Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises最新文献

筛选
英文 中文
Developing social virtual worlds using NetEffect 使用neteeffect开发社交虚拟世界
T. Das, Gurminder Singh, A. Mitchell, P. S. Kumar, K. McGee
{"title":"Developing social virtual worlds using NetEffect","authors":"T. Das, Gurminder Singh, A. Mitchell, P. S. Kumar, K. McGee","doi":"10.1109/ENABL.1997.630806","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630806","url":null,"abstract":"This paper describes NetEffect, an infrastructure for developing, supporting, and managing large, media-rich, 3-D social virtual worlds for use by several thousand geographically-dispersed users using low-end computers (PCs) and modems. It has been modularized into six components, in the form of a toolkit, which simplifies the development of network-based virtual worlds. NetEffect partitions a whole virtual world into communities, allocates these communities among a set of servers, and migrates clients from one server to another as clients move through the communities. It devotes special attention to minimizing the network traffic, particularly the traffic that must go through servers. HistoryCity, a virtual world for children, has been developed on NetEffect, which is being beta-tested for deployment in Singapore.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127036260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Using NFS to implement role-based access control 使用NFS实现基于角色的访问控制
M. Gustafsson, Benoit Deligny, N. Shahmehri
{"title":"Using NFS to implement role-based access control","authors":"M. Gustafsson, Benoit Deligny, N. Shahmehri","doi":"10.1109/ENABL.1997.630829","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630829","url":null,"abstract":"Presents a design for a modified NFS (Network File System) server that, through simple additions, makes it possible to place an exported file system under role-based access control (RBAC). RBAC is an efficient way for managing access control information. However, most access control systems today do not support RBAC. As a solution to this problem, the modified NFS server we present in this paper makes it possible to introduce RBAC into existing environments in a transparent manner. We have implemented our design as an extension to the Linux User Space NFS Server running on a Linux 2.0 system. Our implementation demonstrates the feasibility of our main idea. However, tests show that performance of our server needs to be improved, something we believe can be achieved through code optimizations.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132910950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Enterprise security applications of partition rule based access control (PRBAC) 基于分区规则访问控制(PRBAC)的企业安全应用
Marta Teresa Acevedo, D. Fillingham, John Lucas Nicolettos
{"title":"Enterprise security applications of partition rule based access control (PRBAC)","authors":"Marta Teresa Acevedo, D. Fillingham, John Lucas Nicolettos","doi":"10.1109/ENABL.1997.630827","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630827","url":null,"abstract":"As commercial enterprises increase their dependency on electronically managed information and compete in global markets, the misuse or loss of enterprise information can cause significant damage to the economic well-being of an enterprise as well as the nation. This paper draws parallels between military and business enterprise access control needs and examines partition rule-based access control (PRBAC) as a potential technology solution to the needs of both communities. PRBAC is an access control technology that allows a user to have access to information as a function of the sensitivity of the information and individual authorizations, based on a user-defined security policy. A user gains access to information as a result of an access control decision which compares sensitivities conveyed in data security labels to authorizations conveyed in user public-key certificates.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130301712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Workshop On Collaborative Agents In Distributed Web Applications 分布式Web应用中的协同代理研讨会
R. Tolksdorf
{"title":"Workshop On Collaborative Agents In Distributed Web Applications","authors":"R. Tolksdorf","doi":"10.1109/ENABL.1997.630792","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630792","url":null,"abstract":"","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128921733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Workshop On Information Infrastructure For Global And Virtual Environments 全球和虚拟环境信息基础设施研讨会
P. Bertók
{"title":"Workshop On Information Infrastructure For Global And Virtual Environments","authors":"P. Bertók","doi":"10.1109/ENABL.1997.630781","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630781","url":null,"abstract":"","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123186097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Workshop On Enterprise Security 企业保安工作坊
Y. Al-Salqan
{"title":"Workshop On Enterprise Security","authors":"Y. Al-Salqan","doi":"10.1109/WETICE.1996.10018","DOIUrl":"https://doi.org/10.1109/WETICE.1996.10018","url":null,"abstract":"Internet/intranet security has witnessed an explosive and exciting growth in the past two years. Under the surface of the excitement lies a mine of technical and commercial challenges, and without solving these challenges, secure systems will not reach their expected potential. There are many securityand cryptography-related conferences held in which mostly theoretical or commercial promotion topics are discussed. The Enterprise Security Workshop, however, focuses on the total challenge of building complete end-to-end security in an enterprise. This includes building the secure infrastructure on top of which the secure applications flourish. Specific emphasis in this year’s workshop was placed on the security effort of the Internet Engineering Task Force (IEFT). The best two papers of this workshop will be published in the IEEE Internet Computing Journal.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133859580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure collaboration technology for healthcare enterprises 用于医疗保健企业的安全协作技术
R. Raman, V. Jagannathan, Y. Reddy
{"title":"Secure collaboration technology for healthcare enterprises","authors":"R. Raman, V. Jagannathan, Y. Reddy","doi":"10.1109/ENABL.1997.630824","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630824","url":null,"abstract":"Healthcare organizations have a legacy of relatively isolated vendor-proprietary departmental systems. The cost of integrating disparate healthcare systems is a significant barrier to collaborative endeavors such as telemedicine. Recent legislative measures for the protection of healthcare information place significant responsibilities on healthcare organizations to ensure that their healthcare systems and information technology practices adequately protect the privacy of healthcare information in their charge. The authors, who are developing secure telemedicine applications, identify some of these hurdles and discuss their approach to enable healthcare organizations to engage in collaborative healthcare activities.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133680539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distance skill learning with special attention paid to the nonverbal aspect 远程技能学习特别关注非语言方面
S. Fukuda, Y. Matsuura
{"title":"Distance skill learning with special attention paid to the nonverbal aspect","authors":"S. Fukuda, Y. Matsuura","doi":"10.1109/ENABL.1997.630838","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630838","url":null,"abstract":"Nonverbal communication plays a very important role especially in the Asian countries. But most of the conventional systems developed so far are oriented toward verbal or text based communications and even if they permit tranfer of motional images, it is still very difficult for a teacher and a student to share the perspective and points of focus because motional images are not well structured and codified. The nonverbal communication is very important, too, in that it is closely associated with manufacturing. The importance of motional skill in manufacturing cannot be overemphasized. For example, if we consider assembly or other manufacturing processes, and wish to integrate them with design, the intelligent coding of these processes is a prerequisite. We developed a prototype system with an illustrative example of skill learning penmanship. The motion or movement of a student's pen is checked against the standard motion data of a teacher in terms of the tip location and tilt of a pen by measuring these data in 3 D using Fastrk and warnings and guidance are given in the form of sounds. The experiments show the effectiveness of the approach, although there are still many problems to be solved in the future. We also developed a client/server system to fully utilize the advantage of the present approach.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132685639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Extended password key exchange protocols immune to dictionary attack 扩展密码密钥交换协议不受字典攻击
David P. Jablon
{"title":"Extended password key exchange protocols immune to dictionary attack","authors":"David P. Jablon","doi":"10.1109/ENABL.1997.630822","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630822","url":null,"abstract":"Strong password methods verify even small passwords over a network without additional stored keys or certificates with the user, and without fear of network dictionary attack. We describe a new extension to further limit exposure to theft of a stored password-verifier, and apply it to several protocols including the Simple Password Exponential Key Exchange (SPEKE). Alice proves knowledge of a password C to Bob, who has a stored verifier S, where S=g/sup C/ mod p. They perform a SPEKE exchange based on the shared secret S to derive ephemeral shared key K/sub 1/. Bob chooses a random X and sends g/sup X/ mod p. Alice computes K=g/sup XC/ mod p, and proves knowledge of {K/sub 1/,K/sub 2/}. Bob verifies this result to confirm that Alice knows C. Implementation issues are summarized, showing the potential for improved performance over Bellovin and Merritt's comparably strong Augmented-Encrypted Key Exchange. These methods make the password a strong independent factor in authentication, and are suitable for both Internet and intranet use.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134465868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 172
Capturing geometry rationale for collaborative design 获取协同设计的几何原理
M. Klein
{"title":"Capturing geometry rationale for collaborative design","authors":"M. Klein","doi":"10.1109/ENABL.1997.630785","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630785","url":null,"abstract":"When an artifact is designed, the typical output consists of documents describing the final result of a long series of deliberations and tradeoffs by the participants of collaborative design (a.k.a. concurrent engineering) teams. The underlying intent and logical support (i.e. the rationale) for the decisions captured therein is usually lost, or is represented at best as a scattered, difficult-to-access collection of paper documents and designers' recollections. This is particularly true for a geometric, as opposed to a preliminary, design rationale. Rationale information is critical, however, for important collaborative design functions such as team memory, design retrieval and negotiation. This paper describes an evolving Web-based tool designed to greatly improve the capture and access of preliminary and geometric design rationale in concurrent engineering teams, based on a marriage of rationale capture, the World Wide Web, CAD and feature-based design technology.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133777265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信