Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

筛选
英文 中文
Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system 基于xml的代理系统中扩展企业分布式协同设计与可制造性评价
J. Shiau, S. Ratchev, George Valtchanov
{"title":"Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system","authors":"J. Shiau, S. Ratchev, George Valtchanov","doi":"10.1109/ENABL.2000.883740","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883740","url":null,"abstract":"Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Position paper on integrated broadband environment for personalized TV experience (IBEX) 关于个性化电视体验的集成宽带环境(IBEX)的立场文件
Y. Gonno, F. Nishio, Yasuaki Yamagishi, T. Tsunoda
{"title":"Position paper on integrated broadband environment for personalized TV experience (IBEX)","authors":"Y. Gonno, F. Nishio, Yasuaki Yamagishi, T. Tsunoda","doi":"10.1109/ENABL.2000.883707","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883707","url":null,"abstract":"As a next step towards the integration of TV and the Web environment, we started a new project on integrated broadband environment for personalized TV experience (IBEX). This is a position paper on IBEX describing an architectural overview of future multimedia environment. The IBEX project also intends to provide a service model for the TV-Anytime framework. The concept of the IBEX features three major viewpoints towards the future TV experience. To release audience from time constraint scheduled by broadcasters is the first target. Then to get seamless and adaptive access between TV and the Web environment from anywhere in the world is also important. In addition, such TV experience is to be securely personalized for individual audience. In order to achieve open framework, these viewpoints must be properly developed in conjunction with well-organized data models and system architecture based on de facto standard technology. The IBEX will provide a prototype system model built on upcoming integrated broadband digital TV infrastructure.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure self-certified COTS 安全的自我认证COTS
M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi
{"title":"Secure self-certified COTS","authors":"M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi","doi":"10.1109/ENABL.2000.883726","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883726","url":null,"abstract":"With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EWS-a case study on access control in workflow systems ews -工作流系统中访问控制的案例研究
Åsa Hagström, V. Fåk, M. Vandenwauver
{"title":"EWS-a case study on access control in workflow systems","authors":"Åsa Hagström, V. Fåk, M. Vandenwauver","doi":"10.1109/ENABL.2000.883731","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883731","url":null,"abstract":"EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initialization vector attacks on the IPsec protocol suite 针对IPsec协议套件的初始化向量攻击
Christopher B. McCubbin, A. Selçuk, D. Sidhu
{"title":"Initialization vector attacks on the IPsec protocol suite","authors":"Christopher B. McCubbin, A. Selçuk, D. Sidhu","doi":"10.1109/ENABL.2000.883723","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883723","url":null,"abstract":"In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Experiments in information visualization using 3D metaphoric worlds 使用三维隐喻世界的信息可视化实验
C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris
{"title":"Experiments in information visualization using 3D metaphoric worlds","authors":"C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris","doi":"10.1109/ENABL.2000.883704","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883704","url":null,"abstract":"In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000) IEEE第九届支持技术国际研讨会:协作企业的基础设施(WET ICE 2000)
{"title":"IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000)","authors":"","doi":"10.1109/ENABL.2000.883694","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883694","url":null,"abstract":"","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信