{"title":"Information flows in e-government","authors":"T. Lin","doi":"10.1109/CMPSAC.2003.1245405","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245405","url":null,"abstract":"Classical MAC and DAC are reexamined in the light of e-government. In this paper, we focus on the information flows, which have been addressed by classical MAC, in my view, somewhat inadequately, and never been addressed by classical DAC.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127044630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Context aware deployment for mobile users","authors":"C. Taconet, E. Putrycz, G. Bernard","doi":"10.1109/CMPSAC.2003.1245324","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245324","url":null,"abstract":"With the development of mobile computing, applications have to be accessible at any time, from any device and in any place in a wide variety of execution contexts. Consequently, applications have to adapt to different terminal capabilities both for efficiency and ergonomics. In this paper, we present a deployment infrastructure, called smart deployment infrastructure (SDI), which aims to ease the installation of large distributed applications for any kind of user terminal. SDI is designed to take into account the execution context (including available resources and the user's terminal capabilities) in order to bring an application to the user and adapt it to the execution context. By considering an application as an assembly of distributed software components, SDI provides the opportunity to decide at installation time which components, among packaged components, will be instantiated on the terminal and which ones will be installed on other hosts. SDI implementation demonstrates that the deployment infrastructure offers acceptable application deployment times and, at the same time, lowers both the application execution times and terminal resource consumption.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124066856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet-based decision support: towards e-hospital","authors":"S. Tsumoto, S. Hirano, E. Hanada","doi":"10.1109/CMPSAC.2003.1245401","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245401","url":null,"abstract":"Rapid progress in information technology enables us to retrieve relevant information from databases on the internet. Medical and health care are not exceptions: the recent advances provide a new environment to telemedicine, in which online information retrieval has been challenging problems. In this paper, a new approach to internet-based decision support from university hospital is presented. The system consists of the following four components: one is a web-based system for home doctors, which supports writing an introduction letter to the university hospital. Second one gives a diagnostic and therapeutic report on the patient who was introduced by home doctors and admitted to the university hospital. Third system gives reports on medical images and pathological examinations. Finally, the fourth one makes a decision support for neurological diseases. The integrated system has been already in use at Shimane University Hospital since 2001 and is now being evaluated by doctors inside/outside the hospital.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121425584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mediating electronic meetings","authors":"Jia Zhang, Carl K. Chang, Jen-Yao Chung","doi":"10.1109/CMPSAC.2003.1245344","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245344","url":null,"abstract":"Electronic meeting control has been the focus of many research efforts; however, extensively adopted standards are still unavailable. In this paper, we present a generic model for electronic meeting control. Our model is based on the formal meeting protocol commonly known as the parliamentary procedure or Robert's Rules of Order (RRO). Capturing the essential features of traditional RRO, we suggest extension mechanisms in order to exploit the capabilities of electronic media. Centered on the concept of a discussion thread, our extended RRO model can handle concurrent meeting activities, multiple floors, amendment nesting, and discussion hierarchies. M-Net, an electronic meeting system, is introduced as an example supported by our model.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133331318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some domain patterns in Web application framework","authors":"Liu Chao, He Keqing, Liu Jie, Ying Shi","doi":"10.1109/CMPSAC.2003.1245415","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245415","url":null,"abstract":"In this paper, we first discuss Web software engineering and its biggest problem. Reusing previously developed frameworks and patterns is a good way to resolve this problem. Then we introduce the structure of Web software engineering and Struts framework. Lastly, we discuss some patterns that we get from order-management systems based on Struts framework.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132288375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A security characterisation framework for trustworthy component based software systems","authors":"K. Khan, Jun Han","doi":"10.1109/CMPSAC.2003.1245337","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245337","url":null,"abstract":"This paper explores how to characterize security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framework provides an explicit opportunity for software composers as well as software components to test a priori security properties of software components in a system composition. The proposed framework uses logic programming as a tool to represent security properties of atomic components and reason about their compositional matching with other components. This enables software components as well as composers to \"test\" possible matches and mismatches between the security properties of the candidate components and the security requirements of the enclosing applications systems.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134517117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An experience of applying architecture-based approach to build a component-based requirements management toolset","authors":"M. Babar","doi":"10.1109/CMPSAC.2003.1245394","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245394","url":null,"abstract":"It has been advocated and shown that software architecture can be an effective tool to reduce development cost and increase the quality of the end product. Rigorous efforts invested in architectural design and evaluation activities results in increased comprehension of the system, better communication among stakeholders, effective project management, controlled evolution, and rapid development. This paper presents our experience of applying an architecture-based approach to develop an integrated requirements management toolset, PARSNIP (PARsed Natural language Input Processor). We also report the integration issues peculiar to our project, our approach to address them and rational for our architectural and integration decisions.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132794266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"MDA-based development of e-learning system","authors":"Hong Wang, Dong Zhang","doi":"10.1109/CMPSAC.2003.1245417","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245417","url":null,"abstract":"Model-driven architecture (MDA) focuses on the evolution and integration of applications across heterogeneous middleware platforms. It provides a systematic framework using engineering methods and tools to understand, design, operate, and evolve enterprise systems. MDA promotes modeling different aspects of software systems at levels of abstraction, and exploiting interrelationships between these models. In this paper, we propose a model-driven approach to e-learning system development based on core Object Management Group (OMG) MDA standards,. In order to make maximum use of domain facilities provided by MDA, our e-learning system is modeled in the form of a normative platform independent model (PIM) expressed by UML, and augmented by a normative platform specific model (PSM) expressed by UML profile for EJB interface definitions.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115695542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Xu, Baowen Xu, Zhenqiang Chen, Jixiang Jiang, Huowang Chen
{"title":"Regression testing for Web applications based on slicing","authors":"Lei Xu, Baowen Xu, Zhenqiang Chen, Jixiang Jiang, Huowang Chen","doi":"10.1109/CMPSAC.2003.1245411","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245411","url":null,"abstract":"Web applications have rapid developing speed and changeable user demands, so the regression testing is much important. Since the changed demands result in different versions of Web applications, and the faults usually hiding in the adjusted contents, the regression testing must cover all the related pages. In order to carry through the regression testing quickly and effectively, we make the simplification with the method of slicing. Firstly, we analyze the possible changes in the Web applications and the influences produced by these changes, discussing in the direct-dependent and indirect-dependent way; next, we give the regression testing method based on slicing emphasized on the indirect-dependent among data, i.e., obtaining the dependent set of changed variables by forward and backward search method and generating the testing suits; conclusion remarks and future work are given at last.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114733285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A methodology for hiding knowledge in XML document collections","authors":"T. Johnsten, Robert B. Sweeney, Vijay V. Raghavan","doi":"10.1109/CMPSAC.2003.1245407","DOIUrl":"https://doi.org/10.1109/CMPSAC.2003.1245407","url":null,"abstract":"Information marked up as XML data is becoming increasingly pervasive as a part of business-to-business electronic transactions. A possible threat to the continued growth of XML in this domain is that data mining technology may be applied to XML documents in order to reveal sensitive knowledge. This paper presents a methodology for hiding sensitive knowledge in XML documents in the context of association mining algorithms. This methodology involves identifying the sensitive knowledge within the document, formulating an appropriate set of security policies, and finally sanitizing the document to hide the sensitive knowledge.","PeriodicalId":173397,"journal":{"name":"Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122570420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}