{"title":"A framework to integrate synchronous and asynchronous collaboration","authors":"S. Li, A. Hopper","doi":"10.1109/ENABL.1998.725678","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725678","url":null,"abstract":"For the last decade, the research in CSCW (computer supported cooperative work) has been focusing on synchronous collaboration, which requires the participants involved in common tasks to remotely share computer display workspaces simultaneously without leaving their workplaces. However, to support truly global cooperative work, asynchronous collaboration is equally prominent, in order to accommodate the participants who may not be available for the synchronous CSCW session. These participating individuals, whether working synchronously or asynchronously, may be mobile and may have to connect to and disconnect from the session repeatedly with ubiquitous systems. We describe a framework for asynchronous as well as synchronous collaboration. The framework provides facilities to transfer the screen images or frame buffers of the ongoing CSCW session to remote users, allowing the available participants to share the view and the control of the session simultaneously, and to record the screen images or frame buffers for the absent participants to retrieve and playback the session at a later stage with VCR-like control (i.e. fast forward, rewind play and stop). The frame buffers are transferred and recorded in units of rectangles containing pixel values of the screen images. These rectangles are platform independent and can be dynamically directed to and displayed by heterogeneous systems such as X Windows or Windows NT, or by Web browser such as Netscape.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The problem with multiple roots in Web browsers-certificate masquerading","authors":"James M. Hayes","doi":"10.1109/ENABL.1998.725710","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725710","url":null,"abstract":"Much work is going into securing the public key infrastructure (PKI). Various models for trust exist; Pretty Good Privacy (PGP) and the Progressive-Constraint Trust model are examples. These models describe how to protect and ensure the interrelationships of their certificate based structures; however, vulnerabilities may arise when structures based on certificate authorities (CAs) are involved. The vulnerability is based upon multiple root certificate authorities. The paper examines the need for improved methods for verifying the binding of a certificate authority (root) to the source of a protocol's messages. The protection mechanisms developed for protecting and ensuring this binding within a CA hierarchy can break down in environments where multiple roots exist. This can lead to the possibility of a CA undermining the trust placed in a peer CA.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130346132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"\"Cooperative security\": a model for the new enterprise","authors":"Barbara Fox, Brian A. LaMacchia","doi":"10.1109/ENABL.1998.725711","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725711","url":null,"abstract":"Enterprise security solutions no longer come \"one-size-fits-all.\" The prospect of universal and virtually free connectivity via the Internet is driving a profound change in the business requirements for any enterprise-wide security architecture. The authors introduce the concept of \"cooperative\" security-an amalgam of shared and public key systems-and its application in the design of Windows NT 5. The core principle behind this new way of looking at security is that clients, servers, and administrators must adapt and play different roles in the evaluation of trust decisions based on changing security contexts.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121043798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Working Group Report On Coordinating Distributed Software Development Projects","authors":"Harald Holz, S. Goldmann, F. Maurer","doi":"10.1109/ENABL.1998.725674","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725674","url":null,"abstract":"This paper summarizes the work presented at the WETICE '98 workshop on \"Coordinating Distributed Software Development Projects\" as well as the ensuing discussions that arose in the course of the workshop.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132418520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authorization and attribute certificates for widely distributed access control","authors":"W. Johnston, Srilekha Mudumbai, M. Thompson","doi":"10.1109/ENABL.1998.725715","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725715","url":null,"abstract":"The authors describe a system whose purpose is to explore the use of certificates for the distributed management of access rights for resources that have multiple, independent, and geographically dispersed stakeholders. The stakeholders assert their use-conditions in authorization certificates and designate those trusted to attest to the corresponding attributes. These use-conditions implicitly define access groups through their requirement for certain attributes. All use-conditions must be satisfied simultaneously, so the actual access group is the intersection of all of the groups. A policy engine collects the use-condition certificates and attribute certificates when a user attempts to access a particular resource. If all of the use-conditions are met, a capability is generated for the resource. The policy engine can provide several different policy models depending on whether any relationship is established among the use-conditions. The system architecture and implementation is described, together with some of the identified strengths, weaknesses, and vulnerabilities.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"965 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132520024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Annotate! a tool for collaborative information retrieval","authors":"Mark Ginsburg","doi":"10.1109/ENABL.1998.725675","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725675","url":null,"abstract":"Difficulties with Web based full text information retrieval (IR) systems include spurious matches, manually intensive document sifting, and the absence of communication or coordination between users. To address these difficulties, we introduce the Annotate! system which enables document annotations, and captures global usage history. Annotate! provides improved data and metadata clues to guide the user in a search session. Two data sets, declared in XML, are at the core of Annotate!: discussion data, a composite of documents and user annotations and session data which captures user timings at the various interface layers. We discuss a prototype implementation, and show that the collaborative infrastructure enabled by Annotate! can be predicted to improve the diffusion of ideas in the search community.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131515693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Internet based software process support","authors":"F. Maurer, Barbara Dellen","doi":"10.1109/ENABL.1998.725664","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725664","url":null,"abstract":"The paper presents a process oriented view on knowledge management in software development. We describe requirements on process support systems for globally distributed software development projects, introduce the process modeling language MILOS, and an enactment environment based on it.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124105451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lorenzo Bettini, R. Nicola, R. Pugliese, G. Ferrari
{"title":"Interactive mobile agents in X-KLAIM","authors":"Lorenzo Bettini, R. Nicola, R. Pugliese, G. Ferrari","doi":"10.1109/ENABL.1998.725680","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725680","url":null,"abstract":"Mobile agents are processes which can migrate and execute on new hosts. Mobility is a key concept for network programming; it has stimulated much research about new programming languages and paradigms. X-KLAIM is an experimental programming language, inspired by the Linda paradigm, where mobile agents and their interaction strategies can be naturally programmed. A prototype implementation of X-KLAIM is presented, together with a few examples introducing the new programming style.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129139856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A public key encryption system for defective data transmission","authors":"Raoul Naujoks, M. Gustafsson","doi":"10.1109/ENABL.1998.725716","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725716","url":null,"abstract":"The paper describes an encryption system developed in a project oriented study course in the fall of 1997 at Linkoping University, Sweden. The course assignment was to develop a short-range wireless communications system for simplex transmission of video data, e.g. from a surveillance camera. The encryption system was part of this system. Radio sender and receiver hardware were provided while software was developed on Sun Sparc computers. The goal was to create a system capable of continuous real time operation. Requirements were that the communications channel should provide confidentiality as well as authenticity of the video data, thus requiring cryptography. The main challenge was to design an encryption system that propagates as few errors as possible which are introduced by radio transmission. The developed encryption system uses RSA for encrypting session keys and an alternating stop-and-go stream cipher for bulk data encryption.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128435478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web-based groupware support for knowledge creation and competitive advantage","authors":"S. Sipcic, Z. Makonnen","doi":"10.1109/ENABL.1998.725687","DOIUrl":"https://doi.org/10.1109/ENABL.1998.725687","url":null,"abstract":"Companies that operate in extremely volatile markets are often confronted with the challenge of a very narrow window of opportunity for developing and commercializing new products. Not only must these companies have a very short time-to-market, but they must also utilize all available information to create and maintain a competitive advantage. Today, success in gaining and maintaining a competitive advantage increasingly results from having the right knowledge, in the right place, and at the right time. Knowledge management is recognized as the single most important factor in differentiating one company from another. The emerging technologies called \"groupware\" combined with the power of current computers and networks provide the technical foundation for knowledge management. The paper discusses a next generation, Web based knowledge management system designed by RWD Technologies, Inc. to help a Fortune 100 company face the challenges of dynamic markets. The system ties product development processes with communication, database, and knowledge management technology to provide the client with an infrastructure for the deployment of better products into the market faster than its competitors.","PeriodicalId":321059,"journal":{"name":"Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129976192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}