Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises最新文献

筛选
英文 中文
A semantic approach of virtual worlds interoperability 虚拟世界互操作性的语义方法
M. Soto, Sébastien Allongue
{"title":"A semantic approach of virtual worlds interoperability","authors":"M. Soto, Sébastien Allongue","doi":"10.1109/ENABL.1997.630810","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630810","url":null,"abstract":"This paper presents a semantic approach to a solution of the problem of interoperability for virtual worlds. The semantics of virtual worlds and virtual entities is described using the Influence/Reaction model of multi-agent systems. The main feature of this model is to clearly separate the description of an action (performed by virtual entities) and the consequences of the action. We demonstrate how this separation is highly favourable to design virtual worlds with interoperability. We use and extend the Influence/Reaction model to quantify the semantic compatibility level between virtual worlds and then to compute the resulting behavior of virtual entities involved in an interoperability session. Nevertheless, the Influence/Reaction model can work properly for interoperability purposes only if the symbols (names) used to describe the virtual entities are identical in each virtual world. This constraint is relaxed by using the ontology concept.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127455610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A CORBA-based approach to design gateways for multidatabase systems 为多数据库系统设计网关的基于corba的方法
G. Iazeolla, A. D’Ambrogio
{"title":"A CORBA-based approach to design gateways for multidatabase systems","authors":"G. Iazeolla, A. D’Ambrogio","doi":"10.1109/ENABL.1997.630789","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630789","url":null,"abstract":"A multidatabase system (MDBS) is a system that provides access to data from a collection of database systems (DBSs), called component DBSs, that are heterogeneous and distributed. The integration of the component DBSs into the MDBS is performed by a complex of functions termed a 'gateway'. This paper describes the design of a gateway based on the distributed object computing (DOC) approach, and compliant to the CORBA (Common Object Request Broker Architecture) standard. The approach is shown to introduce savings in design complexity and costs. The details of the approach are described in a gateway case study for the integration of a relational DBS into a MDBS.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132984054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Working group report on building secure knowledge systems 关于建立安全知识系统的工作组报告
Barbara C. Davis, B. J. Wood
{"title":"Working group report on building secure knowledge systems","authors":"Barbara C. Davis, B. J. Wood","doi":"10.1109/ENABL.1997.630831","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630831","url":null,"abstract":"The Application Security Working Group focused on the issue of building secure knowledge systems. This report outlines opinions about the current state of building secure knowledge systems as well as the outstanding issues in the field.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"234 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122373115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure mobile IP using IP security primitives 使用IP安全原语保护移动IP
Atsushi Inoue, M. Ishiyama, Atsushi Fukumoto, Toshio Okamoto
{"title":"Secure mobile IP using IP security primitives","authors":"Atsushi Inoue, M. Ishiyama, Atsushi Fukumoto, Toshio Okamoto","doi":"10.1109/ENABL.1997.630820","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630820","url":null,"abstract":"As the commercial use of the Internet becomes common and the demand for mobile computing through the Internet is emerging, it is necessary to construct a secure mobile environment. This paper presents an implementation example of such a system which employs a secure mobile IP protocol on stationary security gateways and mobile hosts. The IETF standard Mobile IP protocol is modified with IP security primatives, which control the packet flow from a mobile host through multiple security gateways. Using IP security primitives, the packet going into a corporate network and the packet going out the visiting network are both securely processed. This IP security based packet control allows transparent mobile access from anywhere on an IP network even with sufficient security support by encrypting and authenticating IP packets. The current implementation status and the performance evaluation is also reported.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128137897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm 从协议规范到缺陷和攻击场景:一个自动和形式化的算法
M. Debbabi, M. Mejri, N. Tawbi, I. Yahmadi
{"title":"From protocol specifications to flaws and attack scenarios: an automatic and formal algorithm","authors":"M. Debbabi, M. Mejri, N. Tawbi, I. Yahmadi","doi":"10.1109/ENABL.1997.630823","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630823","url":null,"abstract":"Presents a new approach to the verification of authentication protocols. This approach is formal, fully automatic and does not necessitate any specification of any protocol property or invariant. It takes the protocol specification as the parameter and generates the set of flaws, if any, as well as the corresponding attack scenarios. This approach involves three steps. First, protocol roles are extracted from the protocol specification. Second, the intruder's abilities to perform communication and computation are generated from the protocol specification. In addition to the classical, known intruder computational abilities, such as encryption and decryption, we also consider those computations that result from different instrumentations of the protocol. The intruder's abilities are modeled as a deductive system. Third, the extracted roles as well as the deductive system are combined to perform the verification. The latter consists in checking whether the intruder can answer all the challenges uttered by a particular role. If that is the case, an attack scenario is automatically constructed. To exemplify the usefulness and efficiency of our approach, we illustrate it on the Woo and Lam (1994) authentication protocol.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128957576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A framework for distributed Web-based microsystem design 基于web的分布式微系统设计框架
D. Saha, A. Chandrakasan
{"title":"A framework for distributed Web-based microsystem design","authors":"D. Saha, A. Chandrakasan","doi":"10.1109/ENABL.1997.630793","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630793","url":null,"abstract":"The increasing complexity of microsystem design mandates a distributed and collaborative design environment. The World Wide Web serves as a desirable platform for distributed access to information and design tools. In this paper we present a framework that enables distributed Web based CAD, in which Web based design tools can efficiently utilize the capabilities of existing design tools on the Web to build hierarchical Web tools.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126309750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Secure workflow environment 安全的工作流环境
R. Valia, Y. Al-Salqan
{"title":"Secure workflow environment","authors":"R. Valia, Y. Al-Salqan","doi":"10.1109/ENABL.1997.630825","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630825","url":null,"abstract":"Workflow management products are deployed increasingly in almost all business activities and domains. Heterogeneity and geographical distribution are key features of the workflow environment. Workflow environments, therefore, must bridge the geographical barrier in a seamless and secure fashion. In addition, this environment must be platform-independent. In this paper, we present a Web-based secure workflow environment. Our approach integrates public-key encryption with the World Wide Web. Our goal is to provide a Web-based workflow solution so that a group-oriented virtual private network can be established across different geographical locations on the public Internet in a secure manner. Security for workflow technology on the Internet needs to be addressed from the ground up, and must be an integral part of the workflow environment. To this end, a combination of the Secure Sockets Layer (SSL) and a public-key infrastructure may be used. Our solution relies on the portability of the Java language. Such a solution would support the \"write once, run anywhere\" paradigm that Java advocates. This paper describes the traditional workflow mechanisms and discusses state-of-the-art workflow environments. A discussion of the future direction for a secure workflow technology is also presented.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Coordinating Java agents with multiple coordination languages on the Berlinda platform 在Berlinda平台上使用多种协调语言协调Java代理
R. Tolksdorf
{"title":"Coordinating Java agents with multiple coordination languages on the Berlinda platform","authors":"R. Tolksdorf","doi":"10.1109/ENABL.1997.630801","DOIUrl":"https://doi.org/10.1109/ENABL.1997.630801","url":null,"abstract":"A coordination language for agent defines the kind of elements, operations to construct and deconstruct elements, and the actual coordination operations that manipulate a coordination medium. The family of Linda-like coordination languages has demonstrated this view most purely with operations that are based on the manipulation of a shared multiset of elements. With Berlinda a model is designed and implemented on which coordination languages a la Linda and beyond can be implemented. As examples a simple versions of Linda and a subset of KQML have been implemented. We use Berlinda to study the problem of interworking amongst multiple coordination environments. For Web access to agents we integrate the coordination environments into the Jigsaw Web-server.","PeriodicalId":334410,"journal":{"name":"Proceedings of IEEE 6th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1997-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114893338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信