2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)最新文献

筛选
英文 中文
POPEYE: A simple and reliable collaborative working environment over mobile ad-hoc networks POPEYE:通过移动自组织网络提供简单可靠的协作工作环境
M. Arrufat, Hoa Dung Ha Duong, C. Melchiorre, E. Meyer, I. Nieto, Patrizio Pelliccione, Frédérique Tastet-Cherel
{"title":"POPEYE: A simple and reliable collaborative working environment over mobile ad-hoc networks","authors":"M. Arrufat, Hoa Dung Ha Duong, C. Melchiorre, E. Meyer, I. Nieto, Patrizio Pelliccione, Frédérique Tastet-Cherel","doi":"10.1109/COLCOM.2007.4553865","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553865","url":null,"abstract":"Although useful and increasingly put into regular use, current collaborative working environment (CWE) solutions have several limitations and relevant needs for further research. Most systems address either rather traditional and rigid intra-organizational collaboration scenarios or, at the opposite, completely free and unstructured open communitiespsilas interactions. Emerging dynamic, flexible and ad-hoc collaboration schemes are hardly or not supported at all. Typically, explicit representation of the collaboration context, of workerspsila and teampsilas goals and the semantics of underlying business process are not addressed, and this makes difficult to ensure the context and process awareness, personalisation and collaboration support required in knowledge-rich interactions. Aiming at getting collaborative working environments free from rigid constraints, POPEYE considers P2P over wireless ad hoc groups, where fixed infrastructure is not a prerequisite, where virtual communities can emerge spontaneously and share data with the appropriate quality of service for business applications (persistence, synchronisation, security,....).","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"158 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131644190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Towards secure and trusted collaboration environment for European public sector 为欧洲公共部门建立安全和可信赖的合作环境
A. Svirskas, Jelena Isachenkova, R. Molva
{"title":"Towards secure and trusted collaboration environment for European public sector","authors":"A. Svirskas, Jelena Isachenkova, R. Molva","doi":"10.1109/COLCOM.2007.4553808","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553808","url":null,"abstract":"E-business and e-government implementations are becoming more and more widespread with growing number users depending on availability, accuracy and security of such e-services. The users must be able to trust these services, otherwise they will be reluctant to embrace the new opportunities and will not be able to reap the potential benefits. In addition, the end users wish to use the e-services in the simplest way possible and to have them ldquoon taprdquo 24times7 as other conventional utilities. For this to become possible, a robust interoperability fabric among the involved institutions needs to be established. This means having a lot of collaborative interactions invisible to the end-user (a business or an individual citizen) in order to fulfill the promise of e-services. Such interactions become more complex when the organizations belong to different countries, act according different laws in different languages. This paper presents the work being done to create an efficient, secure and trusted interoperability framework for public sector agencies of European Union member countries.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134068973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Secure scripting based composite application development: Framework, architecture, and implementation 基于安全脚本的复合应用程序开发:框架、体系结构和实现
T. Dinkelaker, Alisdair Johnstone, Yücel Karabulut, I. Nassi
{"title":"Secure scripting based composite application development: Framework, architecture, and implementation","authors":"T. Dinkelaker, Alisdair Johnstone, Yücel Karabulut, I. Nassi","doi":"10.1109/COLCOM.2007.4553815","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553815","url":null,"abstract":"Dynamic scripting languages such as Ruby provide language features that enable developers to express their intent more rapidly and with fewer expressions. Organizations started using these languages in order to add enhancements to their existing applications or create composite applications. Current research has not yet addressed how security specification and enforcement can be done for scripting based application development. To fill this gap, we developed a framework for the design and facilitation of security. Our approach enables a business oriented application developer to add high-level security intentions to his business process model. The framework supports the automatic generation of security configuration and enforcement. As a proof-of-concept, we present an architecture and report the implementation status.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115744777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Uncompressed HD video for collaborative teaching — an experiment 用于协作教学的未压缩高清视频-一个实验
A. Hutanu, Ravi Paruchuri, Daniel Eiland, M. Liska, P. Holub, S. Thorpe, Yufeng Xin
{"title":"Uncompressed HD video for collaborative teaching — an experiment","authors":"A. Hutanu, Ravi Paruchuri, Daniel Eiland, M. Liska, P. Holub, S. Thorpe, Yufeng Xin","doi":"10.1109/COLCOM.2007.4553837","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553837","url":null,"abstract":"This article describes a distributed classroom experiment carried out by five universities in the US and Europe at the beginning of 2007. This experiment was motivated by the emergence of new digital media technology supporting uncompressed high-definition video capture, transport and display as well as the networking services required for its deployment across wide distances. The participating institutes have designed a distributed collaborative environment centered around the new technology and applied it to join the five sites into a single virtual classroom where a real course has been offered to the registered students. Here we are presenting the technologies utilized in the experiment, the results of a technology evaluation done with the help of the participating students and we identify areas of future improvements of the system. While there are a few hurdles in the path of successfully deploying this technology on a large scale, our experiment shows that the new technology is sustainable and the significant quality improvements brought by it can help build an effective distributed and collaborative classroom environment.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
User-centric privacy management for federated identity management 用于联邦身份管理的以用户为中心的隐私管理
Gail-Joon Ahn, Moonam Ko
{"title":"User-centric privacy management for federated identity management","authors":"Gail-Joon Ahn, Moonam Ko","doi":"10.1109/COLCOM.2007.4553829","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553829","url":null,"abstract":"We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle. Identity management has been recently considered to be a viable solution for simplifying user management across enterprise applications. The network identity of each user is the global set of personal credentials and preferences constituting the various accounts. The prevalence of business alliances or coalitions necessitates the further evolution of identity management, named federated identity management (FIM). The main motivation of FIM is to facilitate the federation of identities among business partners emphasizing on ease of user management. In this paper, we propose systematic mechanisms to specify privacy preferences in FIM, attempting to help users facilitate preferences for managing their private information across domains.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125833315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Developing collaborative technology for neuro-science 开发神经科学的协作技术
S. Lloyd, A. Simpson, D. Power, J. Geddes, A. Khanban, Jeb Palmer
{"title":"Developing collaborative technology for neuro-science","authors":"S. Lloyd, A. Simpson, D. Power, J. Geddes, A. Khanban, Jeb Palmer","doi":"10.1109/COLCOM.2007.4553870","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553870","url":null,"abstract":"Using the NeuroGrid project as a case study, this paper explores the experiences and challenges in collaboratively developing technology and in the use of collaborative technology to enhance the science for the diverse scientific community of neuroscience. It explores methodologies adopted for ensuring continual engagement with a disparate clinical and technical community, the methods used for communication and the perceptions of technology from the perspective of the clinical scientific researchers. It explores the experiences of the multidisciplinary project staff in developing solutions and in the use and potential use of collaborative tools to achieve these goals.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127191801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A model transformation framework to boost productivity and creativity in collaborative working environments 在协作工作环境中提高生产力和创造力的模型转换框架
M. Angelaccio, A. D’Ambrogio
{"title":"A model transformation framework to boost productivity and creativity in collaborative working environments","authors":"M. Angelaccio, A. D’Ambrogio","doi":"10.1109/COLCOM.2007.4553876","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553876","url":null,"abstract":"Collaborative working environments consist of a network of spatially dispersed actors (either humans or not) that play different roles and cooperate to achieve a common goal. Notwithstanding the ever increasing potential of innovative software and network technologies, collaborative working environments still require advanced solutions to effectively managing their inherent complexity, thereby boosting productivity and creativity. Essential components of innovative service-based collaborative working environments are collaboration-aware services that embed the required point-to-point or multi-point interaction patterns to support the flexible orchestration of distributed and concurrent activities. This paper introduces an approach that attempts to overcome the above mentioned drawbacks of current collaborative working environments by exploiting the precepts recently introduced by model-driven development and MDA (model driven architecture). The proposed approach is guided by a model transformation framework that makes use of the set of MDA-related standards (MOF, QVT and XMI) to obtain a high degree of automation, so that interoperable model transformation services can be implemented in a timely and efficient way. At the end, the single tool usually operated by a given worker can be considered as a virtual collaborative platform for creating and automatically transforming models of different types and at various levels of abstraction.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127266108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Policies models and tools for collaborative applications 协作应用程序的策略、模型和工具
E. Bertino
{"title":"Policies models and tools for collaborative applications","authors":"E. Bertino","doi":"10.1109/COLCOM.2007.4553883","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553883","url":null,"abstract":"Policies are at the heart of any assured information sharing infrastructure for collaborative applications and may include those for access control, trust and accountability. Policies can be a key component in deciding what and how much to reveal in the discovery stage for both information seekers and providers. Policies can also drive the process of negotiation in the acquisition and release stage. Policies are needed to monitor and enforce usage control as well as for auditing and accountability. Fine-grained policy integration algorithms are needed to support dynamic coalitions and virtual organizations that need to quickly share and integrate information. Policies must adapt, based on events and contexts, to support continuous access to critical information resources. Enforcement mechanisms are also needed to allow different parties to take joint decisions about data accesses. In this talk, we will first discuss the various policies that are relevant in the context of secure information sharing across collaborating organizations. We will then focus on tools for policy similarity analysis, focusing on the case of policies expressed in XACML, and then we will present a reference architecture for collaborative enforcement of access control policies.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121754768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peer2Schedule - an experimental peer-to-peer application to support present collaboration Peer2Schedule -一个实验性的点对点应用程序,支持当前的协作
Alf Inge Wang, Peter Nicolai Motzfeldt
{"title":"Peer2Schedule - an experimental peer-to-peer application to support present collaboration","authors":"Alf Inge Wang, Peter Nicolai Motzfeldt","doi":"10.1109/COLCOM.2007.4553867","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553867","url":null,"abstract":"This paper describes experiences from implementing an experimental mobile peer-to-peer application called Peer2Schedule aimed at improving and supporting collaboration where people are collocated. Peer2Schedule was built on top of the Peer2Me framework that provides management of mobile ad hoc networks over Bluetooth. The goal of the Peer2Schedule project can be divided into three main areas. 1) To develop a collaborative peer-to-peer application to evaluate the usefulness of such applications; 2) to evaluate the technical limitations of J2ME and Bluetooth in this domain; and 3) to implement and evaluate a mobile application to improve present ad-hoc collaboration. In this paper we also investigates the social and network issues related to such applications. Our findings indicates that Bluetooth and J2ME are useful technology to implement such applications, but the long time to establish connections and security issues in Bluetooth reduce the usability of such applications. In addition, it is essential that collaborative peer-to-peer applications must be developed as open source projects, to allow the users of such applications to evaluate the source code to assess how the application handles privacy. Finally, the paper elaborates on how the problem domain affects how the control-flow is managed in peer-to-peer applications.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121841364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The MicroOppnet tool for Collaborative Computing experiments with class 2 opportunistic networks 用于协作计算的MicroOppnet工具与2类机会网络进行了实验
Z. Kamal, Ajay K. Gupta, L. Lilien, Zijiang Yang
{"title":"The MicroOppnet tool for Collaborative Computing experiments with class 2 opportunistic networks","authors":"Z. Kamal, Ajay K. Gupta, L. Lilien, Zijiang Yang","doi":"10.1109/COLCOM.2007.4553824","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553824","url":null,"abstract":"Class 2 opportunistic networks (oppnets) are a new paradigm for collaborative computing that aims at integrating communication, computation, sensing, actuation, storage, and other resources and services. Oppnets achieve global tasks and goals through the collaboration and coordination of their nodes (some of which join an oppnet dynamically). We describe the concept of oppnets, discuss related work, and present the standard API framework for oppnets name Oppnet virtual machine (OVM). We present the design and implementation details of a small-scale proof-of-concept system, named MicroOppnet, in terms of the OVM primitives. We describe both the design and implementation of MicroOppnet, which not only is a proof of concept but also constitutes our tool for experiments in collaborative computing with oppnets. We are currently working on extending MicroOppnet into a larger oppnet prototype and an oppnet testbed.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"359 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132239607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信