Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

筛选
英文 中文
NIST Smart Space: pervasive computing initiative NIST智能空间:普适计算计划
L. Rosenthal, V. Stanford
{"title":"NIST Smart Space: pervasive computing initiative","authors":"L. Rosenthal, V. Stanford","doi":"10.1109/ENABL.2000.883697","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883697","url":null,"abstract":"The field of pervasive computing is in its infancy, and many of the technologies required to make it a reality are immature and high risk. The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) has launched a pervasive computing initiative to investigate the technical and standards roadblocks impeding the integration of emerging and existing technologies. Consistent with ITL's strategic plan, the initiative involves working with industry to develop and demonstrate test methods, reference data, tests, proof-of-concept implementations and standards to help pull the underlying technologies forward and thus help the field to mature and grow. The initiative is multi-disciplinary, takes advantage of the expertise of several divisions within ITL and creates new expertise. Areas addressed by the initiative include: information access and user interfaces, networking, software and security.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
ETOILE - an Environment for Team, Organizational and Individual Learning in Emergencies ETOILE -一个团队、组织和个人在紧急情况下学习的环境
R. Dörner, P. Grimm
{"title":"ETOILE - an Environment for Team, Organizational and Individual Learning in Emergencies","authors":"R. Dörner, P. Grimm","doi":"10.1109/ENABL.2000.883701","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883701","url":null,"abstract":"Discusses several aspects of the ETOILE (Environment for Team Organizational and Individual Learning in Emergencies) system, which may be considered to be a knowledge networked environment. These aspects are: authoring, the combination of agents and the integration of knowledge sources (databases of external simulators), the visualization of behaviour in a 3D virtual environment, the design of the human-agent interface, and the modelling, description and assessment of human behaviour. Based on our experiences in the ETOILE project, conclusions are drawn for the design of a knowledge networked environment for learning purposes.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Commitment-based enhancement of e-commerce protocols 以承诺为基础加强电子商务协议
P. Yolum, Munindar P. Singh
{"title":"Commitment-based enhancement of e-commerce protocols","authors":"P. Yolum, Munindar P. Singh","doi":"10.1109/ENABL.2000.883743","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883743","url":null,"abstract":"Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We develop a commitment-based representation, which provides a content to the protocols, enabling flexible execution. We show how an existing protocol can be systematically enhanced to yield a protocol that allows the given actions as well as other legal moves.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Workspace awareness in mobile virtual teams 移动虚拟团队中的工作空间意识
A. Ferscha
{"title":"Workspace awareness in mobile virtual teams","authors":"A. Ferscha","doi":"10.1109/ENABL.2000.883742","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883742","url":null,"abstract":"Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has proven particularly difficult to attain in distributed collaboration systems, where the social interaction protocol is not as well established and the means for becoming aware of the environment are far less common. The work reported in this paper is focused on workspace awareness, i.e. the \"up-to-the-moment understanding of another person's interaction with a shared workspace\". As opposed to the traditional understanding of shared workspaces being bounded spaces where people can see and manipulate artefacts related to their activities (documents in an office, the whiteboard in a lecture hall or assembly lines in a factory), we consider virtual mobile (team) workspaces as abstract spaces containing objects that constitute the teamwork.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Privacy-enhanced access control by SPKI and its application to Web server 基于SPKI的隐私增强访问控制及其在Web服务器上的应用
Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno
{"title":"Privacy-enhanced access control by SPKI and its application to Web server","authors":"Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno","doi":"10.1109/ENABL.2000.883729","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883729","url":null,"abstract":"For providing a privacy-enhanced access only for an appropriate user, anonymous access such as anonymous FTP is too weak because a service provider cannot know about a client, while authentication-based access control such as PKIX (Public Key Infrastructure with X.509) is too strong because ID information on a client is exposed to a service-provider. Instead, we present a new access control scheme by using SPKI (Simple Public Key Infrastructure), since an authorization certificate based on SPKI does not carry any ID information. This scheme needs additional mechanism for the server and clients such as issuing, delegating, validating, and revoking certificates. A web-based privacy-enhanced access control is designed on the basis of the proposed scheme and implemented by Java. The resulting system shows that the proposed scheme works well with a small amount of overheads being introduced into a normal web server.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework for secure enterprise computing 用于安全企业计算的框架
Myong H. Kang, J. Froscher
{"title":"A framework for secure enterprise computing","authors":"Myong H. Kang, J. Froscher","doi":"10.1109/ENABL.2000.883732","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883732","url":null,"abstract":"Distributed computing that supports cooperation among enterprises tends to be large and complex. Hence, it is not a trivial task to make enterprise computing secure and flexible. We have developed a prototype that supports flexible, secure, and recoverable enterprise computing. In this paper, we briefly describe the prototype secure enterprise application-building tool.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEMOIR: a hybrid architecture for expertise modeling and recommender systems DEMOIR:用于专业知识建模和推荐系统的混合架构
Dawit Yimam Seid, A. Kobsa
{"title":"DEMOIR: a hybrid architecture for expertise modeling and recommender systems","authors":"Dawit Yimam Seid, A. Kobsa","doi":"10.1109/ENABL.2000.883706","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883706","url":null,"abstract":"Although employees' expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently that automated systems to enhance the visibility and traceability of employees with particular expertise started to receive research attention. In this paper, we introduce a systematic classification of alternative architectures for a core functionality of expert finding systems, namely expertise modeling. We also analyze the advantages and disadvantages of each approach and present our hybrid solution. We discuss how this solution addresses the requirements of (I) distributed and heterogeneous organizational and personal expertise data sources and, (2) centralized access to extracted expertise information.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Secure multicast software delivery 安全组播软件交付
Lin Han, N. Shahmehri
{"title":"Secure multicast software delivery","authors":"Lin Han, N. Shahmehri","doi":"10.1109/ENABL.2000.883730","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883730","url":null,"abstract":"Nowadays, purchased software is delivered via sending CD-ROMs or downloading from the Internet. These solutions are either time-consuming or not scalable when the number of end-users becomes large. In this paper, we explore the use of multicast technology as an option for software delivery. We present a global structure for multicast software delivery and look into security issues, mainly focusing on access control in establishing a secure multicast recipient group. A communication schema between each entity in a multicast software delivery system is described in detail. We also describe briefly the implementation of our current prototype for a multicast software delivery system. Such electronic software delivery is the first phase of our ongoing project towards unattended software installation, configuration and upgrade.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
IPsec-WIT: the NIST IPsec Web-based interoperability test system IPsec- wit: NIST基于web的IPsec互操作性测试系统
R. Glenn, S. Frankel, D. Montgomery
{"title":"IPsec-WIT: the NIST IPsec Web-based interoperability test system","authors":"R. Glenn, S. Frankel, D. Montgomery","doi":"10.1109/ENABL.2000.883719","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883719","url":null,"abstract":"NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols. As initial IETF IPsec specifications began to emerge, it became apparent that the availability of interoperability testing would be the critical barrier to the rapid evolution of early prototypes into commercial products. In this paper we describe the design and development of the NIST IPsec Web-based Interoperability Tester (IPsec-WIT). IPsec-WIT is an experimental test system aimed at exploiting WWW technology to provide remote interoperability testing services anytime and anywhere without requiring any distribution of test system software, or relocation of the systems under test. We conclude with a discussion of the potential future evolution of the system based on observations gained through putting our experimental system on-line and providing IPsec and Internet Key Exchange (IKE) testing services to the IETF research and development community for several months.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the design of a mobile agent Web for supporting virtual enterprises 支持虚拟企业的移动代理Web的设计
A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann
{"title":"On the design of a mobile agent Web for supporting virtual enterprises","authors":"A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann","doi":"10.1109/ENABL.2000.883736","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883736","url":null,"abstract":"In this paper we discuss the design of a mobile agent based infrastructure for monitoring and controlling activities in a Virtual Enterprise (VE). We define the concepts of the Virtual Enterprise and the Mobile Agent Web (MA-web).","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信