{"title":"A Web-based collaborative design modeling environment","authors":"Gun-Dong F. Pahng, Seockhoon Bae, D. Wallace","doi":"10.1109/ENABL.1998.725688","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725688","url":null,"abstract":"The paper presents an open product development environment for distributed, collaborative, and integrated design. The Web based framework, called DOME, allows designers to build integrated models using both local and distributed resources, and to collaborate by exchanging services in a network centric environment. An integrated model can be created while each participant focuses on their own area of expertise. A design problem model is created by connecting modules, each of which can represent specific components, analysis capabilities/software, disciplines, or organizations relevant to the problem. The resulting module network forms a concurrent model in which changes propagate through service exchanges. A Java applet based user interface provides cross-platform and distributed user access to DOME module servers throughout the network.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131608001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From gophers to ants-a case for mobile agent families","authors":"Jörn Hartroth","doi":"10.1109/ENABL.1998.725696","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725696","url":null,"abstract":"Mobile agents can be used to minimize network traffic for distributed applications through the execution of specialized selection and concentration functions in the location of remote information providers. So far, this optimization potential has only been studied in small-scale scenarios. In view of an envisioned application field in a global electronic information space, the issue of scalability to very large-scale scenarios has to be addressed. Analysis results presented indicate that the popular multi-hop agent approach does not scale in communication costs for large sets of information providers. This paper proposes a new approach based on families of one-hop mobile agents which is shown to scale, and discusses design issues for the required runtime support. Additional motivations for the one-hop schema are discovered in the fields of group communication protocols, network monitoring and agent security.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129250994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. Claessens, M. Vandenwauver, B. Preneel, J. Vandewalle
{"title":"Setting up a secure Web server and clients on an intranet","authors":"J. Claessens, M. Vandenwauver, B. Preneel, J. Vandewalle","doi":"10.1109/ENABL.1998.725708","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725708","url":null,"abstract":"The paper discusses the practical issues that arise when securing the access to the World Wide Web (WWW). A brief overview of the different protocols that are proposed to secure the WWW is given and the current status of the U.S. export regulations is reviewed. An attack on SSL 2.0 is detailed which exploits some of the weaknesses in this protocol. The setup of a secure server with access control is explained. At the client side, existing solutions to provide export browsers with strong cryptography are evaluated, and the authors also introduce some improvements. Finally, the performance of the secure system is evaluated and compared to that of the regular HTTP connection.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125257573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WebGroup: a secure group access control tool for the World-Wide Web","authors":"F. Petitcolas, Kan Zhang","doi":"10.1109/ENABL.1998.725709","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725709","url":null,"abstract":"The authors present an integrated secure group access control tool to support workgroups on the World-Wide Web. The system enables user authentication, encrypted communication and fine-grained group access control. The tool comprises two proxies: one running on the server side and the other one on the client side. Typically the browser sends a query to the client side proxy which contacts the server side proxy for authentication, session key exchange and checking of access rights. The server side proxy finally forwards the request to the HTTP server. The tool is completely transparent to the user and compatible with any Web server and browser. It can also become part of a firewall configuration.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127017014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A protocol for billing mobile network access devices operating in foreign networks","authors":"Wei-lung Wang, Chun-Wei Wu","doi":"10.1109/ENABL.1998.725703","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725703","url":null,"abstract":"Mobile computing is becoming pervasive, and with it comes the demand for unfettered network access for mobile users. Currently, mobile network access is provided by a relatively small number of service providers, in part due to the high costs of operating wireless network systems and the accompanying \"backbone\" architectures. Mobile users have to establish proprietary billing arrangements with their service providers, and are limited to using the wireless networks run by their service provider. The existence of the Internet as the baseline network backbone with its unifying TCP/IP architecture, and the advances in low cost wireless network technology allows for a new means of wireless network access for mobile users. Small scale service providers can simply install low cost wireless network base stations and plug them into the Internet, providing network access to any willing mobile user. The low barriers to entry makes it likely that there will be a large number of service providers. A non-proprietary billing protocol used among these service providers will allow mobile users to use any service provider's network. This leads to better wireless coverage for the mobile user. The authors propose one such protocol. This protocol may be implemented as an extension to the Mobile IP protocol, as they share certain similarities in their execution. This would spur its deployment as Mobile IP is an open standard that will likely be used by mobile users.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workgroup middleware for distributed projects","authors":"G. Kaiser, S. Dossick","doi":"10.1109/ENABL.1998.725673","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725673","url":null,"abstract":"We have developed a middleware framework for workgroup environments that can support distributed software development and a variety of other application domains requiring document management and change management for distributed projects. The framework enables hypermedia based integration of arbitrary legacy and new information resources available via a range of protocols, nor necessarily known in advance to us as the general framework developers not even to the environment instance designers. The repositories in which such information resides may be dispersed across the Internet and/or an organizational intranet. The framework also permits a range of client models for user and tool interaction, and applies an extensible suite of collaboration services, including but not limited to multi-participant workflow and coordination, to their information retrievals and updates. That is, the framework is interposed between clients, services and repositories thus \"middleware\". We explain how our framework makes it easy to realize a comprehensive collection of workgroup and workflow features we culled from a requirements survey conducted by NASA.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133321253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of an intranet security infrastructure and its application","authors":"Yung-Kao Hsu","doi":"10.1109/ENABL.1998.725714","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725714","url":null,"abstract":"As the support for X.509 digital certificate standardized in most Web browsers and servers, public-key cryptography is emerging as the security solution for both Internet and intranet applications. The paper describes the security infrastructure and solutions implemented for supporting AT&T long-distance network maintenance. This public-key infrastructure implements the short-lived certificate framework to reduce the cost associated with public-key management. The infrastructure supports a certification group concept that allows individual operation units within an organization to tailor their certification policies. This solution minimizes the changes needed for migrating existing applications to the SSI authentication framework.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129738757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Ashley, M. Vandenwauver, Mark Rutherford, Seb Boving
{"title":"Using SESAME's GSS-API to add security to Unix applications","authors":"P. Ashley, M. Vandenwauver, Mark Rutherford, Seb Boving","doi":"10.1109/ENABL.1998.725718","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725718","url":null,"abstract":"SESAME is a security architecture that starts from the Kerberos protocol and adds to it public-key based authentication, role based access control, delegation of rights and an extensive auditing facility. SESAME provides the GSS-API for securing applications and the paper describes the authors' efforts in securing some of the most important Unix applications using SESAME: telnet, the BSD rtools and the remote procedure call. They have found the benefit of using SESAME is that the applications are secured in a uniform manner, additional security services are provided to the applications that are unavailable with other architectures, and the impact of SESAME on the application performance is not excessive.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"28 9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114312325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Working group report on Web-based infrastructures for collaborative enterprises: ready for a second generation?","authors":"W. Conen, G. Neumann","doi":"10.1109/ENABL.1998.725695","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725695","url":null,"abstract":"This report of the working group summarizes the discussions and the common understanding of the active participants of the workshop. The goal of this workshop was to bring together leading researchers with different scientific backgrounds and different understandings of what the most interesting aspects or problems in the area of collaboration are, and to develop a broadening understanding of what collaboration is about. Of course the workshop did not try to address collaboration per se, but tried to focus on collaboration via the Web and to explore the limits of the current infrastructure in respect to collaboration.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116751521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Tolksdorf, P. Ciancarini, Mark Ginsburg, J. Hummes, W. C. Jamison
{"title":"Working Group Report On Coordination Architectures For Distributed Web Applications","authors":"R. Tolksdorf, P. Ciancarini, Mark Ginsburg, J. Hummes, W. C. Jamison","doi":"10.1109/ENABL.1998.725686","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725686","url":null,"abstract":"The WETICE Workshop on Coordination Architectures for Distributed Web Applications followed up to two WETICE workshops in 1996 and 1997 that dealt with coordination issues in the context of Web-agents ([2] [1]). It brought together nearly twenty professionals; of these, about one third had industrial affiliations, whereas most originated from academia. The workshop program consisted of technical presentations plus discussions, for which about equal time was allocated. The workshop organizers, Paolo Ciancarini and Robert Tolksdorf, received 24 submissions of papers in response to the call for papers. 11 of those were selected for publications in this proceedings. The following researchers reviewed the papers as a program committee: Farhad Arbab (CWI), Valerie Issarny (IRISA/INRIA), Edwin de Jong (Signaal), Matthias Klusch (CMU), Kurt Rothermel (Universitat Stuttgart), Paul Tarau (Universite de Moncton), Christian F. Tschudin (ICSI), and Alan Wood (University of York). The workshop organizers are indebted to their professional expertise which helped to make the workshop a success. The topics of the workshop were grouped around the Web. As the dominating platform for distributed collaborative applications, it has evolved from a static hypermedia system into a collection of services provided at different levels. Support infrastructures have to be provided in order to realize applications from these services. New ideas for collaborative applications on the Web have to be explored and tested. Of central interest within infrastructures are coordination mechanisms used in realizing distributedand concurrent services. In addition, infrastructure services have to address","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114983687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}