeier November, 2005 - some of the themes of Web 2.0, with example-sites and services Web 2.0 Common usage
More informationSpringer Science+ Business, LLC
Chapter 11. Towards OpenTagging Platform using Semantic Web Technologies Hak Lae Kim DERI, National University of Ireland, Galway, Ireland John G. Breslin DERI, National University of Ireland, Galway,
More informationDECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS. November 7, 2018 WordPress Meetup Vienna Alex Kirk
DECENTRALIZED SOCIAL NETWORKING WITH WORDPRESS DECENTRALIZED? Centralized = control is with a single entity If you use Facebook, the servers are all controlled by Facebook Inc. Facebook can draw conclusions
More informationAll About Open & Sharing
All About Open & Sharing 차세대웹기술과컨버전스 Lecture 3 수업블로그 : http://itmedia.kaist.ac.kr 2008. 2. 28 한재선 (jshan0000@gmail.com) NexR 대표이사 KAIST 정보미디어경영대학원대우교수 http://www.web2hub.com Open & Sharing S2 OpenID Open
More informationTrusted Profile Identification and Validation Model
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 7, Issue 1 (May 2013), PP. 01-05 Himanshu Gupta 1, A Arokiaraj Jovith 2 1, 2 Dept.
More informationWeb Architecture Review Sheet
Erik Wilde (School of Information, UC Berkeley) INFO 190-02 (CCN 42509) Spring 2009 May 11, 2009 Available at http://dret.net/lectures/web-spring09/ Contents 1 Introduction 2 1.1 Setup.................................................
More informationA Formal Definition of RESTful Semantic Web Services. Antonio Garrote Hernández María N. Moreno García
A Formal Definition of RESTful Semantic Web Services Antonio Garrote Hernández María N. Moreno García Outline Motivation Resources and Triple Spaces Resources and Processes RESTful Semantic Resources Example
More informationSocial Media Tools. March 13, 2010 Presented by: Noble Studios, Inc.
March 13, 2010 Presented by: Noble Studios, Inc. 1 Communication Timeline 2 Familiar Social Media Sites According to Facebook, more than 1.5 million local businesses have active pages on Facebook According
More informationChatter Answers Implementation Guide
Chatter Answers Implementation Guide Salesforce, Spring 16 @salesforcedocs Last updated: April 27, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationWeb 2.0: Crowdsourcing:
Term 1 Definition 1 Web 2.0: A concept referring to the changing trends in the use of WWW technology and Web design that have led to the development of information-sharing and collaboration capabilities.
More informationChatter Answers Implementation Guide
Chatter Answers Implementation Guide Salesforce, Summer 18 @salesforcedocs Last updated: July 26, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
More informationarxiv: v1 [cs.cr] 30 May 2014
ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,
More informationLesson 2: Internet Communication
Lesson 2: Internet Communication Lesson 2 Objectives Define modern Web technologies Define social networking Define and use instant messaging and text messaging Use Windows Remote Assistance Discuss blogging
More informationAn Approach to Enhancing Workflows Provenance by Leveraging Web 2.0 to Increase Information Sharing, Collaboration and Reuse
An Approach to Enhancing Workflows Provenance by Leveraging Web 2.0 to Increase Information Sharing, Collaboration and Reuse Aleksander Slominski Department of Computer Science, Indiana University Bloomington,
More informationW3C Workshop on the Future of Social Networking, January 2009, Barcelona
1 of 6 06/01/2010 20:19 W3C Workshop on the Future of Social Networking, 15-16 January 2009, Barcelona John G. Breslin 1,2, Uldis Bojārs 1, Alexandre Passant, Sergio Fernández 3, Stefan Decker 1 1 Digital
More informationService Integration - A Web of Things Perspective W3C Workshop on Data and Services Integration
Service Integration - A Web of Things Perspective W3C Workshop on Data and Services Integration Simon Mayer Institute for Pervasive Computing ETH Zurich, Switzerland simon.mayer@inf.ethz.ch The augmentation
More informationNing Frequently Asked Questions
Ning Frequently Asked Questions Ning is a Web tool that allows anyone to create a customizable social network, allowing users to share pictures and videos, maintain blogs, communicate in chat and discussion
More informationMake your application real-time with PubSubHubbub. Brett Slatkin May 19th, 2010
Make your application real-time with PubSubHubbub Brett Slatkin May 19th, 2010 View live notes and ask questions about this session on Google Wave http://tinyurl.com/push-io2010 Me http://onebigfluke.com
More informationSindice Widgets: Lightweight embedding of Semantic Web capabilities into existing user applications.
Sindice Widgets: Lightweight embedding of Semantic Web capabilities into existing user applications. Adam Westerski, Aftab Iqbal, and Giovanni Tummarello Digital Enterprise Research Institute, NUI Galway,Ireland
More information2. Methodology. 1. Introduction. Tie-RBAC: An application of RBAC to Social Networks. 2.1 Social Network Analysis
Tie-RBAC: An application of RBAC to Social Networks Antonio Tapiador, Diego Carrera, Joaquín Salvachúa Universidad Politécnica de Madrid Abstract This paper explores the application of role-based access
More informationWeb Standards Mastering HTML5, CSS3, and XML
Web Standards Mastering HTML5, CSS3, and XML Leslie F. Sikos, Ph.D. orders-ny@springer-sbm.com www.springeronline.com rights@apress.com www.apress.com www.apress.com/bulk-sales www.apress.com Contents
More informationFrom Online Community Data to RDF
From Online Community Data to RDF Abstract Uldis Bojārs, John G. Breslin [uldis.bojars,john.breslin]@deri.org Digital Enterprise Research Institute National University of Ireland, Galway Galway, Ireland
More informationConnect-2-Everything SAML SSO (client documentation)
Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to
More informationSEO: SEARCH ENGINE OPTIMISATION
SEO: SEARCH ENGINE OPTIMISATION SEO IN 11 BASIC STEPS EXPLAINED What is all the commotion about this SEO, why is it important? I have had a professional content writer produce my content to make sure that
More informationHistory and Backgound: Internet & Web 2.0
1 History and Backgound: Internet & Web 2.0 History of the Internet and World Wide Web 2 ARPANET Implemented in late 1960 s by ARPA (Advanced Research Projects Agency of DOD) Networked computer systems
More informationWebGUI & the Semantic Web. William McKee WebGUI Users Conference 2009
WebGUI & the Semantic Web William McKee william@knowmad.com WebGUI Users Conference 2009 Goals of this Presentation To learn more about the Semantic Web To share Tim Berners-Lee's vision of the Web To
More informationTechnology Brown Bag: Web 2.0
Technology Brown Bag: Web 2.0 Schedule information Event Technology Brown Bag: Web 2.0 When Thursday, May 4, 2006 from 12:00pm to 1:30pm Where Harris 1300 Event details Details Access Contact What is Web
More informationAuthentication in the Cloud. Stefan Seelmann
Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources
More informationInformation Network I Web 3.0. Youki Kadobayashi NAIST
Information Network I Web 3.0 Youki Kadobayashi NAIST Web 3.0 Overview: Interoperability in the Web dimension (1) Interoperability of data: Metadata Data about data Assist in interacting with arbitrary
More informationGoogle indexed 3,3 billion of pages. Google s index contains 8,1 billion of websites
Access IT Training 2003 Google indexed 3,3 billion of pages http://searchenginewatch.com/3071371 2005 Google s index contains 8,1 billion of websites http://blog.searchenginewatch.com/050517-075657 Estimated
More information> Semantic Web Use Cases and Case Studies
> Semantic Web Use Cases and Case Studies Case Study: Improving Web Search using Metadata Peter Mika, Yahoo! Research, Spain November 2008 Presenting compelling search results depends critically on understanding
More informationFinding Similarity and Comparability from Merged Hetero Data of the Semantic Web by Using Graph Pattern Matching
Finding Similarity and Comparability from Merged Hetero Data of the Semantic Web by Using Graph Pattern Matching Hiroyuki Sato, Kyoji Iiduka, Takeya Mukaigaito, and Takahiko Murayama Information Sharing
More informationint.ere.st: Building a Tag Sharing Service with the SCOT Ontology
int.ere.st: Building a Tag Sharing Service with the SCOT Ontology HakLae Kim, John G. Breslin Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan
More informationWeb 3.0 Overview: Interoperability in the Web dimension (1) Web 3.0 Overview: Interoperability in the Web dimension (2) Metadata
Information Network I Web 3.0 Youki Kadobayashi NAIST Web 3.0 Overview: Interoperability in the Web dimension (1) Interoperability of data: Assist in interacting with arbitrary (including unknown) resources
More informationAUTHENTICATION AND LOOKUP FOR NETWORK SERVICES
Vol.5, No.1, pp. 81-90, 2014 doi: 10.7903/ijecs.1040 AUTHENTICATION AND LOOKUP FOR NETWORK SERVICES Daniel J. Buehrer National Chung Cheng University 168 University Rd., Min-Hsiung Township, Chiayi County,
More informationIntroduction to WebFinger
Introduction to WebFinger Paul E. Jones Copyright 2013 2013-10-21 What Is WebFinger? WebFinger is used to discover information about people or other entities on the Internet that are identified by a URI
More informationSetting up your Netvibes Dashboard Adding a Blog to your Dashboard
Cr e a t i ngali s t e ni ngda s hboa r d wi t hne t vi be s Ne t v i be s Table of Contents Introduction... 1 Setting up your Netvibes Dashboard... 2 Adding a Blog to your Dashboard... 2 Adding Twitter
More informationTechnical Overview. Version March 2018 Author: Vittorio Bertola
Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which
More informationDigital Marketing Proposal
Digital Marketing Proposal ---------------------------------------------------------------------------------------------------------------------------------------------- 1 P a g e We at Tronic Solutions
More informationA PRACTICE BUILDERS white paper. 8 Ways to Improve SEO Ranking of Your Healthcare Website
A PRACTICE BUILDERS white paper 8 Ways to Improve SEO Ranking of Your Healthcare Website More than 70 percent of patients find their healthcare providers through a search engine. This means appearing high
More informationMaking Privacy a Fundamental Component of Web Resources
Making Privacy a Fundamental Component of Web Resources Thomas Duebendorfer (Google Switzerland GmbH), Christoph Renner (Google Switzerland GmbH/ETH Zurich), Tyrone Grandison (IBM), Michael Maximilien
More informationWeb 2.0, Social Programming, and Mashups (What is in for me!) Social Community, Collaboration, Sharing
Department of Computer Science University of Cyprus, Nicosia December 6, 2007 Web 2.0, Social Programming, and Mashups (What is in for me!) Dr. Mustafa Jarrar mjarrar@cs.ucy.ac.cy HPCLab, University of
More informationSemantic Web and Web2.0. Dr Nicholas Gibbins
Semantic Web and Web2.0 Dr Nicholas Gibbins Web 2.0 is the business revolution in the computer industry caused by the move to the internet as platform, and an attempt to understand the rules for success
More informationAbstract. Table of Contents. 1. License
Your use of this Specification may be subject to other third party rights. THIS SPECIFICATION IS PROVIDED AS IS. The contributors expressly disclaim any warranties (express, implied, or otherwise), including
More informationBuilding a Person-Centric Mashup System. CommunityMashup: A Service Oriented Approach.
Building a Person-Centric Mashup System. CommunityMashup: A Service Oriented Approach. Peter Lachenmaier 1, Florian Ott 1, 1 Bundeswehr University Munich, Cooperation Systems Center Munich, Werner-Heisenberg-Weg
More informationUsing XACML for access control in Social Networks
Using XACML for access control in Social Networks Anna Carreras, Eva Rodríguez, Jaime Delgado Distributed Multimedia Applications Group (DMAG) Universitat Politècnica de Catalunya (UPC) Jordi Girona 1-3,
More informationBuilding Blocks for User Modeling with data from the Social Web
Building Blocks for User Modeling with data from the Social Web Fabian Abel 1, Nicola Henze 1, Eelco Herder 1, Geert-Jan Houben 2, Daniel Krause 1, Erwin Leonardi 2 1 L3S Research Center, Leibniz University
More informationBusiness value of Federated Login for Enterprises Enterprise SaaS vendors Consumer websites
Business value of Federated Login for Enterprises Enterprise SaaS vendors Consumer websites Eric Sachs Product Manager, Google Security & CIO organization My Identity Enterprise Space 2008 - Cloud Computing
More informationComputer Technology. Lesson 2: Internet Communication
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationComputer Technology. Scale Yourself. Lesson 2: Internet Communication. Learning Goal: Students will be able to define modern Web technologies.
Computer Technology Lesson 2: Internet Communication Learning Goal: Students will be able to define modern Web technologies. Scale Yourself 4 I can define modern Web technologies. I can teach them to others.
More informationIntroduction to Web 2.0 Data Mashups
Lecture Notes on Web Data Management Birzeit University, Palestine 2013 Introduction to Web 2.0 Data Mashups Dr. Mustafa Jarrar University of Birzeit mjarrar@birzeit.edu www.jarrar.info Jarrar 2013 1 Watch
More informationPhoto: This presentation is licensed under a Creative Commons Attribution 3.
Using Social Media to Promote Your Library s Services INFORUM, 25 th 27 th May 2010 Karen.Blakeman@rba.co.uk www.twitter.com/karenblakeman http://www.rba.co.uk/ Photo: http://www.flickr.com/photos/rbainfo/2536686370/
More informationTITLE SOCIAL MEDIA AND COLLABORATION POLICY
DATE 9/20/2010 TITLE 408.01 SOCIAL MEDIA AND COLLABORATION POLICY ORG. AGENCY Department of Communications Approved AFT As more and more citizens in our community make the shift towards, or include the
More informationOpenID: From Geek to Chic. Greg Keegstra OpenID Summit Tokyo Dec 1, 2011
OpenID: From Geek to Chic Greg Keegstra OpenID Summit Tokyo Dec 1, 2011 Why OpenID? Time for a poll Who has reused their same password when logging into a new website? Who has forgotten their password
More informationAdministering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Custom App Wrapping for ios... 4 Native App Caching: Android...4 Native App
More informationModule 1: Internet Basics for Web Development (II)
INTERNET & WEB APPLICATION DEVELOPMENT SWE 444 Fall Semester 2008-2009 (081) Module 1: Internet Basics for Web Development (II) Dr. El-Sayed El-Alfy Computer Science Department King Fahd University of
More informationEFFICIENT INTEGRATION OF SEMANTIC TECHNOLOGIES FOR PROFESSIONAL IMAGE ANNOTATION AND SEARCH
EFFICIENT INTEGRATION OF SEMANTIC TECHNOLOGIES FOR PROFESSIONAL IMAGE ANNOTATION AND SEARCH Andreas Walter FZI Forschungszentrum Informatik, Haid-und-Neu-Straße 10-14, 76131 Karlsruhe, Germany, awalter@fzi.de
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationThe Web Browser Personalization with the Client Side Triplestore. Canon Inc., W3C/MIT: Hitoshi Uchida
The Web Browser Personalization with the Client Side Triplestore Canon Inc., W3C/MIT: Hitoshi Uchida Issue #1 : Silos of Current Web Services Productive web services All done with web browsers Document,
More informationAdvanced Digital Marketing Course
Page 1 Advanced Digital Marketing Course Launch your successful career in Digital Marketing Page 2 Table of Contents 1. About Varistor. 4 2. About this Course. 5 3. Course Fee 19 4. Batches 19 5. Syllabus
More informationInternet Applications. Q. What is Internet Explorer? Explain features of Internet Explorer.
Internet Applications Q. What is Internet Explorer? Explain features of Internet Explorer. Internet explorer: Microsoft Internet Explorer is a computer program called a browser that helps you interact
More informationCloud-based Identity and Access Control for Diagnostic Imaging Systems
320 Int'l Conf. Security and Management SAM'15 Cloud-based Identity and Access Control for Diagnostic Imaging Systems Weina Ma and Kamran Sartipi Department of Electrical, Computer and Software Engineering
More informationResearch. Niche research. Market research
Research LeapFroggr.com Market research Niche research Data gathering Current state of the website vs competitors Your business info (business name, address, contact #s, etc.) Activate Analytics on site
More informationPart 3: Online Social Networks
1 Part 3: Online Social Networks Today's plan Project 2 Questions? 2 Social networking services Social communities Bebo, MySpace, Facebook, etc. Content sharing YouTube, Flickr, MSN Soapbox, etc. Corporate
More informationThe Web Browser Personalization with the Client Side Triplestore
The Web Browser Personalization with the Client Side Triplestore Hitoshi Uchida 1,2, Ralph Swick 2, and Andrei Sambra 3 1 Canon Inc., Tokyo, Japan, 2 World Wide Web Consortium, MIT CSAIL, Cambridge, MA
More informationWebsite Optimizer. Before we start building a website, it s good practice to think about the purpose, your target
Website Optimizer Before we start building a website, it s good practice to think about the purpose, your target audience, what you want to have on the website, and your expectations. For this purpose
More informationEnriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle
Enriching Lifelong User Modelling with the Social e- Networking and e-commerce Pieces of the Puzzle Demetris Kyriacou Learning Societies Lab School of Electronics and Computer Science, University of Southampton
More informationInternet Basics. Basic Terms and Concepts. Connecting to the Internet
Internet Basics In this Learning Unit, we are going to explore the fascinating and ever-changing world of the Internet. The Internet is the largest computer network in the world, connecting more than a
More informationWeaving SIOC into the Web of Linked Data
Weaving SIOC into the Web of Linked Data Uldis Bojārs uldis.bojars@deri.org Richard Cyganiak richard@cyganiak.de ABSTRACT Social media sites can act as a rich source of large amounts of data by letting
More informationManagement Intranet: Integrating Web-based Network Management Applications
Management Intranet: Integrating Web-based Network Management Applications Jim Turner Cisco Systems Inc. 125 Rio Robles San Jose, CA 95134 USA jiturner@cisco.com Swami Jayaraman Cisco Systems Inc. 125
More informationYour Auth is open! Oversharing with OpenAuth & SAML
Your Auth is open! Oversharing with OpenAuth & SAML Andrew Pollack Northern Collaborative Technologies 2013 by the individual speaker Sponsors 2013 by the individual speaker Who Am I? Andrew Pollack President
More informationTechnology in Action Complete, 13e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources
Technology in Action Complete, 13e (Evans et al.) Chapter 3 Using the Internet: Making the Most of the Web's Resources 1) The Internet is. A) an internal communication system for businesses B) a communication
More informationSOCIAL MEDIA. Charles Murphy
SOCIAL MEDIA Charles Murphy Social Media Overview 1. Introduction 2. Social Media Areas Blogging Bookmarking Deals Location-based Music Photo sharing Video 3. The Fab Four FaceBook Google+ Linked In Twitter
More informationThis is a Private Group - Content is only visible to group members.
This is a Private Group - Content is only visible to group members. Community Advisory Board Small, private, selective group of key Telligent customers creating strong connections and contributing to the
More informationDraft. An Ontology-based Representation of the Twitter REST API
An Ontology-based Representation of the Twitter REST API Konstantinos Togias School of Science and Technology Hellenic Open University Patras, Greece ktogias@eap.gr Achilles Kameas School of Science and
More informationNovell Vibe 3.4. Novell. July Quick Start. Starting Novell Vibe. Getting to Know the Novell Vibe Interface and Its Features
Novell Vibe 3.4 July 2013 Novell Quick Start When you begin to use Novell Vibe, the first thing you might want to do is set up your personal workspace and create a team workspace. This document explains
More informationErmergent Semantics in BibSonomy
Ermergent Semantics in BibSonomy Andreas Hotho Robert Jäschke Christoph Schmitz Gerd Stumme Applications of Semantic Technologies Workshop. Dresden, 2006-10-06 Agenda Introduction Folksonomies BibSonomy
More informationWeb 2.0 Tutorial. Jacek Kopecký STI Innsbruck
Web 2.0 Tutorial Jacek Kopecký STI Innsbruck SOA4All Kick-off -Madrid, 25th-27th March 2008 Web 2.0 and SOA: Overview Questions to be addressed: What is Web 2.0? What technologies does Web 2.0 comprise?
More informationCloud Computing. Contents. Vince DiNoto.
Cloud Computing Vince DiNoto Vince.dinoto@kctcs.edu Contents Microsoft Live... 2 Connecting SkyDrive from Your Desktop... 4 Live Mesh... 5 Skype... 6 UStream... 6 SlideShare... 9 Flickr... 9 Jing... 10
More informationradar-project.de White Paper RADAR White Paper - Martin Memmel
radar-project.de White Paper Contact: Dr. Martin Memmel German Research Center for Artificial Intelligence DFKI GmbH Trippstadter Straße 122 67663 Kaiserslautern, Germany fon fax mail web +49-631-20575-1210
More informationLearning and Development. UWE Staff Profiles (USP) User Guide
Learning and Development UWE Staff Profiles (USP) User Guide About this training manual This manual is yours to keep and is intended as a guide to be used during the training course and as a reference
More informationSAP Jam Communities What's New 1808 THE BEST RUN. PUBLIC Document Version: August
PUBLIC Document Version: August 2018 2018-10-26 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Release Highlights....3 1.1 Anonymous access to public communities....4
More informationCS6120: Intelligent Media Systems. User Models. How is User Model Data Obtained? 11/01/2014
CS6120: Intelligent Media Systems Dr. Derek Bridge School of Computer Science & Information Technology UCC User Models For personalization, we need user models which contain some or all of: Identification
More informationAn Annotation Tool for Semantic Documents
An Annotation Tool for Semantic Documents (System Description) Henrik Eriksson Dept. of Computer and Information Science Linköping University SE-581 83 Linköping, Sweden her@ida.liu.se Abstract. Document
More informationProgramming the Semantic Web
Programming the Semantic Web Steffen Staab, Stefan Scheglmann, Martin Leinberger, Thomas Gottron Institute for Web Science and Technologies, University of Koblenz-Landau, Germany Abstract. The Semantic
More informationNetvibes A field guide for missions, posts and IRCs
Netvibes A field guide for missions, posts and IRCs 7/2/2012 U.S. Department of State International Information Programs Office of Innovative Engagement Table of Contents Introduction... 3 Setting up your
More informationGetting Started Guide. Getting Started With Quick Blogcast. Setting up and configuring your blogcast site.
Getting Started Guide Getting Started With Quick Blogcast Setting up and configuring your blogcast site. Getting Started with Quick Blogcast Version 2.0.1 (07.01.08) Copyright 2007. All rights reserved.
More informationDistribution and Publication With Atom Web Services
Distribution and Publication With Atom Web Services Software Architect at Schematic Atlanta PHP Leader Co-author of Zend PHP 5 Certification Study Guide Chatter on #phpc The name Atom applies to a pair
More informationAn Entity Name Systems (ENS) for the [Semantic] Web
An Entity Name Systems (ENS) for the [Semantic] Web Paolo Bouquet University of Trento (Italy) Coordinator of the FP7 OKKAM IP LDOW @ WWW2008 Beijing, 22 April 2008 An ordinary day on the [Semantic] Web
More informationAmbiguity Handling in Mobile-capable Social Networks
Ambiguity Handling in Mobile-capable Social Networks Péter Ekler Department of Automation and Applied Informatics Budapest University of Technology and Economics peter.ekler@aut.bme.hu Abstract. Today
More informationAnatomy of a Semantic Virus
Anatomy of a Semantic Virus Peyman Nasirifard Digital Enterprise Research Institute National University of Ireland, Galway IDA Business Park, Lower Dangan, Galway, Ireland peyman.nasirifard@deri.org Abstract.
More informationNick Terkay CSCI 7818 Web Services 11/16/2006
Nick Terkay CSCI 7818 Web Services 11/16/2006 Ning? Start-up co-founded by Marc Andreeson, the co- founder of Netscape. October 2005 Ning is an online platform for painlessly creating web apps in a jiffy.
More informationOpen Source and Standards
Open Source and Standards Joe Gregorio Google Zaheda Bhorat Google Scope My opinions. A Poll Contribute to an open source project Contribute to a standard Both? Fair Warning Turning the table Standards
More information