{"title":"An Awareness-Based Methodology for Collaborative Business Processes under Various Organizational Cultures","authors":"Farhad Daneshgar","doi":"10.1109/SAINTW.2005.29","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.29","url":null,"abstract":"This paper introduces a graphical method for representation of awareness knowledge in collaborative business processes under various organisational cultures. Such representation method is a precursor to development of a measure for awareness and collaboration that in turn can be used for designing appropriate groupware systems for specific organisational cultures.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121690873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nicola Bonelli, S. Giordano, S. Lucetti, G. Risi, A. Tomasi
{"title":"Automatic IPSec Security Association Negotiation in Mobile-Oriented IPv6 Networks","authors":"Nicola Bonelli, S. Giordano, S. Lucetti, G. Risi, A. Tomasi","doi":"10.1109/SAINTW.2005.41","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.41","url":null,"abstract":"Integrated mobility and security support is one of the most desirable feature for a network. Although IPv6 offers protocol which satisfies both these requirements, practical issues still exist which do not allow for a really integrated environment. Our contribution towards such integration is the development of a solution to automate the task of setting up the appropriate IPSec Security Associations each time a node connects to an IPv6 subnet. The result is mipsd, a user-space daemon which interacts with the IKE daemon running at the mobile host to allow the completely automated setup of SA towards the corresponding Security Gateway.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122396997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Platform-Independent Domain Management Using Super Distributed Objects (SDO) in Context-Aware Service Systems","authors":"Hidenori Yamamoto, S. Sameshima","doi":"10.1109/SAINTW.2005.97","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.97","url":null,"abstract":"In ubiquitous computing, it is said that services are provided anytime, anywhere, and for anyone. Moreover, context-aware services are expected. One issue in providing a context-aware service is the connection of heterogeneous resources (hardware devices and software components) that are embedded or distributed in the surrounding environment and networked with each other. Another issue is deciding from where or from which scopes to detect and select suitable resources. An object model named Super Distributed Objects (SDO)is proposed for a uniform description of resources and a technique of platform-independent management of domainsfor resources based on the SDO model.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mining Workflow Patterns through Event-Data Analysis","authors":"Walid Gaaloul, S. Alaoui, Karim Baïna, C. Godart","doi":"10.1109/SAINTW.2005.81","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.81","url":null,"abstract":"It is obvious to notice that in collaborative applications, considerable processes are either implicit, or integrate existing processes. The discovery, and the explanation of these processes are a hot research topic. The work described in this paper is a contribution to these problems. Generally, workflow mining proposes techniques to acquire a workflow model from a workflow log. In this paper, we present a new workflow mining technique to discover workflow patterns. This technique combines complementarily an algorithmic technique and a statistical analysis technique. This combination can deal with some ambiguities that the single use of the statistical analysis technique cannot resolve.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121010898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Distributed Intrusion Detection for Mobile Ad Hoc Networks","authors":"P. Yi, Yichuan Jiang, Yiping Zhong, Shiyong Zhang","doi":"10.1109/SAINTW.2005.58","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.58","url":null,"abstract":"Mobile ad hoc networking (MANET) has become an exciting and important technology in recent years, because of the rapid proliferation of wireless devices. Mobile ad hoc networks is highly vulnerable to attacks due to the open medium, dynamically changing network topology, cooperative algorithms, lack of centralized monitoring and management point. The traditional way of protecting networks with firewalls and encryption software is no longer sufficient and effective for those features. In this paper, we propose a distributed intrusion detection approach based on finish state machine (FSM).A cluster-based detection scheme is presented, where periodically a node is elected as the monitor node for a cluster. These monitor nodes can not only make local intrusion detection decisions, but also cooperatively take part in global intrusion detection. And then we construct the finite state machine (FSM) by the way of manually abstracting the correct behaviours of the node according to the routing protocol of Dynamic Source Routing (DSR). The monitor nodes can verify every node’s behaviour by the FSM, and validly detect real-time attacks without signatures of intrusion or trained data. Compared with the architecture where each node is its own IDS agent, our approach is much more efficient while maintaining the same level of effectiveness.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114257310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Modelling of a Wireless 4G Cell under GPS Scheme","authors":"D. Kouvatsos, Yue Li, I. Awan","doi":"10.1109/SAINTW.2005.96","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.96","url":null,"abstract":"A novel analytic framework is devised for the performance modelling of a wireless 4G cell with bursty multiple class traffic flows consisting of Internet protocol (IP) voice calls, streaming media and data packets subject to an efficient medium access control (MAC) protocol with a buffer threshold-based traffic handling generalized partial sharing (GPS) scheme. In this context, an open queueing network model (QNM) is proposed consisting of three interacting multiple class GE-type queueing and delay systems and maximum entropy (ME) joint state probabilities are characterized, subject to appropriate GE-type mean value constraints. Moreover, closed form expressions for the aggregate state and blocking (per class) probabilities are determined. Typical numerical examples are included to validate theME performance metrics against Java-based simulation results and also to study the effect of bursty multiple class traffic flow upon the performance of the wireless 4G cell.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121667560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web Services as a Tool for Information Systems Effectiveness","authors":"R. Faiz, Sami Mahfoudhi, K. Mellouli","doi":"10.1109/SAINTW.2005.118","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.118","url":null,"abstract":"Web Services provide a platform for application integration across the net. It’s an important set of standards for application integration. Thus integrating different applications help aligning different component of information systems in organizations, Web services are then an important tool to improve the Information Technology effectiveness and payback in organizations by adapting the new application implemented to current information system instead of rebuilding a new one.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperation Policies for Inter-organizational Workflows","authors":"Issam Chebbi, S. Tata, S. Dustdar","doi":"10.1109/SAINTW.2005.1620016","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.1620016","url":null,"abstract":"In the context of inter-organizational workflows, interactions between partners should be constructive, complementary, and guide the work toward the objective of organizations involved in the workflow. Within our approach, inter-organizational workflow cooperation, which consists of workflow advertisement, workflow interconnection and workflow cooperation, this paper focuses on these cooperation policies one has to define in order to enforce and control interactions between partners’ workflows. The cooperation policies integrate the partners’ roles as well as their coordination, the dataflows allowed to pass from one partner’s workflow to another, and their intervisibility levels. The level of the visibility is used to preserve the partner privacy and know-how and is reduced as tiny as cooperation needs.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Shin'ichiro Takizawa, Y. Takamiya, H. Nakada, S. Matsuoka
{"title":"A Scalable Multi-Replication Framework for Data Grid","authors":"Shin'ichiro Takizawa, Y. Takamiya, H. Nakada, S. Matsuoka","doi":"10.1109/SAINTW.2005.20","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.20","url":null,"abstract":"Existing replica services on the Grid we know to date assumes point-to-point communication and file transfer protocol. As such, when hundreds to thousands of hosts on the Grid access a single dataset simultaneously, bottlenecks in networks and/or the data servers will hinder performance significantly. Instead, our replication framework couples efficient, multicast techniques with a replica catalog that automatically detects simultaneous access to the replica by multiple nodes. As a prototype, we have designed and built a portable, XML-based replica location service accounting for such parallel transfer requests, and coupled it with a O(1) bulk file transfer system Dolly+[6]. The benchmarks show that the system is scalable and effective in reducing replication costs significantly in cluster-based replication scenarios.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115865623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bechini, M. Cimino, B. Lazzerini, F. Marcelloni, A. Tomasi
{"title":"A General Framework for Food Traceability","authors":"A. Bechini, M. Cimino, B. Lazzerini, F. Marcelloni, A. Tomasi","doi":"10.1109/SAINTW.2005.10","DOIUrl":"https://doi.org/10.1109/SAINTW.2005.10","url":null,"abstract":"In this paper, we propose a generic data model for food traceability. We discuss the characteristics of our model with respect both to tracing and tracking requirements, and to quality control. Since traceability is based on reliable and faithful exchange of documents among the units of the supply chain, we also consider how electronic business-to-business standards, such as ebXML, can help support data homogeneity as well as system interoperability. Finally, we highlight how the implementation effort can be accordingly reduced.","PeriodicalId":220913,"journal":{"name":"2005 Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115990073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}