{"title":"Work centered evaluation of collaborative systems - the Collate experience","authors":"H. Albrechtsen, Hans H. K. Andersen, B. Cleal","doi":"10.1109/ENABL.2004.83","DOIUrl":"https://doi.org/10.1109/ENABL.2004.83","url":null,"abstract":"The paper presents a qualitative empirical evaluation of a collaboratory for interactive knowledge integration within the domain of film archive research. The empirical evaluation of the Collate collaboratory was conducted in an evaluation workshop where professional users from three national film archives interacted. The evaluation workshop found that the facilities in the prototype did not support the collaborating users' strategies for knowledge integration, and that there was a need for an integrated and uniform representation of the semantics of their common workspace.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128908331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent-based computing for enterprise collaboration - human-agent and agent-agent collaboration","authors":"F. Bergenti, M. Blake, Giacomo Cabri","doi":"10.1109/ENABL.2004.6","DOIUrl":"https://doi.org/10.1109/ENABL.2004.6","url":null,"abstract":"The second \"Agent-based Computing for Enterprise Collaboration\" workshop at WETICE was aimed at bringing together researcher in the field of software agent-supported collaboration. This paper briefly discusses the content of the papers as presented by participating authors. Moreover, it provides a summary of the main issues of the concluding panel discussion.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133544480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt
{"title":"How to sanitize data?","authors":"M. Bishop, B. Bhumiratana, Rick Crawford, K. Levitt","doi":"10.1109/ENABL.2004.36","DOIUrl":"https://doi.org/10.1109/ENABL.2004.36","url":null,"abstract":"Balancing the needs of a data analyst with the privacy needs of a data provider is a key issue when data is sanitized. We treat both the requirements of the analyst and the privacy expectations as policies, and compose the two policies to detect conflicts. The result can be applied to an intermediate data representation to sanitize the relevant pans of the data. We conclude that this method has promise, but more work is needed to determine its effectiveness and limits.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125154229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"P2P architecture for scientific collaboration","authors":"José Mitre, Leandro Navarro-Moldes","doi":"10.1109/ENABL.2004.48","DOIUrl":"https://doi.org/10.1109/ENABL.2004.48","url":null,"abstract":"P2P networks are often associated with file exchange applications among private users. However, their features make them suitable for other uses. In this paper we present a P2P architecture for scientific collaboration networks, which takes advantage of the properties inherent in these social networks - small-world, clustering, community structure, assortative mixing, preferential attachment and small and stable groups - in order to obtain better performance, efficient use of resources and system resilience.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"15 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114383278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
G. Jezic, M. Kusek, T. Marenic, I. Ljubi, I. Lovrek, S. Desic, B. Dellas
{"title":"Mobile agent-based software management in grid","authors":"G. Jezic, M. Kusek, T. Marenic, I. Ljubi, I. Lovrek, S. Desic, B. Dellas","doi":"10.1109/ENABL.2004.43","DOIUrl":"https://doi.org/10.1109/ENABL.2004.43","url":null,"abstract":"This paper presents a method called Remote Maintenance Shell (RMS), developed for software management in large distributed environments. It allows software upgrading, testing and maintenance of several versions on a remote target system without suspending its regular operation. The method is based on the remote operations performed by cooperative mobile agents. A case study of software upgrading in the grid system is elaborated.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An enhanced approach to support collaborative systems evaluation","authors":"Josie P. H. Huang","doi":"10.1109/ENABL.2004.12","DOIUrl":"https://doi.org/10.1109/ENABL.2004.12","url":null,"abstract":"In this paper, a lifecycle-based within stakeholder-oriented approach is introduced. In order to provide a conceptual understanding of the evaluation of collaborative systems to support development of a virtual enterprise, a case study was carried out within DIECoM (distributed integrated environment for configuration management), an EC Framework V project. With the lessons learned from DIECoM, a need for further improvement in the approach is indicated. The lifecycle-based approach is therefore revised and a sequence derived: defining an evaluation plan, user requirements analysis, designing instruments, implementing the evaluation instruments, using feedback from users to modify the instruments and follow up. Moreover, it highlights needs to be addressed by further research.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"286 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124884437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tobias Chyssler, S. Nadjm-Tehrani, S. Burschka, K. Burbeck
{"title":"Alarm reduction and correlation in defence of IP networks","authors":"Tobias Chyssler, S. Nadjm-Tehrani, S. Burschka, K. Burbeck","doi":"10.1109/ENABL.2004.7","DOIUrl":"https://doi.org/10.1109/ENABL.2004.7","url":null,"abstract":"Society's critical infrastructures are increasingly dependent on IP networks. Intrusion detection and tolerance within data networks is therefore imperative for dependability in other domains such as telecommunications and future energy management networks. Today's data networks are protected by human operators who are overwhelmed by the massive information overload through false alarm rates of the protection mechanisms. This paper studies the role of alarm reduction and correlation in supporting the security administrator in an enterprise network. We present an architecture that incorporates intrusion detection systems as sensors, and provides improved alarm data to the human operator or to automated actuators. Alarm reduction and correlation via static and adaptive filtering, normalisation, and aggregation is demonstrated on the output from three sensors (Snort, Samhain and Syslog) used in a telecom test network.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130809998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vagner José do Sacramento Rodrigues, M. Endler, Hana K. Rubinsztejn, Luciana dos S. Lima, Kléder Miranda Gonçalves, Giulliano A. Bueno
{"title":"An architecture supporting the development of collaborative applications for mobile users","authors":"Vagner José do Sacramento Rodrigues, M. Endler, Hana K. Rubinsztejn, Luciana dos S. Lima, Kléder Miranda Gonçalves, Giulliano A. Bueno","doi":"10.1109/ENABL.2004.10","DOIUrl":"https://doi.org/10.1109/ENABL.2004.10","url":null,"abstract":"This article present a software architecture and services, which comprise a middleware infrastructure for the development and operation of collaborative applications for mobile users. The design of the architecture, named Mobile Collaboration Architecture - MoCA, was driven by the following goals: support scalability in terms of the number of users and services, flexibility and extensibility with respect to the used communication protocols and the application requirements, and facilitate the monitoring, processing and use of context information regarding single users and the collaborative group within the applications.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129074345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Talk on activities of security and grid computing service project","authors":"F. Mizoguchi","doi":"10.1109/ENABL.2004.63","DOIUrl":"https://doi.org/10.1109/ENABL.2004.63","url":null,"abstract":"Summary form only given. With the rapid expansion of the GRID environment and the maturing of software technology such as multiagent system, systems that provide commercial services are faced with conventional commercial concerns, namely how to build trust between service owners and users. Authentication and authorization must be enforced on the use and provision of services. Based on our experiences, we introduce an authorization-based trust model (ABTM) (W. Wen et al., 2000) for such an environment, and then introduce a graphic-based authentication interface.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2004-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126124739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WETICE 2004 Ninth Enterprise Security (ES) Workshop Report","authors":"D. Gilliam","doi":"10.1109/ENABL.2004.82","DOIUrl":"https://doi.org/10.1109/ENABL.2004.82","url":null,"abstract":"The topics covered Role Based Access Control (RBAC), Security Risk Management and Software Security, Data Sanitization, and Network Intrusion Detection and Prevention. Two papers tied for best paper and presentation combination. The papers were: 1. \"An Economic Damage Model for Large-Scale Internet Attacks,\" by Thomas Dübendorfer, Arno Wagner, Bernhard Plattner, ETH Zurich, Switzerland. 2. A Model for Access Negotiations in Dynamic Coalitions,\" by Himanshu Khurana, NCSA, University of Illinois, and Virgil Gligor, University of Maryland.","PeriodicalId":391459,"journal":{"name":"13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2003-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134158209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}