SlideShare a Scribd company logo
1 of 47
Download to read offline
CrowdShare
Secure Resource Sharing in Mobile Crowds
                                     Stanislaus Stelle
                                 CASED / TU Darmstadt
                            8th of March 2013 on Moosecon
                                    Joined work with
Alexandra Dmitrienko | Ahmad-Reza Sadeghi | Elena Reshetova | Thomas Schneider | N. Asokan




                                                                                         1
Motivation




             2
Motivation
             Resource Sharing




                         3
Motivation
              Resource Sharing
             Collaborative work




                           4
Motivation
              Resource Sharing
             Collaborative work
               Social Networks




                           5
Motivation
              Resource Sharing
             Collaborative work
               Social Networks
                  Mobile




                             6
Depends on
  Carrier
             7
4.6 billions without
      Internet




                       8
4.6 billions without
      Internet




                Focus on Internet
                   Availability


                              9
What can we


do about it

              10
Existing Technology: Tethering




                       Participant




                                     Participant




        Access Point




                                                   11
Existing Technology: Tethering

                                                   Range



                       Participant




                                     Participant




        Access Point




                                                       12
Existing Technology: Tethering

                                                             Range
                                                             Password
                                                             Distribution
   Password                  Participant




                                           Participant




              Access Point

                                                  Password


                                                                   13
Solution: Multihop Resource
          Sharing             14
How should
this work?


        15
Mesh Network Routing: BATMAN
                               16
What about
security?


        17
Link Security
Link Security   Access Control
Anonymity


Link Security   Access Control
                                 20
Liability

                Anonymity


Link Security   Access Control
                                        21
Implementation
        for Android

Link Security – SSL/VPN
Anonymity – Registration with Certs.
Liability – Signed Resource Requests
Access Control – FoF Service
And what
about
liability?

             23
Liability




                                             Internet



Wants to tether    Has Internet Connection
                                                  24
Liability




            25
Liability




            26
Liability




            27
Bound to phone number   Liability
                           Destination IP, Protocol, Port, Timestamp




                                                                28
Liability




            29
Liability




            30
Liability




            31
Liability




            32
Liability




            33
Liability




            34
And what
about
access
control?

           35
Friend of Friend Service



  Simple alternative

      Fancy alternative
                       36
Simple alternative


 register




               37
Simple alternative
       sync




               38
Simple alternative


 Transmit
 Whitelists




               39
Fancy alternative
              40
Challenges
   WiFi and 3G at the same time
     WiFi in Ad-Hoc mode
  Dynamic Access Control
WiFi and 3G at the same time

     Android prohibits both to be activated
insmod /system/lib/modules/bcm4329
firmware_path=/system/vendor/firmware/fw_bcm4329.bin
WiFi in Ad-Hoc mode

     No System option in Android

iwconfig eth0 channel 11 essid Mesh mode ad-hoc
ifconfig eth0 10.0.0.1 netmask 255.0.0.0 up
Dynamic Access Control


  Friend of Friend Service
               Liability Feature
Conclusion
1)   Design of CrowdShare service for secure resource sharing

     a. Allows arbitrary people to establish mesh and share resources

     b. Enables users to decide what and with whom to share

     c. Ensures anonymity, liability, confidentiality, authenticity

2)   Implementation for Internet sharing on Android devices

     a. Extends Serval

     b. Enables internet sharing

     c. Brings in a security layer

     d. Addresses a number of technical challenges
T ha n
          k y ou

Ques
     ti   ons?
Stanislaus Stelle
    Freelancer

stas.stelle@gmail.com

More Related Content

What's hot

A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingCSCJournals
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Infomanjjb
 
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...I3E Technologies
 

What's hot (6)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
575 579
575 579575 579
575 579
 
A Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio WatermarkingA Havoc Proof for Secure and Robust Audio Watermarking
A Havoc Proof for Secure and Robust Audio Watermarking
 
Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012Cit101 social aspects_and_issues_of_the_internet spring 2012
Cit101 social aspects_and_issues_of_the_internet spring 2012
 
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...
AUTHENTICATION HANDOVER AND PRIVACY PROTECTION IN 5G HETNETS USING SOFTWARE-D...
 
Digitalwatermarking
DigitalwatermarkingDigitalwatermarking
Digitalwatermarking
 

Similar to Crowdshare, Secure Resource Sharing in Mobile Crowds

การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรSoftware Park Thailand
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vidsantosomar
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26chefhja
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudreshmaroberts
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloudreshmaroberts
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceUlf Mattsson
 
ePractice workshop on Open Source Software, 7 April 2011 - Flavia Marzano
 ePractice workshop on Open Source Software, 7 April 2011 -  Flavia Marzano ePractice workshop on Open Source Software, 7 April 2011 -  Flavia Marzano
ePractice workshop on Open Source Software, 7 April 2011 - Flavia MarzanoePractice.eu
 
CIAO: Cloud, Interoperability, Accessibility, Openness
CIAO: Cloud, Interoperability, Accessibility, Openness CIAO: Cloud, Interoperability, Accessibility, Openness
CIAO: Cloud, Interoperability, Accessibility, Openness Flavia Marzano
 
Android Hacking
Android HackingAndroid Hacking
Android Hackingantitree
 
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...South Tyrol Free Software Conference
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mefRafael Junquera
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloudsallysogeti
 
Alleantia LeWeb Paris 2012 Startup Comp preliminary
Alleantia LeWeb Paris 2012 Startup Comp preliminaryAlleantia LeWeb Paris 2012 Startup Comp preliminary
Alleantia LeWeb Paris 2012 Startup Comp preliminaryAntonio Conati Barbaro
 
IoTWorld 2016 OSS Keynote Param Singh, Ian Skerrett
IoTWorld 2016 OSS Keynote Param Singh, Ian SkerrettIoTWorld 2016 OSS Keynote Param Singh, Ian Skerrett
IoTWorld 2016 OSS Keynote Param Singh, Ian SkerrettParam Singh
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessSoftware Park Thailand
 
SURFconext, a New Collaboration Paradigm
SURFconext, a New Collaboration ParadigmSURFconext, a New Collaboration Paradigm
SURFconext, a New Collaboration ParadigmSURFconext
 
Sogeti Implementation Scenarios UC 2010
Sogeti Implementation Scenarios UC 2010Sogeti Implementation Scenarios UC 2010
Sogeti Implementation Scenarios UC 2010Thomas Wesseling
 
Cloud Computing & Mobile Applications: Opportunity for Thai Developers
 Cloud Computing & Mobile Applications: Opportunity for Thai Developers Cloud Computing & Mobile Applications: Opportunity for Thai Developers
Cloud Computing & Mobile Applications: Opportunity for Thai DevelopersSoftware Park Thailand
 
Decentralized Consensus and the Death of the Server
Decentralized Consensus and the Death of the ServerDecentralized Consensus and the Death of the Server
Decentralized Consensus and the Death of the ServerGordon Hall
 

Similar to Crowdshare, Secure Resource Sharing in Mobile Crowds (20)

การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กรการสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
การสร้างเกราะป้องกันภัยคุกคาม ต่อข้อมูลความเป็นส่วนบุคคลในองค์กร
 
Triangle bdpa wo vid
Triangle bdpa wo vidTriangle bdpa wo vid
Triangle bdpa wo vid
 
Draft Framework sep 26
Draft Framework sep 26Draft Framework sep 26
Draft Framework sep 26
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
When Where Why Cloud
When Where Why CloudWhen Where Why Cloud
When Where Why Cloud
 
Tokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and ComplianceTokenization on the Node - Data Protection for Security and Compliance
Tokenization on the Node - Data Protection for Security and Compliance
 
ePractice workshop on Open Source Software, 7 April 2011 - Flavia Marzano
 ePractice workshop on Open Source Software, 7 April 2011 -  Flavia Marzano ePractice workshop on Open Source Software, 7 April 2011 -  Flavia Marzano
ePractice workshop on Open Source Software, 7 April 2011 - Flavia Marzano
 
CIAO: Cloud, Interoperability, Accessibility, Openness
CIAO: Cloud, Interoperability, Accessibility, Openness CIAO: Cloud, Interoperability, Accessibility, Openness
CIAO: Cloud, Interoperability, Accessibility, Openness
 
Android Hacking
Android HackingAndroid Hacking
Android Hacking
 
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
SFScon15 - Charalampos Doukas: "Decentralising the IoT through adoptive Gatew...
 
Telesemana ce nominum:mef
Telesemana ce nominum:mefTelesemana ce nominum:mef
Telesemana ce nominum:mef
 
When where why cloud
When where why cloudWhen where why cloud
When where why cloud
 
Alleantia LeWeb Paris 2012 Startup Comp preliminary
Alleantia LeWeb Paris 2012 Startup Comp preliminaryAlleantia LeWeb Paris 2012 Startup Comp preliminary
Alleantia LeWeb Paris 2012 Startup Comp preliminary
 
IoTWorld 2016 OSS Keynote Param Singh, Ian Skerrett
IoTWorld 2016 OSS Keynote Param Singh, Ian SkerrettIoTWorld 2016 OSS Keynote Param Singh, Ian Skerrett
IoTWorld 2016 OSS Keynote Param Singh, Ian Skerrett
 
Mobile Apps Security
Mobile Apps SecurityMobile Apps Security
Mobile Apps Security
 
Public/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & AwarenessPublic/Private Cloud Securtiy Trends & Awareness
Public/Private Cloud Securtiy Trends & Awareness
 
SURFconext, a New Collaboration Paradigm
SURFconext, a New Collaboration ParadigmSURFconext, a New Collaboration Paradigm
SURFconext, a New Collaboration Paradigm
 
Sogeti Implementation Scenarios UC 2010
Sogeti Implementation Scenarios UC 2010Sogeti Implementation Scenarios UC 2010
Sogeti Implementation Scenarios UC 2010
 
Cloud Computing & Mobile Applications: Opportunity for Thai Developers
 Cloud Computing & Mobile Applications: Opportunity for Thai Developers Cloud Computing & Mobile Applications: Opportunity for Thai Developers
Cloud Computing & Mobile Applications: Opportunity for Thai Developers
 
Decentralized Consensus and the Death of the Server
Decentralized Consensus and the Death of the ServerDecentralized Consensus and the Death of the Server
Decentralized Consensus and the Death of the Server
 

More from Heinrich Seeger

Dennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screenDennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screenHeinrich Seeger
 
Hasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsizeHasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsizeHeinrich Seeger
 
Moosecon rcs for developers
Moosecon   rcs for developersMoosecon   rcs for developers
Moosecon rcs for developersHeinrich Seeger
 
Mobile apps on the big screen
Mobile apps on the big screenMobile apps on the big screen
Mobile apps on the big screenHeinrich Seeger
 
Push notification generaltalk
Push notification generaltalkPush notification generaltalk
Push notification generaltalkHeinrich Seeger
 
Backendasaservice apiomat
Backendasaservice apiomatBackendasaservice apiomat
Backendasaservice apiomatHeinrich Seeger
 
Push notification technicaltalk
Push notification technicaltalkPush notification technicaltalk
Push notification technicaltalkHeinrich Seeger
 
Moosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimizedMoosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimizedHeinrich Seeger
 
Mooscon 2013 cebit - google integration in android apps (1)
Mooscon 2013   cebit - google integration in android apps (1)Mooscon 2013   cebit - google integration in android apps (1)
Mooscon 2013 cebit - google integration in android apps (1)Heinrich Seeger
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it finalHeinrich Seeger
 

More from Heinrich Seeger (11)

Dennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screenDennis hoppe droidcon_2014_slide_deck_screen
Dennis hoppe droidcon_2014_slide_deck_screen
 
Hasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsizeHasan hosgel moosecon_2013_customers_choice fullsize
Hasan hosgel moosecon_2013_customers_choice fullsize
 
Moosecon rcs for developers
Moosecon   rcs for developersMoosecon   rcs for developers
Moosecon rcs for developers
 
Mobile apps on the big screen
Mobile apps on the big screenMobile apps on the big screen
Mobile apps on the big screen
 
Push notification generaltalk
Push notification generaltalkPush notification generaltalk
Push notification generaltalk
 
Backendasaservice apiomat
Backendasaservice apiomatBackendasaservice apiomat
Backendasaservice apiomat
 
Paypal
PaypalPaypal
Paypal
 
Push notification technicaltalk
Push notification technicaltalkPush notification technicaltalk
Push notification technicaltalk
 
Moosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimizedMoosecon native apps_blackberry_10-optimized
Moosecon native apps_blackberry_10-optimized
 
Mooscon 2013 cebit - google integration in android apps (1)
Mooscon 2013   cebit - google integration in android apps (1)Mooscon 2013   cebit - google integration in android apps (1)
Mooscon 2013 cebit - google integration in android apps (1)
 
Dev mobile apps ent it final
Dev mobile apps ent   it finalDev mobile apps ent   it final
Dev mobile apps ent it final
 

Recently uploaded

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 

Recently uploaded (20)

Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 

Crowdshare, Secure Resource Sharing in Mobile Crowds