{"title":"Reacting to functional changes in service-oriented enterprises","authors":"Xumin Liu, A. Bouguettaya","doi":"10.1109/COLCOM.2007.4553840","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553840","url":null,"abstract":"In this paper, we focus on the changes that trigger the modification of a service-oriented enterprisepsilas functionality. We present a framework that helps an SOE automatically modify its functional schema based on a change specification. The central component of this framework is a change reaction manager. It provides mechanisms to interpret a change specification, modify the member services in an SOE, and rearrange their cooperation correspondingly. A domain knowledge provider offers the semantics that facilitates the change reaction process. We also use a logging mechanism to keep track of the change reaction process.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134506766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Two-level signature delegation for mobile first responder authentication","authors":"N. Aboudagga, M. Eltoweissy, J. Quisquater","doi":"10.1109/COLCOM.2007.4553803","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553803","url":null,"abstract":"The deployment of wireless networks is in permanent growth. To exploit their intrinsic mobility advantages, collaborative networks such as first responder networks (FRNs) have recently adopted wireless networking technologies, Albiet at a small scale. FRNs require the collaboration of heterogeneous and mobile groups. Impeding the wide-scale use of wireless networking in FRNs are the many security challenges like user authentication, information flow and wireless media management. In this paper, we propose a solution that enables authenticated communication among multiple FRNs which is especially needed during critical events such as intervention in disaster situations. Our solution uses a two-level hierarchical proxy signature to decentralize the authentication process across different administrative networks. To the best of our knowledge, this is the first construction of two-level signature delegation applied to wireless environments. Security and performance analysis and comparison with other works demonstrate the viability and advantages of our solution.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134054618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Load balancing in a hierarchical DHT-based P2P system","authors":"Stefan Zöls, Z. Despotovic, W. Kellerer","doi":"10.1109/COLCOM.2007.4553855","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553855","url":null,"abstract":"Hierarchical DHT (HDHT) systems, outperforming flat DHTs with respect to scalability and network locality, became an important P2P research area in recent years. Appropriate load balancing algorithms, which are available only for flat DHTs so far, are also required for the reliability and scalability of HDHTs. However, their impact is different. In HDHTs, failures caused by overloaded nodes in higher hierarchical layers affect larger portions of the network than overloaded nodes in lower layers. In comparison to flat DHTs, HDHTs offer an additional dimension of balancing load, i.e., through varying relevant parameters of the hierarchical organization. This makes load balancing in HDHTs significantly different from load balancing in flat DHTs. In this paper, we exploit this possibility and present a novel load balancing algorithm for a two-tier HDHT system. Analytically and by simulations we show that our algorithm provides good load balancing performance, while at the same time generating less overhead than, e.g., the renowned \"power of two choices\" algorithm.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129364952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Active notifications","authors":"P. Dewan, Henry McEuen","doi":"10.1109/COLCOM.2007.4553862","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553862","url":null,"abstract":"Some modern version-control systems automatically generate notifications as side effects of checking-in versions. We consider here the dual idea of automatically checking-in versions as side effects of manual email notification about them. This approach combines the benefits of current email, file, and version-control systems, offering a familiar and available user-interface, version management, and actor and observer control on sharing. It can be designed to (a) allow its benefits to be proportional to the degree of autonomy among the systems of various collaborators, and (b) co-exist with existing sharing approaches.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126041084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Legal issues in grid collaborative environments","authors":"Irene Kafeza, E. Kafeza, C. Coutras","doi":"10.1109/COLCOM.2007.4553812","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553812","url":null,"abstract":"The Grid environment is rapidly emerging as a collaborative environment for a wide range of applications. Applications that demand intense problem solving capabilities, extensive data sharing and processing, collaborative relationships among distributed participants employ grid computing. Grid environments provide efficient and scalable access to distributed computing resources among geographically distributed participants. In a grid environment virtual organizations are formulated and managed from a computing resource point of view. The grid provider allows for the dynamic discovery of computing resources, the immediate allocation and provision of the resources and the management and provision of secure access. In our work we examine the legal implications that arise in such environments. Although the security problem in grid environment is being addressed from the technological point of view, there is no work to identify the legal issues that are arising in collaborative environments.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116870236","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu
{"title":"Towards trust-aware access management for ad-hoc collaborations","authors":"Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu","doi":"10.1109/COLCOM.2007.4553807","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553807","url":null,"abstract":"In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on userspsila properties/attributes rather than their identities. While the userpsilas attributes are always asserted by different authorities in the form of credentials, these authorities may not be accepted by the resource owner with the same degree of trust. In this paper, we present a trust-aware role-based authorization framework, called RAMARS_TM, to address both the access control and the trust management issues in such environment. Central to our approach is the dynamic role assignment based on a userpsilas attributes, and trust management, as a special constraint, is in place to make trust decisions on a userpsilas attributes. Required components and functions are identified and specified in our trust and access management policies. An architecture of prototype system implementation is also discussed.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123888874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Walid Gaaloul, Sami Bhiri, M. Hauswirth, M. Rouached, C. Godart
{"title":"Formal verification of composite service recovery mechanisms consistency","authors":"Walid Gaaloul, Sami Bhiri, M. Hauswirth, M. Rouached, C. Godart","doi":"10.1109/COLCOM.2007.4553842","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553842","url":null,"abstract":"Due to the inherent autonomy and heterogeneity of Web services, ensuring composite services reliability remains a challenging problem. Extending the classical control flow with a transactional flow (encapsulating a set of recovery mechanisms) is widely accepted for ensuring composite services reliability. However, current approaches define recovery mechanisms in and ad-hoc way while they have to respect consistency rules regarding the control flow. In this paper, we propose a formal model based on event calculus for capturing both control and transactional flow of composite services. Following a pattern based modelling approach, we depict a set of rules characterising consistent transactional flow that can be defined w.r.t a given control flow. In addition, we propose two complementary approaches for enhancing composite services reliability.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117156620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Read, write, and navigation awareness in realistic multi-view collaborations","authors":"Sasa Junuzovic, P. Dewan, Y. Rui","doi":"10.1109/COLCOM.2007.4553880","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553880","url":null,"abstract":"Read, write, and navigation awareness allow users of a multi-view collaborative editor to get fine-grained information about whether others are reading what they are editing, where others are editing, and to which areas of the document others have navigated, respectively. We derive new high-level tools that directly support the three kinds of awareness. The results of a decision-making study involving the use of these tools revealed that write awareness helps with fine-grained conflict prevention, read awareness reduces unnecessary verbal communication, and navigation awareness is most effective when coupled with read and write awareness. Thus, the study identifies specific uses of the three forms of awareness and motivates tools for supporting them.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122821320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamics of commitment and contribution quality in collaborative communities","authors":"M. Schaal, Yavuz Eren","doi":"10.1109/COLCOM.2007.4553845","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553845","url":null,"abstract":"It is well-known that commitment is an important ingredient for contributions of high quality. With the Internet heading towards being an actionable social space, rather than a collection of Web-sites, the issue of quality becomes crucial for sharing knowledge and action in collaborative scenarios. We propose a case study for the investigation of the influence of time, user feedback and interface complexity on contribution quality. We plan to exploit different online user groups across two different temporal phases for the evaluation.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SYNG: A middleware for statefull groupware in mobile environments","authors":"Mihail F. Ionescu, Ivan Marsic","doi":"10.1109/COLCOM.2007.4553825","DOIUrl":"https://doi.org/10.1109/COLCOM.2007.4553825","url":null,"abstract":"Computer supported collaboration systems, or groupware, are being used more and more in the real life. In the recent years, we are witnessing an increasing demand for supporting such systems in mobile environments. In this paper we address the following questions: ldquoHow are the limited and highly dynamic resources of mobile clients, like network connection, energy supply or display size, influencing the design and deployment of groupware systems?rdquo and ldquoWhat type of policie the users need to specify in order to be able to collaborate in such environments?rdquo. We present a middleware system, called SYNG, that allows a statefull model, suitable for mobile environments. In our system, each user can define a state composed of a number of variables. Examples of such variables include battery usage, quality of network connection, display size, etc. Based on this state, the participant in a collaborative session specifies its own policy for receiving messages from the other participants. Experimental results show good performance and scalability of our approach.","PeriodicalId":340691,"journal":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129003979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}