{"title":"Providing secure environments for untrusted network applications-with case studies using VirtualVault and Trusted Sendmail Proxy","authors":"Qun Zhong","doi":"10.1109/ENABL.1997.630826","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630826","url":null,"abstract":"Bugs in network application programs can be exploited to compromise the system on which the application is running. When running these applications in an unsafe environment such as the Internet, the security concerns raised are a significant barrier to electronic commerce. In addition, these application programs (such as Web servers, mailservers, etc.) are usually too big and complex to be bug-free; trying to build security directly into these applications has proven to be very difficult. This paper demonstrates that a compartmented-mode workstation is a suitable platform to provide a secure environment that can contain most existing network applications. We describe how to wrap these applications in order to reduce the potential for a security breach without the need to rewrite the application completely. By minimizing the effort of transferring unsafe application services so that they are reasonably secure, we are able to accelerate the process of electronic commerce.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120948344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Maximising concurrency and scalability in a consistent, causal, distributed virtual reality system, whilst minimising the effect of network delays","authors":"D. Roberts, P. Sharkey","doi":"10.1109/ENABL.1997.630808","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630808","url":null,"abstract":"The development of large scale virtual reality and simulation systems have been mostly driven by the DIS and HLA standards community. A number of issues are coming to light about the applicability of these standards, in their present state, to the support of general multi-user VR systems. This paper pinpoints four issues that must be readdressed before large scale virtual reality systems become accessible to a larger commercial and public domain: a reduction in the effects of network delays; scalable causal event delivery; update control; and scalable reliable communication. Each of these issues is tackled through a common theme of combining wall clock and causal time-related entity behaviour, knowledge of network delays and prediction of entity behaviour, that together overcome many of the effects of network delays.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"568 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122930805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to integrate mobile agents into Web servers","authors":"S. Funfrocken","doi":"10.1109/ENABL.1997.630797","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630797","url":null,"abstract":"Mobile agents are a new paradigm for communication and cooperation in distributed computing. To combine the new paradigm with the promising World Wide Web platform, we integrated mobile agents into Web Servers. In this way, mobile agents may travel from Web server to Web server to access their local data. The paper describes how we integrated mobile agents support into a Web server. We present the state of implementation, and we give an outlook on our future work.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130547771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process-centered environments for Web-based instructional modules","authors":"H. Ammar, A. Mohammad, O. Abdalla, K. Srinivas","doi":"10.1109/ENABL.1997.630835","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630835","url":null,"abstract":"Given the substantial development effort internationally to extend the Web as the basic interface for distributed information systems, it is appropriate to adopt the Web technologies as the primary user interface and primary server interface for computer-delivered educational modules. The Web interface gives, a coherent and standard framework for integration of visual, audio, and text information, and for moving among elements of the educational module (local or remote). The process of developing Web-based educational modules for distance learning, often requires significant investment of time and efforts. This is sometimes hampered by a lack of resources and tools to support embedding of graphics, voice, and video clips. This paper surveys the current state of the art of Web-based instruction and presents a process model for a process-centered environment for generating Web-based course lectures. The tools surveyed include ClassNet, a tool developed at Iowa State University for managing Internet class activities, and WebCT, a tool developed at the University of British Colombia which facilitates the creation of integrated Web-base educational environments.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126501781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Working group report on Internet/intranet security","authors":"Barbara C. Davis, Tatu Ylönen","doi":"10.1109/ENABL.1997.630830","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630830","url":null,"abstract":"The Internet/Intranet Security Working Group's discussions focused on the various models for key recovery and/or key backup. Opinions were given on the types of fault tolerance (redundant paths to keys) that should be provided. The discussion invariably focused on the side-effect of key backup, which is the opening of the door to key escrow and law enforcement. Security within the Internet/intranet environment continues to be a rapid growth area. In the past year, many more security solutions have become available. The integration of security into an enterprise continues to be a balancing act between the costs of the security implementation and the value of the data that is being protected. What continues to be a goal is the development of an information infrastructure that incorporates and supports security functionality. Without this infrastructure, there can be no real secure communications outside of an enterprise.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126015052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a public key infrastructure across multiple enterprises","authors":"B. J. Desind, T. Sharick, J. P. Long, B. J. Wood","doi":"10.1109/ENABL.1997.630817","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630817","url":null,"abstract":"Main-stream applications are beginning to incorporate public key cryptography. It can be difficult to deploy this technology without a robust infrastructure to support it. It can also be difficult to deploy a public key infrastructure among multiple enterprises when different applications and standards must be supported. This discussion chronicles the efforts by a team within the US Department of Energy's Nuclear Weapons Complex to build a public key infrastructure and deploy applications that use it. The emphasis of this paper is on the lessons learned during this effort and an assessment of the overall impact of this technology.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"52 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131472458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WebVector: agents with URLs","authors":"Ted Goddard, V. Sunderam","doi":"10.1109/ENABL.1997.630798","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630798","url":null,"abstract":"Emerging web applications demand considerable network resources and, especially in science and engineering, considerable computational resources. The use of agents can eliminate bottlenecks in both areas, provided that their methods of computation and communication are not overly restricted. WebVector is an agent system that combines a flexible communication model with URL-based agent identification. Within this framework, resources can be centralized to support the current web-browser security model or distributed for efficiency. Interfacing with existing software can be as simple as adding a hyperlink to a file. We concentrate on cooperative applications: uploadable active resources, flexible multicast for maintaining shared-space state, and a variety of applications from distributed computation.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132997194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A product information system based on an object-oriented Internet database system","authors":"Adrian Kobler, M. Norrie","doi":"10.1109/ENABL.1997.630788","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630788","url":null,"abstract":"Presents a product information system which supports enterprise-wide access to product structure data through the World Wide Web (WWW). This information system provides ready access to data on products, their structures, variants and configurations. To meet the needs of various enterprises and types of user, the system is based on a product data model which is both flexible and extensible. The system has been implemented using the OMS (Object Management System) object-oriented database management system and its generic WWW interface.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126196519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Working group report on information infrastructure for global and virtual enterprises","authors":"P. Bertók, M. Mäntylä, J. McGovern, G. Fernandez","doi":"10.1109/ENABL.1997.630791","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630791","url":null,"abstract":"Studies IT-based methods and tools to facilitate cooperation between people working at different locations in heterogeneous environments. Several important issues related to virtual enterprises are discussed, and contributions to their resolution offered. The issues covered include: geographical distance; dynamic properties; knowledge capture and sharing; conflict management; formal verification; scalability and extendibility; and security.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124727546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research issues in developing networked virtual realities: working group report on distributed system aspects of sharing a virtual reality","authors":"M. Capps, P. D. Stotts","doi":"10.1109/ENABL.1997.630815","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630815","url":null,"abstract":"This is a report on the proceedings of the \"Distributed System Aspects of Sharing a Virtual Reality\" workshop at the 6/sup th/ WET-ICE Conference held June 18-20, 1997. The workshop's discussions focused on the research issues in the field of networked virtual reality, as well as the current methods used to address those issues. In those areas where the state of the art was felt to be lacking, we additionally report on the most promising technologies that the near future holds.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}