Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)最新文献

筛选
英文 中文
A concept for supporting the formation of virtual corporations through negotiation 支持通过协商形成虚拟公司的概念
Boris Kötting, F. Maurer
{"title":"A concept for supporting the formation of virtual corporations through negotiation","authors":"Boris Kötting, F. Maurer","doi":"10.1109/ENABL.1999.805173","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805173","url":null,"abstract":"This paper describes a system that supports software development processes in virtual software corporations. A virtual software corporation consists of a set of enterprises that cooperate in projects to fulfill customer needs. Contracts are negotiated in the whole lifecycle of a software development project. The negotiations really influence the performance of a company. Therefore, it is useful to support negotiations and planning decisions with software agents. Our approach integrates software agent approaches for negotiation support with flexible multiserver workflow engines.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130105104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
"Here is the knowledge-where should I put it?" Findings from a study of how knowledge spaces are used within a support group “这就是知识——我应该把它放在哪里呢?”关于如何在支持小组中使用知识空间的研究结果
P. Carstensen, U. Snis
{"title":"\"Here is the knowledge-where should I put it?\" Findings from a study of how knowledge spaces are used within a support group","authors":"P. Carstensen, U. Snis","doi":"10.1109/ENABL.1999.805205","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805205","url":null,"abstract":"In order to design useful knowledge media spaces for knowledge workers it is essential that we understand the nature of the work conducted and the knowledge applied in real settings. The paper reports from a study of how a group of quality assurance specialists in the pharmaceutical industry gather, structure and distribute information and knowledge. Based on the findings, a number of overall requirements for knowledge media spaces are identified and discussed. The essential findings were that information and knowledge are created and handled in many different ways and have many different forms. The core issues of our lessons learned so far are that we carefully need to consider knowledge media spaces both in terms of communication channels and knowledge archives. Knowledge media spaces should be seen as spaces in which knowledge and information is exchanged, filed, retrieved, presented and refined by actors having different vocabulary and perspectives on the knowledge. These characteristics must be taken into account when designing TT and multimedia based knowledge media spaces.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128557757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Incremental analysis and verification of authentication protocols 对认证协议进行增量分析和验证
Takamichi Saito, Wu Wen, F. Mizoguchi
{"title":"Incremental analysis and verification of authentication protocols","authors":"Takamichi Saito, Wu Wen, F. Mizoguchi","doi":"10.1109/ENABL.1999.805199","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805199","url":null,"abstract":"This paper describes a verification system designed to assist the incremental analysis and verification of authentication protocols. The verification system consists of a logic prover, which is based on the BAN logic, and extensions that can be used to prove incrementally developed protocols. We have used this system to obtain standard proofs for most well-known authentication protocols. An example of an incrementally developed protocol, the necessary extension to the verification system, and the verification results are described to illustrate its effectiveness in helping to simplify the proof procedures and to deepen our understanding of the protocol.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124620532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Static analysis of binary code to isolate malicious behaviors 静态分析二进制代码,隔离恶意行为
J. Bergeron, M. Debbabi, M. Erhioui, Béchir Ktari
{"title":"Static analysis of binary code to isolate malicious behaviors","authors":"J. Bergeron, M. Debbabi, M. Erhioui, Béchir Ktari","doi":"10.1109/ENABL.1999.805197","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805197","url":null,"abstract":"We address the problem of static slicing on binary executables for the purposes of malicious code detection in COTS components. By operating directly on binary code without any assumption on the availability of source code, our approach is realistic and appropriate for the analysis of COTS software products. To be able to reason on such low-level code, we need a suite of program transformations that aim to get a high level imperative representation of the code. The intention is to significantly improve the analysability while preserving the original semantics. Next we apply slicing techniques to extract those code fragments that are critical from the security standpoint. Finally, these fragments are subjected to verification against behavioral specifications to statically decide whether they exhibit malicious behaviors or not.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129835952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 86
Expressing health care objects in XML 用XML表示医疗保健对象
Rachael Sokolowski
{"title":"Expressing health care objects in XML","authors":"Rachael Sokolowski","doi":"10.1109/ENABL.1999.805224","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805224","url":null,"abstract":"The patient medical record has been entirely focused on being in a form that is human readable and has ignored the requirements for machine processing. Health care information transaction standards, such as HL7 (Health Level 7) and EDI X12, have been almost entirely focused on machine interaction and have ignored the paper-based medical record. We need to reach a middle ground. Documents need to be in a form in which humans are able to locate, read and analyze and one in which machines are able to process. XML, combined with distributed object technologies has the potential to reach this middle ground; however, there are some challenges. These challenges relate to the state of clinical information in health care today.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127959437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Distributed meta data objects using RDF 使用RDF的分布式元数据对象
B. Bebee, G. Mack, Ibrahim Shafi
{"title":"Distributed meta data objects using RDF","authors":"B. Bebee, G. Mack, Ibrahim Shafi","doi":"10.1109/ENABL.1999.805222","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805222","url":null,"abstract":"Booz-Allen is helping to design and develop a Crisis Management System to provide collaborative analytical and presentation capabilities. To facilitate the distributed use of content information, content meta data is represented as C++ objects and operated upon using CORBA interfaces. Requiring that such applications implement CORBA interfaces to access meta data objects proved to be a barrier to integrating other applications with the system. Using the XML-based Resource Description Framework (RDF), a representation of the meta data was developed. This representation eases integration difficulties and facilitates more flexible usage of meta data by components and applications. This paper presents the development of a browser-based application used to evaluate the usability of distributed meta data objects represented in RDF. It describes the rationale behind using RDF as the meta data representation. The development of the application has proven the viability of using RDF to represent meta data.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128776434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure and efficient schemes to entrust the use of private keys 安全有效的私钥委托使用方案
K. Shin
{"title":"Secure and efficient schemes to entrust the use of private keys","authors":"K. Shin","doi":"10.1109/ENABL.1999.805195","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805195","url":null,"abstract":"This paper presents a practical method which enables an owner of a private key to entrust the use of the key to an entrustee without exposing the actual key. The following are features of the method: it covers a wide variety of existing public-key cryptographic algorithms; it provides the owner of the private key with a means of preventing the entrustee from abusing the entrusted key beyond the limits which the key owner arbitrarily specifies; it only adds a very small, usually negligible, amount of overhead to calculations required in the base public-key cryptographic algorithm. An outline of our method is as follows. An owner of a private key issues to an entrustee data called a ticket through the cooperation of a trusted third party. With the ticket, the entrustee can execute calculations, which yield the same results as those using the actual private key do.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114833051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XML and objects-the future of the e-forms on the Web XML和对象——Web上电子表单的未来
Anders Tornqvist, Chris Nelson, M. Johnsson
{"title":"XML and objects-the future of the e-forms on the Web","authors":"Anders Tornqvist, Chris Nelson, M. Johnsson","doi":"10.1109/ENABL.1999.807068","DOIUrl":"https://doi.org/10.1109/ENABL.1999.807068","url":null,"abstract":"Many organisations are using the Web for electronic commerce or purely for the collection and dissemination of information based on forms and tables. For many of these organisations a bespoke Web design with specialised Java Script is what they want. However, for organisations not wishing to make this investment, a flexible system based on a standard XML DTD could fit the bill. Fully functional e-forms can be prepared and maintained for a fraction of the price of a bespoke Web design. Based on a combination of the knowledge of the real meaning of data and metadata, XML and the Web, and object oriented technology, there is a new way to develop e-forms and to integrate them with applications.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Augmenting cooperative settings by shared awareness spaces 通过共享感知空间增强合作设置
E. Meier, W. Prinz, W. Broll
{"title":"Augmenting cooperative settings by shared awareness spaces","authors":"E. Meier, W. Prinz, W. Broll","doi":"10.1109/ENABL.1999.805180","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805180","url":null,"abstract":"The provision of awareness on the status of cooperative work is an essential prerequisite for the successful application of groupware systems. This paper describes NESSIE, an application-independent awareness infrastructure that is based on Internet technologies. After outlining the system architecture, we illustrate how different presentation methods can be used to enhance a user's physical working environment by awareness displays. Special attention is paid to the integration of NESSIE with a multi-user 3D environment to create shared awareness spaces. These spaces illustrate the activities of a cooperative environment in a symbolic way to provide a quick and intuitive impression of the current workgroup's situation to the user.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126367954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Active hypertext for distributed Web applications 用于分布式Web应用程序的活动超文本
Eckhart Köppen, G. Neumann
{"title":"Active hypertext for distributed Web applications","authors":"Eckhart Köppen, G. Neumann","doi":"10.1109/ENABL.1999.805216","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805216","url":null,"abstract":"The prevailing architecture for Web-based applications relies on HTML, HTTP and loosely integrated functional elements, propagating a strong distinction between client and server. The proposed approach for active hypertext documents however realizes applications through hypertext documents with embedded application logic. Furthermore, the need for separating the approach into a model, a development method and supporting tools is identified. The core model is based on open standards such as XML and CSS. It is extended by idioms which describe important concepts and reusable constructs. Examples for the application of the model are given.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122308490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信