Location-based Timely Cooperation over Social Private Network

被引:4
作者
Jung, Youna [1 ]
Figueiredo, Renato [1 ]
Fortes, Jose [1 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Adv Comp & Informat Syst ACIS Lab, Gainesville, FL 32611 USA
来源
2014 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM) | 2014年
关键词
location-based cooperation; online social network; cooperation framework; temporary virtual private network; provacy protection; CONTEXT;
D O I
10.4108/icst.collaboratecom.2014.257321
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The increasing use of online social networks (OSNs) in emergency situations shows us a promising future of human cooperation through OSNs. Despite this intense interest, a number of fundamental limitations still exist, such as lack of appropriate conceptual models and limitations on cooperation methods and shareable resources. To address existing limitations, we propose Whistle - a cooperation framework for OSN users which can dynamically organize an emergency community with nearby users and guarantee unrestricted cooperation and resource sharing by leveraging the Jitsi communicator and the SocialVPN. To test the feasibility and applicability of Whistle, we present an implemented prototype and demonstrate its applicability to an example use case.
引用
收藏
页码:388 / 396
页数:9
相关论文
共 17 条
[1]  
[Anonymous], 2011, ABC NEWS
[2]  
[Anonymous], 2011, Fox News
[3]   A survey on context-aware systems [J].
Baldauf, Matthias ;
Dustdar, Schahram ;
Rosenberg, Florian .
INTERNATIONAL JOURNAL OF AD HOC AND UBIQUITOUS COMPUTING, 2007, 2 (04) :263-277
[4]   A Location Model for Communicating and Processing of Context [J].
Beigl, Michael ;
Zimmer, Tobias ;
Decker, Christian .
PERSONAL AND UBIQUITOUS COMPUTING, 2002, 6 (5-6) :341-357
[5]   A survey of context modelling and reasoning techniques [J].
Bettini, Claudio ;
Brdiczka, Oliver ;
Henricksen, Karen ;
Indulska, Jadwiga ;
Nicklas, Daniela ;
Ranganathan, Anand ;
Riboni, Daniele .
PERVASIVE AND MOBILE COMPUTING, 2010, 6 (02) :161-180
[6]  
Emory Healthcare, 2011, CAN TWITT HELP SAV L
[7]  
HOHL F, 1999, 5 ANN INT C MOB COMP, P249
[8]  
Jung Y., 2013, COMPUTERS SECURITY
[9]  
Jung Y., 2012, 8 INT C COLL COMP NE, P80
[10]  
NICKLAS D, 2004, SOFTW SYST MODEL, V3, P303