{"title":"NIST Smart Space: pervasive computing initiative","authors":"L. Rosenthal, V. Stanford","doi":"10.1109/ENABL.2000.883697","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883697","url":null,"abstract":"The field of pervasive computing is in its infancy, and many of the technologies required to make it a reality are immature and high risk. The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) has launched a pervasive computing initiative to investigate the technical and standards roadblocks impeding the integration of emerging and existing technologies. Consistent with ITL's strategic plan, the initiative involves working with industry to develop and demonstrate test methods, reference data, tests, proof-of-concept implementations and standards to help pull the underlying technologies forward and thus help the field to mature and grow. The initiative is multi-disciplinary, takes advantage of the expertise of several divisions within ITL and creates new expertise. Areas addressed by the initiative include: information access and user interfaces, networking, software and security.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ETOILE - an Environment for Team, Organizational and Individual Learning in Emergencies","authors":"R. Dörner, P. Grimm","doi":"10.1109/ENABL.2000.883701","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883701","url":null,"abstract":"Discusses several aspects of the ETOILE (Environment for Team Organizational and Individual Learning in Emergencies) system, which may be considered to be a knowledge networked environment. These aspects are: authoring, the combination of agents and the integration of knowledge sources (databases of external simulators), the visualization of behaviour in a 3D virtual environment, the design of the human-agent interface, and the modelling, description and assessment of human behaviour. Based on our experiences in the ETOILE project, conclusions are drawn for the design of a knowledge networked environment for learning purposes.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Commitment-based enhancement of e-commerce protocols","authors":"P. Yolum, Munindar P. Singh","doi":"10.1109/ENABL.2000.883743","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883743","url":null,"abstract":"Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We develop a commitment-based representation, which provides a content to the protocols, enabling flexible execution. We show how an existing protocol can be systematically enhanced to yield a protocol that allows the given actions as well as other legal moves.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workspace awareness in mobile virtual teams","authors":"A. Ferscha","doi":"10.1109/ENABL.2000.883742","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883742","url":null,"abstract":"Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has proven particularly difficult to attain in distributed collaboration systems, where the social interaction protocol is not as well established and the means for becoming aware of the environment are far less common. The work reported in this paper is focused on workspace awareness, i.e. the \"up-to-the-moment understanding of another person's interaction with a shared workspace\". As opposed to the traditional understanding of shared workspaces being bounded spaces where people can see and manipulate artefacts related to their activities (documents in an office, the whiteboard in a lecture hall or assembly lines in a factory), we consider virtual mobile (team) workspaces as abstract spaces containing objects that constitute the teamwork.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno
{"title":"Privacy-enhanced access control by SPKI and its application to Web server","authors":"Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno","doi":"10.1109/ENABL.2000.883729","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883729","url":null,"abstract":"For providing a privacy-enhanced access only for an appropriate user, anonymous access such as anonymous FTP is too weak because a service provider cannot know about a client, while authentication-based access control such as PKIX (Public Key Infrastructure with X.509) is too strong because ID information on a client is exposed to a service-provider. Instead, we present a new access control scheme by using SPKI (Simple Public Key Infrastructure), since an authorization certificate based on SPKI does not carry any ID information. This scheme needs additional mechanism for the server and clients such as issuing, delegating, validating, and revoking certificates. A web-based privacy-enhanced access control is designed on the basis of the proposed scheme and implemented by Java. The resulting system shows that the proposed scheme works well with a small amount of overheads being introduced into a normal web server.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for secure enterprise computing","authors":"Myong H. Kang, J. Froscher","doi":"10.1109/ENABL.2000.883732","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883732","url":null,"abstract":"Distributed computing that supports cooperation among enterprises tends to be large and complex. Hence, it is not a trivial task to make enterprise computing secure and flexible. We have developed a prototype that supports flexible, secure, and recoverable enterprise computing. In this paper, we briefly describe the prototype secure enterprise application-building tool.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DEMOIR: a hybrid architecture for expertise modeling and recommender systems","authors":"Dawit Yimam Seid, A. Kobsa","doi":"10.1109/ENABL.2000.883706","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883706","url":null,"abstract":"Although employees' expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently that automated systems to enhance the visibility and traceability of employees with particular expertise started to receive research attention. In this paper, we introduce a systematic classification of alternative architectures for a core functionality of expert finding systems, namely expertise modeling. We also analyze the advantages and disadvantages of each approach and present our hybrid solution. We discuss how this solution addresses the requirements of (I) distributed and heterogeneous organizational and personal expertise data sources and, (2) centralized access to extracted expertise information.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure multicast software delivery","authors":"Lin Han, N. Shahmehri","doi":"10.1109/ENABL.2000.883730","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883730","url":null,"abstract":"Nowadays, purchased software is delivered via sending CD-ROMs or downloading from the Internet. These solutions are either time-consuming or not scalable when the number of end-users becomes large. In this paper, we explore the use of multicast technology as an option for software delivery. We present a global structure for multicast software delivery and look into security issues, mainly focusing on access control in establishing a secure multicast recipient group. A communication schema between each entity in a multicast software delivery system is described in detail. We also describe briefly the implementation of our current prototype for a multicast software delivery system. Such electronic software delivery is the first phase of our ongoing project towards unattended software installation, configuration and upgrade.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IPsec-WIT: the NIST IPsec Web-based interoperability test system","authors":"R. Glenn, S. Frankel, D. Montgomery","doi":"10.1109/ENABL.2000.883719","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883719","url":null,"abstract":"NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols. As initial IETF IPsec specifications began to emerge, it became apparent that the availability of interoperability testing would be the critical barrier to the rapid evolution of early prototypes into commercial products. In this paper we describe the design and development of the NIST IPsec Web-based Interoperability Tester (IPsec-WIT). IPsec-WIT is an experimental test system aimed at exploiting WWW technology to provide remote interoperability testing services anytime and anywhere without requiring any distribution of test system software, or relocation of the systems under test. We conclude with a discussion of the potential future evolution of the system based on observations gained through putting our experimental system on-line and providing IPsec and Internet Key Exchange (IKE) testing services to the IETF research and development community for several months.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann
{"title":"On the design of a mobile agent Web for supporting virtual enterprises","authors":"A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann","doi":"10.1109/ENABL.2000.883736","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883736","url":null,"abstract":"In this paper we discuss the design of a mobile agent based infrastructure for monitoring and controlling activities in a Virtual Enterprise (VE). We define the concepts of the Virtual Enterprise and the Mobile Agent Web (MA-web).","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}