Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)最新文献

筛选
英文 中文
Timestamps: main issues on their use and implementation 时间戳:它们的使用和实现的主要问题
H. Massias, X. S. Avila, J. Quisquater
{"title":"Timestamps: main issues on their use and implementation","authors":"H. Massias, X. S. Avila, J. Quisquater","doi":"10.1109/ENABL.1999.805196","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805196","url":null,"abstract":"This paper discusses some of the issues that appear on the creation and use of secure digital timestamps. From the timestamp creation side, it first introduces a review of the existing systems, giving a recommendation for the one we believe is more suitable for the general use. Afterwards, it deals with an extension of the basic scheme in order to be used in the enterprise environments. Finally, it discusses the general scalability problem, analyzing an existing system and proposing a more adequate solution. From the timestamp use side, it discusses one of the possible misuses and it proposes a solution to secure it.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124836389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Coordinating open-source software development 协调开源软件开发
Davor Cubranic, K. Booth
{"title":"Coordinating open-source software development","authors":"Davor Cubranic, K. Booth","doi":"10.1109/ENABL.1999.805176","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805176","url":null,"abstract":"Open-source software (OSS) projects are arguably the quintessential example of distributed software development, with their openness to a large pool of world-wide contributors and their loose organizational structure. To cope with the demands which this openness and fluidity place on the development process, open-source projects have evolved their own methods and organization. This paper looks at the ways some of the major and most successful OSS projects deal with the issue of coordination among their many contributors. Although each of the projects examined in this paper developed some unique practices, there are also significant commonalities. The paper then goes on to indicate some of the problems caused by the existing practices and puts forward some possible approaches to OSS coordination that could make OSS development more efficient.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"1043 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128283481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 45
Virtual Webworlds: extending the Web for collaboration 虚拟网络世界:为协作而扩展网络
C. Landauer, K. Bellman
{"title":"Virtual Webworlds: extending the Web for collaboration","authors":"C. Landauer, K. Bellman","doi":"10.1109/ENABL.1999.805181","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805181","url":null,"abstract":"Synthesizes earlier work on collaboration and virtual worlds, and proposes a new attitude about distributed heterogeneous systems that extends both the shared artifacts of the World Wide Web and the shared presence of multi-user virtual environments (MUVEs), and in addition allows the use of any user-favored tools from within the same environment. The result is no loss of diversity or heterogeneity, and we claim a great improvement in computer support for collaboration. We propose the development of a collection of virtual Webworlds (VWWs), which are both more tightly coupled sets of Web services and data, and more distributed virtual worlds.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126561647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Establishing affinity relationships toward agents: effects of sympathetic agent behaviors toward human responses 建立对主体的亲和关系:交感主体行为对人类反应的影响
Yugo Takeuchi, Y. Katagiri
{"title":"Establishing affinity relationships toward agents: effects of sympathetic agent behaviors toward human responses","authors":"Yugo Takeuchi, Y. Katagiri","doi":"10.1109/ENABL.1999.805209","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805209","url":null,"abstract":"People tend to favor the opinions of those who previously made the same decisions as theirs. We conducted an experiment to investigate the effect of sharing opinions with interface agents on subsequent human behaviors. Three agents with distinctive appearances were used in the experiment. In the first stage, several questions are posed to a subject by the Presider agent, and the Agreeable agent shows explicit agreement to all of the answers by the subject, whereas the Neutral agent doesn't show any agreement. Then, in the second stage, both the Agreeable and Neutral agents state their own opinions to a question by the Presider agent, and the subject is required to choose between the two. All possible assignments (six patterns) of the roles of Presider, Agreeable and Neutral to the three agents were included in the experiment to exclude the possibility of decisions based on subjects liking a particular agent's appearance. The Agreeable agent was consistently in favor of the subject's decisions. We examined how the subject indicates sympathetic responses to the Agreeable agent after he/she interacts with agents. The results showed that people tend to behave favorably toward opinions of agents that previously agreed with their decisions. This suggests that human-computer interaction has the same social dynamics as human-human interaction.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"1794 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127453158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Deriving a role-based access control model from the OBBAC model 从OBBAC模型导出基于角色的访问控制模型
Jean-Marie Kabasele-Tenday, J. Quisquater, Marc Lobelle
{"title":"Deriving a role-based access control model from the OBBAC model","authors":"Jean-Marie Kabasele-Tenday, J. Quisquater, Marc Lobelle","doi":"10.1109/ENABL.1999.805190","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805190","url":null,"abstract":"The object-based access control model (OBBAC), a conceptual access control model, has been proposed to deal with the high-level specification of a security policy in an object-oriented environment. This model is based on the notion of security labels which, however, are associated to operations rather than to objects as in the classic label-based access control models. It was used to specify the security policy of a distance learning system. The key issue that has arisen from the OBBAC model is the handling of security labels during the application development. The goal of the paper is to prove that there exists a mapping from an OBBAC model to a role-based access control model (RBAC) which can be used to specify the system security policy.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126700494","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Auto-erecting agents for a collaborative learning environment 用于协作学习环境的自动安装代理
F. W. Bruns, Hermann Gathmann
{"title":"Auto-erecting agents for a collaborative learning environment","authors":"F. W. Bruns, Hermann Gathmann","doi":"10.1109/ENABL.1999.805214","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805214","url":null,"abstract":"A collaborative learning environment based on 3D media with interchangeable real and virtual components is introduced. This environment is supported by a special knowledge space, which allows the accumulation of concrete haptic as well as abstract physical and logical knowledge. Firstly we present the concept of complex objects, having a real part and various virtual parts of different levels of abstraction, These complex objects allow a synchronous generation and manipulation of real systems and their virtual counterparts. The concept is then extended by a mechanism of auto-erection, enabling these objects to simulate their own potential environment. With this mechanism we are able to freely exchange real and virtual parts of a system in a distributed real learning space. This kind of learning environment is expected to support new forms of interaction, suitable for individual traditions, cultures, norms and conventions of learning styles and pre-knowledge.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Dynamic online collaborative information sharing in semantic multicast 语义组播中的动态在线协同信息共享
E. C. Shek, S. Dao, A. Vellaikal, Wensheng Zhou
{"title":"Dynamic online collaborative information sharing in semantic multicast","authors":"E. C. Shek, S. Dao, A. Vellaikal, Wensheng Zhou","doi":"10.1109/ENABL.1999.805206","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805206","url":null,"abstract":"Semantic multicast defines a large scale shared interaction infrastructure which provides a seamless environment for collecting, indexing, and disseminating the information produced in collaborative sessions to the correct users in the right amount of detail using IP multicast as the underlying data communication mechanism. A semantic multicast graph is discovered and constructed to organize user requests into a hierarchy of group requests that represents an increasingly specialized range and quality of semantic topics as one goes down the hierarchy. It establishes a logical flow of collaboration stream between interest groups. A semantic multicast graph is mapped onto a hierarchy of cooperating network content agents that gather information streams and incrementally enrich, archive and filter the streams for the semantic coverage of specific interest groups in the graph. Through this mechanism, the semantic multicast framework amortizes processing on information streams by automatically moving common operations on information streams needed to satisfy multiple user requests to content agents providing the services.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114588331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting manufacturing process analysis and trouble shooting with ACTS 支持生产工艺分析和故障解决
M. Steves, Wo Chang, Amy J. Knutilla
{"title":"Supporting manufacturing process analysis and trouble shooting with ACTS","authors":"M. Steves, Wo Chang, Amy J. Knutilla","doi":"10.1109/ENABL.1999.805187","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805187","url":null,"abstract":"This paper presents a National Institute of Standards and Technology (NIST) prototype tool called ACTS (Annotation Collaboration Tool via SMIL-Synchronized Multimedia Integrated Language), which was designed to meet the user requirements of a distributed, collaborative team performing remote analysis of robotic welds. Based on open standards such as W3C (World Wide Web Consortium) SMIL, ACTS provides a framework of temporal and spatial synchronization for multimedia data streams. An annotation facility provides for asynchronous collaboration among colleagues. ACTS uses the NIST-developed S2M2 Java applet-based SMIL player that implements and extends the SMIL 1.0 specification. Future work is also discussed.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Why enterprises need more than firewalls and intrusion detection systems 为什么企业需要的不仅仅是防火墙和入侵检测系统
M. Vandenwauver, J. Claessens, Wim Moreau, Calin Vaduva, R. Maier
{"title":"Why enterprises need more than firewalls and intrusion detection systems","authors":"M. Vandenwauver, J. Claessens, Wim Moreau, Calin Vaduva, R. Maier","doi":"10.1109/ENABL.1999.805191","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805191","url":null,"abstract":"At the approach of the next millenium, enterprises are facing a lot of challenges and have to decide in which direction their communication networks will evolve. At the moment we see a large shift towards using global intranets and extranets. Most of the time it is also necessary to connect these networks to the Internet. During the consultancy work we provided in this area we concluded that although there are good tools available to protect these intranets from external attackers, perfect security could not be obtained. Therefore we started the TACK project to illustrate this by working out attacks that could be launched at any intranet. In these attacks we use the technology that is on the one hand rendering the Internet extremely successful but on the other hand facilitates the work for attackers. This paper summarizes the results of this project. We conclude that fundamentally no intranet can be made completely secure.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130070456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Establishing a secure multicast group for remote software delivery 建立安全组播组,用于软件的远程交付
Lin Han, N. Shahmehri
{"title":"Establishing a secure multicast group for remote software delivery","authors":"Lin Han, N. Shahmehri","doi":"10.1109/ENABL.1999.805200","DOIUrl":"https://doi.org/10.1109/ENABL.1999.805200","url":null,"abstract":"The development of IP multicast provides an efficient way for data distribution. Applying this technique to delivering software remotely can save a lot of money. Thus, there is a high demand for such a new service that uses multicast to distribute software securely and reliably. Usually, two phases exist in software delivery, group establishment and data transfer. We focus on the multicast group establishment phase. We introduce an agent-based group management system. This system is responsible for authentication and authorization to establish a secure group which demands that only authorized recipients should join the transmission group. The paper presents an overview of the system and describes an interface to end-users.","PeriodicalId":287840,"journal":{"name":"Proceedings. IEEE 8th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE'99)","volume":" 83","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信