A. A. E. Kalam, Jérémy Briffaut, C. Toinard, M. Blanc
{"title":"Intrusion detection and security policy framework for distributed environments","authors":"A. A. E. Kalam, Jérémy Briffaut, C. Toinard, M. Blanc","doi":"10.1109/ISCST.2005.1553300","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553300","url":null,"abstract":"This paper presents a novel intrusion detection approach and a new infrastructure to enforce the security policy within a distributed system. The solution guarantees the consistency of the security policy and prevents any accidental or malicious update (of the local policies). The control is carried out locally (in each host) in accordance with a meta-policy that enables a distributed control to update a global security policy while satisfying global security properties. The solution is more robust in terms of fault-tolerance and resists to denial of service attacks since the solutions carries out all the control locally. Two levels of intrusion detection are proposed to guaranty the integrity and the consistency of the distributed policy. The first level (meta-level, or administration level) guarantees that each local policy evolves according to the global security properties. This level detects attacks trying inadequate alterations of the local security policies. The second level corresponds to a classical intrusion detection system. But, it can take advantages of the local policy to detect attacks that violate the security objectives. That second level enables to integrate and to adjust various classical IDS. Our approach enforces the security of large scale systems","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123185212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Path planning for altruistically negotiating processes","authors":"Deepthi Devalarazu, D. Watson","doi":"10.1109/ISCST.2005.1553313","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553313","url":null,"abstract":"Autonomous negotiating systems are composed of logically (even geographically) separated software agents that control logical or physical resources that altruistically seek to perform useful work in a cooperative manner. These systems are multi-agent systems that consist of a population of autonomous agents collaborating to work for a common goal while simultaneously performing their individual tasks (i.e., computational resources are distributed amongst interconnected agents). With the increasing capabilities of the collaborative agents, the need for faster and more efficient methods of utilizing the distributed resources has also increased. This paper focuses on improving the performance of one such multi-agent system that deals with the path planning for autonomous robots. This is achieved by exploiting parallelism among processing resources embedded in the autonomous vehicles, using a distributed memory, message-passing execution model","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kyoung-Yun Kim, D. G. Manley, Hyung-Jeong Yang, B. Nnaji
{"title":"Ontology-based virtual assembly model for collaborative virtual prototyping and simulation","authors":"Kyoung-Yun Kim, D. G. Manley, Hyung-Jeong Yang, B. Nnaji","doi":"10.1109/ISCST.2005.1553320","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553320","url":null,"abstract":"Today's virtual prototyping systems for assembly provide a single instance of simulation and analysis solutions from models that are often generated from scratch. Virtual assembly models (VAM) are not fully integrated with other design activities, such as conceptual and detailed design, and design intent is not fully propagated to all product development activities. An assembly design (AsD) ontology can capture assembly and joining intents and can be efficiently reused in collaborative assembly development activities. Through the use of ontologies, computer systems can reason with data and information rather than just explicitly capture it. This paper presents an AsD ontology that plays as a formal, explicit specification of a shared conceptualization of assembly design and serves as a basis for a VAM for collaborative virtual prototyping and simulation (VP&S). The ontology-based VAM makes clear the relations among assembly components and form features in an AsD and provides systematized knowledge, which can be reasoned by collaboration tools. The VAM also captures design rationale including joining intent and spatial relationships. This paper discusses the role of VAM in collaborative VP&S and presents an AsD browser for virtual assembly analysis","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124461949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sangyoon Oh, Hasan Bulut, A. Uyar, Wenjun Wu, G. Fox
{"title":"Optimized communication using the SOAP infoset for mobile multimedia collaboration applications","authors":"Sangyoon Oh, Hasan Bulut, A. Uyar, Wenjun Wu, G. Fox","doi":"10.1109/ISCST.2005.1553291","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553291","url":null,"abstract":"Mobile computing is growing in popularity due to continuing improvements in mobile devices and their connectivity. Collaboration systems enable users at geographically distributed locations to collaborate each other. Community Grids Lab's GlobalMMCS is a Web services based, integrated videoconferencing system that allows heterogeneous clients to join the same session. Integration of mobile devices into the Web services based collaboration system will give mobility to users and heterogeneity to the system. However, there are performance limitations if we use the current SOAP approaches to integrate mobile applications with Web services based collaboration systems, especially for multimedia applications. In this paper, we propose a SOAP infoset preserving flexible representation and its specialization for mobile computing environment - handheld flexible representation (HHFR). We provide a flexible representation of binary encoding with a description file for message format and include a QoS framework in the architecture, such as reliability and security","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130904982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Demchenko, C. D. Laat, L. Gommans, B. V. Oudenaarde, A. Tokmakoff, M. Snijders
{"title":"Job-centric security model for open collaborative environment","authors":"Y. Demchenko, C. D. Laat, L. Gommans, B. V. Oudenaarde, A. Tokmakoff, M. Snijders","doi":"10.1109/ISCST.2005.1553296","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553296","url":null,"abstract":"This paper describes the design and development of a flexible, customer driven, security infrastructure for open collaborative environments. The experiences were gained within the framework of the collaboratory.nl project. The work is based on extended use of emerging Web services and grid security technologies, combined with concepts from the generic authentication authorization and accounting (AAA) authorisation framework. Basic CNL use cases and functional security requirements are analysed to provide motivation for the proposed job-centric security model. This model describes access control and user- and resource management. The proposed job-centric approach uses a job description as a semantic document that is created on the basis of the signed order (or business agreement). It contains all the information required to run the experiment and also to create/manage the virtual job-based associations of users and resources. The proposed trust relations analysis explains the use of trust anchors in the job-centric security model. In addition, the paper provides implementation details of using XACML and SAML for authorisation assertions and messaging, based on the current CNL implementation","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122646039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collaborative knowledge management in e-meetings","authors":"C. Han, J. E. Luczaj","doi":"10.1109/ISCST.2005.1553307","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553307","url":null,"abstract":"This paper addresses the issue of knowledge management for collaborative tasks, such as meetings. A knowledge-based and Web-based framework is developed to capture and manage the knowledge from the interaction between human and human, human and computer-based autonomous agent, or agent and agent in collaborative sessions. In addition to the established business process flows, other valuable factors of business process, such as the human factors, the problem contexts, and the strategies for problem solving and decision making are taken into consideration","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An extended time horizon search technique for cooperative unmanned vehicles to locate mobile RF targets","authors":"D. Pack, G. York","doi":"10.1109/ISCST.2005.1553331","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553331","url":null,"abstract":"In this paper, we present a behavior-based, distributed, cooperative search algorithm for multiple unmanned aerial vehicles (UAVs) to cooperatively find sub-optimal search patterns to detect moving radio frequency (RF) signal emitting targets. The overall goal of the search algorithm is to compute sub-optimal flight trajectories for participating UAVs to minimize the combined search cost: search coverage, time, fuel usage, and communication overhead. The focus for this paper is to extend our existing search algorithm 's ability to incorporate evaluations of flight path options beyond the immediate time horizon. The paper explores the trade-offs over the additional computation cost and the reduction of the total search time. In addition to finding a set of sub-optimal UAV search paths, the search algorithm also generates a priority list of possible, search paths. The list is then used by an individual UAV to adjust its path selection to minimize a global search cost. Collectively, the selected UAV paths produce sub-optimal search patterns for a group of UAVs. The validity of the search algorithm is demonstrated using computer simulation","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125563260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Visualizing handheld-based classroom activity","authors":"D. Tatar, Sirong Lin, Margaret Dickey-Kurdziolek","doi":"10.1109/ISCST.2005.1553328","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553328","url":null,"abstract":"Classroom interactions involving handheld wireless connectivity can produce great learning gains. However, characterizing interactions as they happen can be difficult. Based on the log files from two months of use in math classrooms, we have built a visualization tool for examining collaborative and individual use. The tool can be used to aid in qualitative analyses such as frequently conducted to understand learning processes or to conduct interaction or grounded theory analyses. It also has the potential to be an interface to support quantitative queries. However, in order to have utility, design problems have to be solved, including how to display shifting work partnerships for a large number of actors without confusing overlaps. The current paper presents five designs with discussions of their pros and cons","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129228745","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On a collaborative commerce framework and architecture for next generation commerce","authors":"Seung-yun Kim, W. Smari","doi":"10.1109/ISCST.2005.1553324","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553324","url":null,"abstract":"Collaborative commerce (or c-commerce) can be regarded as the next evolutionary step beyond the more basic process of electronic commerce (or e-commerce). It is an emerging area that is based on interactions enabled by Internet technology. It offers many levels of coordination, collaborative interactions and cooperation among or within organizations, and between individuals. C-commerce requires the establishment of dynamic collaborative environments over the Internet. In a collaborative environment, organizations and individuals can work together, share sensitive information, protect their privacy, and collaborate on activities and projects efficiently and effectively. This paper presents an overview of some principal concepts and definitions of c-commerce, and proposes an intelligent collaborative commerce (ICC) system architecture. The core component of the ICC architecture is a collaborative Web portal which can be used with existing e-commerce systems. We then describe each block in the collaborative Web portal component as well as the layers of Web services envisioned and their functions. The architecture can be implemented in a variety of network-centric scenarios, which form the basis for future work and further development","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133652429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained search for a moving target","authors":"D. Grundel","doi":"10.1109/ISCST.2005.1553330","DOIUrl":"https://doi.org/10.1109/ISCST.2005.1553330","url":null,"abstract":"We consider the problem of constrained path planning for one or two agents in search of a single randomly moving target such that we maximize the probability of intercepting the target at some time in its trajectory. We assume the agents operate in a receding-horizon optimization framework with some finite planning horizon. We present and compare two search path planning methods. This problem is particularly applicable in the case of wide area search munitions searching and engaging moving ground targets","PeriodicalId":283620,"journal":{"name":"Proceedings of the 2005 International Symposium on Collaborative Technologies and Systems, 2005.","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134214408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}