By Topic

Enabling Technologies: Infrastructure for Collaborative Enterprises, 2000. (WET ICE 2000). Proeedings. IEEE 9th International Workshops on

Date 14-16 June 2000

Filter Results

Displaying Results 1 - 25 of 50
  • IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000) [front matter]

    Publication Year: 2000, Page(s):iii - viii
    Request permission for commercial reuse | PDF file iconPDF (229 KB)
    Freely Available from IEEE
  • Proceedings of the First International Conference on Web Information Systems Engineering

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (580 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 2000, Page(s):291 - 292
    Request permission for commercial reuse | PDF file iconPDF (80 KB)
    Freely Available from IEEE
  • A method to design process architecture in a distributed product realization environment

    Publication Year: 2000, Page(s):124 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (592 KB)

    Globalization, collaboration and competition are forcing product realization processes to become faster and more distributed. The requirements for higher efficiency, lower cost, and better product quality lead to challenges in the design of a product realization process in which concurrency and distribution are important. A distributed process structuring method (DPSM) is presented to help enginee... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Developing and evaluating collaborative engineering studios

    Publication Year: 2000, Page(s):118 - 123
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (544 KB)

    We discuss a vision of a work in progress on a collaborative engineering environment, the Collaborative Design Studio, being developed at the Geometric and Intelligent Computing Laboratory at Drexel University. This works seeks to integrate Computer-Aided Design (CAD) and communication tools through automatic extraction and embedding of design contest into communications, as well as provide archiv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Commitment-based enhancement of e-commerce protocols

    Publication Year: 2000, Page(s):278 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Position paper on integrated broadband environment for personalized TV experience (IBEX)

    Publication Year: 2000, Page(s):75 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (184 KB)

    As a next step towards the integration of TV and the Web environment, we started a new project on integrated broadband environment for personalized TV experience (IBEX). This is a position paper on IBEX describing an architectural overview of future multimedia environment. The IBEX project also intends to provide a service model for the TV-Anytime framework. The concept of the IBEX features three ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards an evaluation methodology for the development of research-oriented virtual communities

    Publication Year: 2000, Page(s):112 - 117
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB)

    This paper is part of a case study of collaborative environment use and part of a proposition for methodological approach for evaluating virtual environments based on the findings from that case study. We review the literature on evaluating collaborative environments and we also report on a usability study carried out on a research oriented virtual community. The report includes a cluster analysis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A coordination infrastructure for agent-based Internet applications

    Publication Year: 2000, Page(s):230 - 235
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (656 KB)

    Internet applications are often structured as collections of interactive, heterogeneous agents, which have to coordinate to pursue the application goals. These applications require design methodologies that are far from being well established and new standard technologies models, languages, technologies and tools specifically tailored to the agent metaphor and to agent-based systems. This article ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A framework for secure enterprise computing

    Publication Year: 2000, Page(s):219 - 220
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Distributed computing that supports cooperation among enterprises tends to be large and complex. Hence, it is not a trivial task to make enterprise computing secure and flexible. We have developed a prototype that supports flexible, secure, and recoverable enterprise computing. In this paper, we briefly describe the prototype secure enterprise application-building tool View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A delayed commitment scheme to enhance public key certificate based protocols

    Publication Year: 2000, Page(s):181 - 182
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    Public key certificate based protocols depend on the freshness of the certificates for their security. It has been pointed out by various authors that current Public Key Infrastructure (PKI) does not provide effective freshness proof for certificates. An “ex-employee” who has access to the private key of a compromised server certificate can mount an attack on the SSL/TLS hand-shake pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workspace awareness in mobile virtual teams

    Publication Year: 2000, Page(s):272 - 277
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DEMOIR: a hybrid architecture for expertise modeling and recommender systems

    Publication Year: 2000, Page(s):67 - 74
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Although employees' expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently that automated systems to enhance the visibility and traceability of employees with particular expertise started to receive research attention. In this paper, we introduce a systematic classification of alternative archite... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Workshop report: knowledge media networking

    Publication Year: 2000, Page(s):3 - 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An evaluation and comparison of the industrial and educational usage of CSCW within the design process

    Publication Year: 2000, Page(s):110 - 111
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    This paper presents the findings of three recent research projects carried out at the University of Strathclyde. Two of the projects, ICON (Institutional Collaboration Over Networks) and ICON2 investigated the usage of CSCW tools by disparate engineering design students whilst, a Design Council funded research project investigated the introduction and usage of shared workspace technology within th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Report on major themes and issues arising from the workshop

    Publication Year: 2000, Page(s):225 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On the implementation of a stand-alone JavaTM bytecode verifier

    Publication Year: 2000, Page(s):189 - 194
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    A member of our research team has already produced a well-organized clear, technical and complete specification of the Java bytecode verifier. We are now using this specification to implement a stand-alone version of the verifier that totally complies with Sun's specification. We are also integrating static checks that are currently absent from their implementation. In this paper we share our expe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-enhanced access control by SPKI and its application to Web server

    Publication Year: 2000, Page(s):201 - 206
    Cited by:  Papers (1)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    For providing a privacy-enhanced access only for an appropriate user, anonymous access such as anonymous FTP is too weak because a service provider cannot know about a client, while authentication-based access control such as PKIX (Public Key Infrastructure with X.509) is too strong because ID information on a client is exposed to a service-provider. Instead, we present a new access control scheme... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • EWS-a case study on access control in workflow systems

    Publication Year: 2000, Page(s):213 - 218
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB)

    EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Server-assisted generation of a strong secret from a password

    Publication Year: 2000, Page(s):176 - 180
    Cited by:  Papers (24)  |  Patents (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    A roaming user, who accesses a network front different client terminals, can be supported by a credentials server that authenticates the user by password then assists in launching a secure environment for the user. However, traditional credentials server designs are vulnerable to exhaustive password guessing attack at the server. We describe a credentials server model and supporting protocol that ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anomaly detection using visualization and machine learning

    Publication Year: 2000, Page(s):165 - 170
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (568 KB)

    Unauthorized access from inside or outside an organization has become a social problem in the last few years, making a system that can detect such accesses desirable. We therefore monitor normal activities using inductive logic programming (ILP) which is one of machine learning and detect anomalies. To ensure effective monitoring, we think the following two points must be considered. One point is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Web infrastructure for people and agent interaction and collaboration

    Publication Year: 2000, Page(s):266 - 271
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (520 KB)

    Internet pervasive services call for flexible supports to enable a wide degree of collaboration. On the one hand, many people are connected to the Internet and surf the Web not only to retrieve information, but also to carry out several kinds of different tasks via online services. On the other hand, the Internet is likely soon to be populated by software agents that will act on behalf of users, a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Walking the Web of trust

    Publication Year: 2000, Page(s):153 - 158
    Cited by:  Papers (22)  |  Patents (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (504 KB)

    Most currently deployed public key infrastructures (PKIs) are hierarchically oriented and rely on a centralized design. Hierarchical PKIs may be appropriate solutions for many usage-scenarios, but there exists the viable alternative of the `Web of Trust'. In a web of trust, each user of the system can choose for himself whom he elects to trust, and whom not. After contrasting the properties of web... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Integrating XML and object-based programming for distributed collaboration

    Publication Year: 2000, Page(s):254 - 259
    Cited by:  Patents (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (532 KB)

    Explores some of the new opportunities for distributed collaborative applications that emerge from the use of XML as a data specification language. We present two different approaches: the first one transparently adds asynchronous collaboration to applications whose persistent state is in XML format, while the second one helps build synchronous collaborative applications starting with an XML schem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive multi-agent tool for electronic commerce

    Publication Year: 2000, Page(s):59 - 66
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    The concept of Electronic Service Brokerage is based on the use of new information technologies to provide a service capable of facilitating and organizing the relationship between customers and offers providers. In this paper, a framework for Electronic Brokerage Service based on the emerging agent technology is presented. The first part of this article presents the requirements for electronic br... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.