<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ad-hoc File Sharing Using Linked Data Technologies</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Niko Popitsch</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bernhard Schandl</string-name>
          <email>bernhard.schandlg@univie.ac.at</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University of Vienna, Department of Distributed and Multimedia Systems</institution>
        </aff>
      </contrib-group>
      <abstract>
        <p>A large fraction of our information, both in the professional and private domains, is stored in the form of les on our personal computers. When we collaborate with co-workers or meet with friends, mechanisms for sharing les and le annotations are frequently required. However, centralized le sharing infrastructures are often not available or complicated to set up, and approaches like peer-to-peer sharing infrequently provide functionality beyond simple copying of les between machines. In this paper we present a light-weight approach for ad-hoc le sharing based on Linked Data principles. Our system exposes parts of a le system as Linked Data and allows users to interlink and annotate resources in such linked le systems. We further provide a mechanism for mounting multiple such le systems together, and for seamlessly navigating them using a common Web browser. As the exposed les and directories become Web resources, they are amenable to a large set of Semantic Web and Linked Data tools. Human and machine users may exploit such linked le systems in ad-hoc data sharing scenarios. They may further add arbitrary annotations to local and remote linked le system resources, which may also be shared among users. Finally, le system objects may be searched based on their extracted metadata and such semantic annotations.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        File sharing has become a central activity in the professional and private
domains [1{3]. The sharing of les is supported by a large number of tools and
methods, ranging from email attachments over centralized le servers to
peerto-peer sharing applications. An increasingly used method is the exchange of
data via Internet-based sharing systems that may be specialized for a certain
media type (e.g., Flickr, Youtube) or of general purpose (e.g., DropBox). Users
select one or multiple of these tools to solve a particular sharing problem based
on what is shared and with whom it is shared [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In this work we focus on a particular type of data sharing, ad-hoc sharing,
which is characterized by the lack of pre-existing sharing infrastructure. Often,
the participating users and their devices are physically close; however, this is
not a precondition. Ad-hoc sharing is rather identi ed by the need to quickly
exchange data with users or devices they do not often share data with (in the
past and the future) so that the setup of heavyweight sharing infrastructures is
unfeasible [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>Consider for example the following scenario: after a common vacation, Alice
and Bob meet with friends to talk about their common experiences and exchange
their digital photos among each other. Alice would like to give their friends a
photo presentation of her and Bob's photos. Bob would like to copy some of
Alice's photos to his machine but rst needs to select which ones. Further, Bob
would like to add information about where a particular photo was taken (e.g.,
what restaurant they had that great sh menu at). These annotations should
be accessible also to Alice and their friends, and they should be able to extend
them. Bob would further like to explicitly link related photos, e.g., he would
like to relate the photos of his daughter taken during last year's vacation to this
year's photos.</p>
      <p>Although Alice, Bob, and their friends know each other well, it is rather
unlikely that they exchange data frequently; therefore the introduction of a
heavyweight sharing infrastructure might be immoderate. Note that this scenario does
not require the actors to meet in person|everything could also be done remotely.
The scenario mentioned before could partly be solved with a centralized, online
data sharing application. This would, however, raise the following issues:
1. All involved devices would require Internet access, although local
connectivity would be su cient for most tasks.
2. The annotation tasks would be restricted to the functionality o ered by the
particular application.
3. By uploading data to an online platform, digital copies of these data are
created. Annotations would refer to these copies rather than to the original
les. When a user decides to manipulate a data item locally (e.g., applying
a photo lter to reduce the red-eye e ect), they would need to update the
data manually on the online platform so that others can access this improved
version.
4. Storing data on Web servers usually raises security and privacy issues.
5. Many existing sharing platforms handle only particular le types.</p>
      <p>
        In this paper we present an alternative method for ad-hoc sharing based on
Linked Data. We present how our lesystem, TripFS [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], can be used to expose
parts of a local le system as Linked Data, and how multiple such linked le
systems can be mounted and seamlessly navigated with a common Web browser.
As the exposed les and directories become regular Web resources, they are
amenable to a large set of Semantic Web and Linked Data tools. We further
describe how arbitrary annotations and links can be added to such resources:
resources may be linked to local and remote les exposed via TripFS, but also
to any other Web resource or Linked Data source. We describe how human and
machine users may exploit such linked le systems in ad-hoc data sharing
scenarios as the one presented above, and conclude with a discussion of advantages
and shortcomings of our approach when compared with related work from the
le sharing domain.
TripFS1 [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] is a lightweight utility that publishes parts of a local le system as
Linked Data. It bridges the gap between the distinct worlds of hierarchical le
systems and the hyperlink-based Web by
1. providing stable, de-referencable URIs for directories and les, thereby
making it possible to establish stable references to local and remote le system
objects;
2. extracting metadata from les, thereby allowing to nd and access les based
on their contents instead of their location;
3. linking les to external Linked Data sources based on extracted metadata,
thereby opening le systems for global, enterprise-wide, or personal
information integration; and
4. serving le and directory descriptions as Linked Data (through de-referencable
URIs, a SPARQL endpoint, and RDF representations), thereby providing
access to le systems using standardized (Semantic) Web technologies.
      </p>
      <p>
        TripFS combines several third-party components (including the Jena
Semantic Web Framework2, Aperture3 for metadata extraction, the Jetty HTTP
Server4, and the DSNotify monitoring framework [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]) and can be deployed as
a background process on any Java-enabled computer. It can be con gured to
use any RDF storage backend for storing annotations and extracted metadata.
Upon start, it crawls the con gured le system subtrees and builds an RDF
representation where directories and les are represented as RDF resources. TripFS
extracts metadata from le system objects and links these objects with each
other, as well as with external data sources. After crawling, DSNotify is used
to monitor changes in the le system, which are in consequence re ected in the
1 http://purl.org/tripfs
2 http://openjena.org
3 http://aperture.sourceforge.net
4 http://jetty.codehaus.org
RDF model. New or changed les are re-analyzed, so that the RDF model
remains in sync with the local le system. Figure 1 shows an RDF description
of a le, as served by TripFS. In addition to the RDF representation, TripFS
provides a convenient HTML-based interface that allows the user to navigate
through the le hierarchy. All main components of TripFS are exible and
extensible; in particular, extractors (e.g., for new le types) and linker components
(for arbitrary external data sources) can be added easily.
3
      </p>
    </sec>
    <sec id="sec-2">
      <title>Linked Data-style Ad-hoc File Sharing</title>
      <p>In ad-hoc le sharing, users that do not exchange data regularly (in the past and
in the future) have the short-term need to exchange le-based contents between
multiple machines. As discussed, they cannot resort to permanent infrastructure
(like le servers, hosting providers, or Web applications) as it is either
unfeasible to set-up such an infrastructure or due to infrastructural constraints (e.g.,
limited connectivity, rewalls, etc.). Often, ad-hoc le sharing takes place in
situations where users are co-located and have some but limited shared network
infrastructure (e.g., a Wi-Fi network). Ad-hoc le sharing is of relevance both in
professional and in private contexts: for instance, during a business meeting one
may want to share a certain document or spreadsheet with all participants. In
the private domain, one may want to exchange photos from the recent vacation
with friends during a relaxed dinner.</p>
      <p>
        Analyzing the related works from the le sharing domain mentioned in this
paper (in particular, [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] and [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]) and combining it with our own considerations
led us to the following list of requirements for ad-hoc le sharing:
1. Universality: all le types should be sharable.
2. Minimum preconditions: participants (i.e., data providers and consumers)
should not require a lot of additional software to be able to share les.
3. Minimum con guration: setting-up a new collaborative le space should be
as easy as possible.
4. Lightweight and usable access control: it should be simple and fast to assess
shared les and to decide on access rights.
5. Platform and network independence: it should be possible to share les across
di erent hardware and software (operating system) platforms. It should
further be possible to share les across network boundaries.
6. Support for transient data and stable links: data in ad-hoc sharing scenarios
is accessible only for a short amount of time. Sometimes this is su cient in
a particular sharing scenario [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. However, sometimes operations on shared
data run over multiple such ad-hoc sessions (in our case, e.g., annotations
and links between les should be preserved) and sharing solutions should
support such operations.
3.1
      </p>
      <sec id="sec-2-1">
        <title>Ad-hoc File Sharing in Practice</title>
        <p>
          Today, sending email attachments seems to be the predominant way of personal
le sharing [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ]. Voida et al. analyzed that users tend to fall-back to such a
universal data sharing mechanism when they are unsure about the availability of a
certain sharing tool at the recipients side, or when they have problems of
communicating through rewalls [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ]. Another common technique for infrastructure-less
ad-hoc le sharing is to use detachable physical devices, like USB sticks. Usually,
this \o ine" method for le sharing works straightforward, except for limited
storage capacity on the removable media. Another popular way to share les is
to send them via instant messaging (IM) channels. Most of these tools provide
simple mechanisms to send les to one or many chat partners, which however
requires all participants to have network connectivity, an account for the IM
network, and corresponding client software at hand. This method is further not
applicable when the available network does not permit the usage of IM software
due to security restrictions, e.g., in corporate intranets. Peer-to-peer based le
sharing constitutes another often-used method [
          <xref ref-type="bibr" rid="ref1 ref3">1, 3</xref>
          ]; however, classical
peer-topeer platforms like Napster, Gnutella or KaZaA seem less applicable in ad-hoc
le sharing scenarios.
        </p>
        <p>Other common methods to share les make direct use of the World Wide
Web, arguably one of the most important information channels today. The Web
is well-supported by most modern devices: even low-capacity mobile devices
allow users to access Web resources. It is easy nowadays to set-up personal Web
presences without knowing the technical details of content markup and Web
hosting. Because of their widespread adoption, Web technologies are a promising
candidate for ad-hoc information sharing. However, current Web 2.0 applications
that support le sharing su er from the previously mentioned issues (cf. Section
1) such as the requirement for Internet access or limited annotation support.
A major drawback of such centralized systems is that they require all shared
les to be uploaded to their Web servers rst. In our scenario, this means that
Alice would have to upload all her vacation photos before Bob can select some for
downloading them to his laptop. These digital objects are not directly connected
with their digital \originals" residing on Alice's computer, meaning that changes
to these les are not automatically propagated to the shared versions and vice
versa. Further, Alice cannot directly bene t from annotations made to these
online copies outside the hosting Web application itself.</p>
        <p>
          In this paper we present an alternative le-sharing approach that does not
require a centralized infrastructure or digital copies of resources and is based
on Linked Data principles. Linked Data [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] re-uses and extends the Web
infrastructure with technologies that allow to represent, transport, and access raw
data over the network. In comparison to the traditional, document-centric Web
it comprises the signi cant improvement that it associates resource identi ers
(URIs) with structured descriptions that are represented in a uni ed format
(RDF) and can be accessed by de-referencing their URIs. In the context of le
systems, Linked Data techniques can be used to expose structured metadata
descriptions about les, which allows clients to access them based on their semantic
meaning rather than just based on their location in a le system hierarchy [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ].
3.2
        </p>
      </sec>
      <sec id="sec-2-2">
        <title>File Sharing with TripFS</title>
        <p>Based on the scenario outlined in Section 1, we have extended TripFS with
features that allow users to easily share les across a (local) network, and to
connect multiple le systems using Linked Data technologies. In the following
we reconsider the scenario and describe which particular TripFS features support
this use case.</p>
        <p>One-click Sharing. When Alice and Bob meet to discuss and exchange their
recent photos, both want to share folders (including subfolders) on their laptops
that contain these photos5. When Alice starts TripFS on her laptop, it announces
its service URL via a Zeroconf6 service, so that it can be discovered by other
machines on the same network. In parallel, TripFS crawls the selected part of
the local le system, extracts metadata from les, and links them to other data
sources (cf. Section 2). The resulting triples are incrementally stored in the RDF
store and are immediately published via the Linked Data interface.</p>
        <p>For adding new directory subtrees to TripFS, Alice makes use of the TripFS
Windows Explorer shell extension7 that allows to share a folder with a single
mouse click (cf. Figure 2). When Alice clicks this button, a local Windows socket
is opened and the selected directory's path is sent to TripFS. TripFS adds this
directory to its list of exposed root directories and creates a new observed region
for DSNotify. The shell extension reports the successful or unsuccessful outcome
of this operation to the user via a popup dialog. Immediately, the folder is
accessible via the Web server built into TripFS and can be accessed by devices
on the network. If the newly exposed root directory lies within a directory that
is already exposed, TripFS marks it as inactive in order to avoid unnecessary
monitoring and crawling costs for overlapping regions. For the same reasons,
TripFS deactivates all existing root directories that lie in a subtree of a newly
added root directory.</p>
        <p>
          Accessing Shared File Systems. Since TripFS provides both, an
HTMLand an RDF-based view on shared folders, Alice's friends can access her photos
using the Web browser installed on their laptops. If their system supports service
discovery via Zeroconf they not even have to enter the hostname or IP address of
Alice's laptop. They can navigate through the le hierarchy and download their
favorite photos (a screenshot of this interface is presented in Figure 3). They
could also use the structured data exposed by TripFS to search for les using
a visual Linked Data query builder (like, e.g., Explorator [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ]), which allows to
visually construct structured queries. For example, Bob may decide to download
only photos taken on a certain day (indicated by EXIF metadata extracted from
the photos), or photos that are related to a particular place (represented by
5 Let us assume they have access to a shared wireless network.
6 Zero Con guration Networking (Zeroconf): http://www.zeroconf.org
7 It is also possible to add shared directory subtrees via the Web interface.
        </p>
        <p>Alice’s Local File System</p>
        <p>Alice’s TripFS</p>
        <p>Bob’s TripFS
Windows socket</p>
        <p>Zeroconf discovery
root
favorites
montenegro
beach
durmitor</p>
        <p>TFS root
IMG1.jpg
vacation
piran</p>
        <p>tfs:mounts
tfs:mountedBy
IMG2.jpg
rdfs:seeAlso</p>
        <p>TFS
root
images
2009
prague</p>
        <p>2008
celovec
IMG1.jpg
rdfs:seeAlso</p>
        <p>IMG1.jpg
a link to a GeoNames entity that has been created based on extracted GPS
coordinates).</p>
        <p>Annotating Shared Files. While he browses Alice's photos, Bob wants to
annotate one of the pictures because he remembers the particular restaurant
where the picture was taken. For this purpose, TripFS provides an RDF sink.
This component establishes a Web resource that accepts RDF data (for instance,
annotations of shared les) sent by clients via HTTP POST, and stores posted
triples in a designated named graph within the TripFS RDF store. Later, these
annotations are published together with metadata that have been extracted from
les. For instance, Bob could drag the URL of the restaurant's Web page from
his Web browser to a designated area on the TripFS HTML interface, causing
an rdfs:seeAlso triple to be stored. If Bob did this for multiple les, he could
later retrieve all photos linked to the restaurant's Web page through a structured
query, as described before.</p>
        <p>Mounting Other TripFS Instances. A special form of le annotation is
Linked File System Mounting. This technique uses Linked Data principles to
connect distributed le systems, similar to the well-known mount operation in
UNIX-like operating systems (cf. Figure 2). TripFS de nes an RDF property
tripfs:mounts8 to link a directory in one instance to a directory in the same or
another one. TripFS provides a simple user interface for mounting remote TripFS
instances, which leads to the creation of the respective triples in both involved
TripFS RDF stores. Applications may add mount links by simply posting a
respective triple to the RDF sink. Mount triples should be interpreted by TripFS
consumers (such as the Web-based TripFS le browser) like parent-child
relationships to enable seamless navigation across le system boundaries. Note that
in contrast to local le systems, it is possible to create circular structures using
Linked File System Mounting. Although the TripFS RDF sink rejects mount
triples that would directly lead to such a situation, circles cannot be generally
avoided due to the distributed, open-world nature of Linked Data. Consumers
(e.g., crawlers or user interfaces) need to be aware of this possibility to avoid
unwished complications like in nite loops. As mount triples reside in the annotation
model of the TripFS instance they were posted to, a mount link is initially visible
only to clients of this particular instance, as it is the case with UNIX mounts.
However, following the idea of the Web of Data, it is reasonable to propagate
the mount triple also to the remote TripFS instance, so that it can be easily
followed backwards. Thus the RDF sink posts a respective tripfs:mountedBy
triple to the RDF sink of the remote TripFS. Since TripFS provides stable URIs
for les due to its le-monitoring component, these mount points remain valid
even if a mounted le system is temporarily unavailable, or if the user decides
to move a shared directory to a di erent location on their hard disk.
Seamless File Browsing. While TripFS allows Alice and Bob to interlink their
le systems and mutually add annotations to exposed les, this environment
still provides no seamless browsing experience: for instance, le annotations are
exposed only by the TripFS instance they are stored in. However, if Bob wants
to add a private annotation to one of Alice's les, it should not be stored in
Alice's TripFS instance but in Bob's, and he wants this private annotation to
appear when he browses Alice's le system.</p>
        <p>To overcome this issue, TripFS contains a Web-based proxy browser that
dynamically fetches RDF descriptions from remote sources and enriches them
with annotations from the local TripFS RDF store (cf. Figure 3). Annotations
are stored in a separate RDF graph in TripFS that is merged with a resource's
(remote or local) RDF graph for rendering purposes. Thus, annotations from the
local store that refer (via their subject URI) to resources in the remote source
are automatically mashed with the remote source's RDF descriptions: the user
is presented with a single, comprehensive view of remote and local resources.
Duplicate Detection. TripFS provides a simple solution for the detection of
duplicate les across multiple le systems. For each published le, TripFS
calcu8 tripfs:mounts is a sub-property of the tripfs:child property, an inverse property
tripfs:mountedBy is available. The current version of the TripFS vocabulary is
available at http://purl.org/tripfs/2010/06.
lates a content-based checksum and publishes it as property of the le resource.
A linker component creates owl:sameAs links between les within the published
le system, as well as les in other TripFS instances that share a common
checksum. For example, when Alice's TripFS is discovered by Bob's TripFS (and vice
versa), this linker component is activated and creates owl:sameAs links between
all duplicates found in Alice's and in Bob's shared folders. By this, Bob is
enabled to immediately detect that he already copied a certain le from Alice's
laptop last time they met. Further, these owl:sameAs links can be exploited to
access resource copies when the originals are currently not accessible.
Discovery. Currently, TripFS makes use of a Zeroconf service to discover other
TripFS instances. When a new instance is discovered, the duplicate detection
linker described above is activated and les with equal checksums are interlinked.
One drawback of the current solution is that it is restricted to the local subnet.
An alternative method would be to use URNs (e.g., PURLs) for locating physical
TripFS addresses. Once the PURL of a particular TripFS instance is known
(e.g., because it has been communicated via email), it would remain stable.
Disadvantages would be that access to the URN service would be required, and
that users have to notify these services whenever their physical address changes
(e.g., due to a newly assigned IP address). However, this last step can be easily
automated. Another possibility is that the creation of a guest account for a
particular TripFS (see below) results in an email that sends an appropriate link
to a set of recipients. This link would contain the respective TripFS location as
well as the required user credentials for accessing it.</p>
        <p>
          Access Control. The willingness to share data with others often depends on
whom these data will be shared with [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. Access control mechanisms are
therefore required also in ad-hoc sharing scenarios. As TripFS is still in a prototypical
phase and as security was not our primary research goal, we have no yet
implemented access control mechanisms. However, TripFS provides an increased level
of privacy and security compared to other sharing platforms since the data
remains under full control of the user and is not replicated to external servers.
        </p>
        <p>
          We are however aware that usable access control mechanisms are essential for
a system like ours. A rst, straightforward solution would be to expose les via
HTTPS and introduce password protection, which can be based on the
underlying operating system's authentication and permission system. TripFS therefore
could reuse already existing mechanisms and would avoid the need to maintain
parallel structures. Additionally, a TripFS instance owner could create a new
guest account that would be valid for a limited time with a single mouse click.
The respective credentials could then be transferred to the TripFS consumer via
out-of-band methods (e.g., via email or phone). Although this might be su
cient in the discussed ad-hoc sharing scenarios, more ne-grained access control
mechanisms and access rights, as discussed for example in [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], have to be
considered in the future.
        </p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Related Work</title>
      <p>
        Several studies on personal le sharing focused on particular le types (e.g.,
music or photographs [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ]) or on collaboration in corporate intranets.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], the authors analyze several tools and methods for data sharing and
report on dimensions for characterizing them. For example, they distinguish
between push- and pull-oriented systems and present a user interface for their
own peer-to-peer le sharing infrastructure. In accordance with the terminology
of that paper, TripFS would be a pull-oriented system that supports public or
selective addressing (when password protected) and supports noti cations via
the DSNotify event log mechanisms [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. The location of the les during sharing
remains the provider's machine.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], Rode et al. identify four signi cant requirements for their own
adhoc peer-to-peer le sharing software: (i) zero-con guration for setting up a
collaborative le space, (ii) no prior registration of participants required, (iii)
no restriction to a xed infrastructure (e.g., Internet access) and (iv) platform
independence. We believe that TripFS meets all these requirements, although
the TripFS software has to be installed on all machines that expose their les.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], Dalal et al. identify a number of key problems that are not
properly addressed by current data sharing technologies. The authors describe the
requirement for ad-hoc guesting, where users require transitory, lightweight
solutions for sharing data securely with unplanned sets of people with whom they
have not previously shared data and that can possibly not be addressed by
traditional access control. Similar to Rode et al., they identify minimal setup e ort
and no need for a priori preparations by the participants as key requirements
for ad-hoc sharing. Additionally, they encourage the use of universal identi ers
(e.g., email addresses) for the identi cation of users.
5
      </p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>
        In this paper we described the current state of TripFS and its extensions since
our last publication [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], namely: one-click sharing support; mounting support;
seamless le browsing support across distributed, mounted linked le systems;
annotation of le system objects and duplicate detection.
      </p>
      <p>
        We further presented how this linked le system can be used in ad-hoc le
sharing scenarios. Matching our system to the requirements described in Section
3 we can state that TripFS can be used as a universal le sharing tool that is not
restricted to particular le types. TripFS requires no a-priori preparations for
recipients of shared data. Users that actively share the data need a local TripFS
instance that can either be started automatically by the operating system or
by double-clicking a JAR le. TripFS allows remote users to browse the shared
contents directly on the remote machine before downloading (subsets of) it.
It thereby comprises a pull-oriented sharing strategy [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] that is not based on
centralized infrastructure like current Web 2.0 applications. Sharing a directory
subtree with TripFS is made easy by its Windows shell extension, and we consider
the development of comparable tools for other operating systems.
      </p>
      <p>
        TripFS has been implemented in Java and can be used on all platforms that
support Java 1.6 or higher. In the future we aim to explore how TripFS can be
deployed on mobile devices like cell phones, which are presumably more often
involved in ad-hoc sharing situations. Then, TripFS could additionally be useful
in \sharing with myself " scenarios [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ], e.g., for copying photos from a person's
cell phone to a desktop computer or vice versa.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <given-names>Stephen</given-names>
            <surname>Voida</surname>
          </string-name>
          , W. Keith Edwards, Mark W. Newman,
          <string-name>
            <given-names>Rebecca E.</given-names>
            <surname>Grinter</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Nicolas</given-names>
            <surname>Ducheneaut</surname>
          </string-name>
          .
          <article-title>Share and Share Alike: Exploring the User Interface A ordances of File Sharing</article-title>
          .
          <source>In CHI '06: Proceedings of the SIGCHI conference on Human Factors in computing systems</source>
          , pages
          <volume>221</volume>
          {
          <fpage>230</fpage>
          , New York, NY, USA,
          <year>2006</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Brinda</given-names>
            <surname>Dalal</surname>
          </string-name>
          , Les Nelson, Diana Smetters, Nathaniel Good, and
          <string-name>
            <given-names>Ame</given-names>
            <surname>Elliot</surname>
          </string-name>
          . Adhoc Guesting:
          <article-title>When Exceptions are the Rule</article-title>
          .
          <source>In UPSEC'08: Proceedings of the 1st Conference on Usability, Psychology, and Security</source>
          , pages
          <volume>1</volume>
          {
          <fpage>5</fpage>
          , Berkeley, CA, USA,
          <year>2008</year>
          . USENIX Association.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <given-names>Tara</given-names>
            <surname>Whalen</surname>
          </string-name>
          , Elaine Toms, and
          <string-name>
            <given-names>James</given-names>
            <surname>Blustein</surname>
          </string-name>
          . File Sharing and Group Information Management.
          <source>In Personal Information Management: PIM</source>
          <year>2008</year>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Schandl</surname>
          </string-name>
          and
          <string-name>
            <given-names>Niko</given-names>
            <surname>Popitsch</surname>
          </string-name>
          .
          <article-title>Lifting File Systems into the Linked Data Cloud with TripFS</article-title>
          .
          <source>In 3rd International Workshop on Linked Data on the Web (LDOW2010</source>
          )
          <article-title>- Raleigh, North Carolina</article-title>
          , USA,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <given-names>Niko</given-names>
            <surname>Popitsch</surname>
          </string-name>
          and
          <string-name>
            <given-names>Bernhard</given-names>
            <surname>Haslhofer</surname>
          </string-name>
          .
          <article-title>DSNotify: Handling Broken Links in the Web of Data</article-title>
          .
          <source>In WWW '10: Proceedings of the 19th international conference on World wide web</source>
          , pages
          <volume>761</volume>
          {
          <fpage>770</fpage>
          , New York, NY, USA,
          <year>2010</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Jennifer</given-names>
            <surname>Rode</surname>
          </string-name>
          , Carolina Johansson, Paul DiGioia, Roberto Silva Filho, Kari Nies,
          <string-name>
            <given-names>David H.</given-names>
            <surname>Nguyen</surname>
          </string-name>
          , Jie Ren, Paul Dourish, and David Redmiles. Seeing Further:
          <article-title>Extending Visualization as a Basis for Usable Security</article-title>
          .
          <source>In SOUPS '06: Proceedings of the second symposium on Usable privacy and security</source>
          , pages
          <volume>145</volume>
          {
          <fpage>155</fpage>
          , New York, NY, USA,
          <year>2006</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <given-names>Christian</given-names>
            <surname>Bizer</surname>
          </string-name>
          , Tom Heath, and
          <string-name>
            <surname>Tim</surname>
          </string-name>
          Berners-Lee.
          <article-title>Linked Data | The Story So Far</article-title>
          .
          <source>International Journal on Semantic Web and Information Systems</source>
          ,
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <given-names>Samur</given-names>
            <surname>Araujo</surname>
          </string-name>
          and
          <string-name>
            <given-names>Daniel</given-names>
            <surname>Schwabe</surname>
          </string-name>
          .
          <article-title>Explorator: A Tool for Exploring RDF Data Through Direct Manipulation</article-title>
          .
          <source>In Proceedings of the 2nd International Workshop on Linked Data on the Web (LDOW)</source>
          , Madrid, Spain,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Judith</surname>
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Olson</surname>
            , Jonathan Grudin, and
            <given-names>Eric</given-names>
          </string-name>
          <string-name>
            <surname>Horvitz</surname>
          </string-name>
          .
          <article-title>A Study of Preferences for Sharing and Privacy</article-title>
          . In CHI '05: CHI '
          <article-title>05 extended abstracts on Human factors in computing systems</article-title>
          , pages
          <year>1985</year>
          {
          <year>1988</year>
          , New York, NY, USA,
          <year>2005</year>
          . ACM.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Barry</surname>
            <given-names>Brown</given-names>
          </string-name>
          , Abigail J.
          <string-name>
            <surname>Sellen</surname>
            , and
            <given-names>Erik</given-names>
          </string-name>
          <string-name>
            <surname>Geelhoed</surname>
          </string-name>
          .
          <article-title>Music Sharing as a Computer Supported Collaborative Application</article-title>
          .
          <source>In ECSCW'01: Proceedings of the seventh conference on European Conference on Computer Supported Cooperative Work</source>
          , pages
          <volume>179</volume>
          {
          <fpage>198</fpage>
          ,
          <string-name>
            <surname>Norwell</surname>
          </string-name>
          , MA, USA,
          <year>2001</year>
          . Kluwer Academic Publishers.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Andrew</surname>
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Miller</surname>
            and
            <given-names>W. Keith</given-names>
          </string-name>
          <string-name>
            <surname>Edwards</surname>
          </string-name>
          .
          <article-title>Give and Take: A Study of Consumer Photo-sharing Culture and Practice</article-title>
          .
          <source>In CHI '07: Proceedings of the SIGCHI conference on Human factors in computing systems</source>
          , pages
          <volume>347</volume>
          {
          <fpage>356</fpage>
          , New York, NY, USA,
          <year>2007</year>
          . ACM.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>