By Topic

WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003.

11-11 June 2003

Filter Results

Displaying Results 1 - 25 of 72
  • Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises

    Publication Year: 2003
    Request permission for commercial reuse | PDF file iconPDF (295 KB)
    Freely Available from IEEE
  • Instructional design for collaborative e-learning

    Publication Year: 2003
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Summary form only given, as follows. Today's business world more and more relies on faster and reliable access to information and knowledge. The creation of the underlying content structures to represent the knowledge, like business data (structured information), text and multimedia information, is becoming an important driving factor for those who rely on the knowledge. The rapid transformation i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2003, Page(s):407 - 408
    Request permission for commercial reuse | PDF file iconPDF (159 KB)
    Freely Available from IEEE
  • KEPT: a knowledge elicitaiton tool to support communities of practice

    Publication Year: 2003, Page(s):346 - 351
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (338 KB) | HTML iconHTML

    This paper illustrates how Knowledge Management Systems (KMSs) can improve the capability of Communities of Practice (CoPs) to be agile in their activities. As a case study, the P-Truck Project is presented, whose goal is the development of a KMS to support experts in the decision making process about the different phases of the truck tyre production process. In particular, KEPT, (i.e. Knowledge E... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Policy storage for role-based access control systems

    Publication Year: 2003, Page(s):196 - 201
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB) | HTML iconHTML

    Role-based access control has been a focal area for many researchers over the last decade. There have been a large number of models, and many rich specification languages. However there has been little attention paid to the way in which access control policy is stored persistently. This paper investigates policy storage form the perspective of access control to the policy itself, and of its distri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Weakly-structured workflows for knowledge-intensive tasks: an experimental evaluation

    Publication Year: 2003, Page(s):340 - 345
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (303 KB) | HTML iconHTML

    Knowledge work cannot typically be modeled sufficiently by classical, static process models. To enable a process-oriented knowledge management (KM) approach under these circumstances, the concept of weakly-structured workflows has been developed. This approach intertwines process modeling and workflow enactment and facilitates active information support in dynamically changing environments. Furthe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling contribution for virtual enterprise support

    Publication Year: 2003, Page(s):165 - 170
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (342 KB) | HTML iconHTML

    The design or the realization of any project implies the involvement of a set of agents that can be individuals, teams or enterprises. These agents share resources and competencies, similar or dissimilar, and cooperate in order to reach some shared objectives by using Information Technologies. We speak then about virtual enterprises. However, exchanging data is not sufficient to support virtual en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A network worm vaccine architecture

    Publication Year: 2003, Page(s):220 - 225
    Cited by:  Papers (19)  |  Patents (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (229 KB) | HTML iconHTML

    The ability of worms to spread at rates that effectively preclude human-directed reaction has elevated them to a first-class security threat to distributed systems. We present the first reaction mechanism that seeks to automatically patch vulnerable software. Our system employs a collection of sensors that detect and capture potential worm infection vectors. We automatically test the effects of th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification and verification of constraints in role based access control

    Publication Year: 2003, Page(s):190 - 195
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (221 KB) | HTML iconHTML

    The paper presents a short overview of the foundations of the role-based access control modal and its properties. In particular, the problem of definition and verification of various types of constraints is analysed. The main benefit of the presented model is that it is based on the fundamental notions of both enterprise management and information systems access control. The other important value ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proactive knowledge distribution for agile processes

    Publication Year: 2003, Page(s):338 - 339
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (189 KB) | HTML iconHTML

    Monitored distribution (MD) is a case-based approach for proactive knowledge distribution. MD allows the dissemination of knowledge artifacts in a just-in-time fashion in the context of its applicable targeted processes. In MD, knowledge artifacts are retrieved when they are applicable to the task in which a user is currently engaged. We define MD's requirements and argue that it can be applied to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An agent-based evaluation framework for supporting virtual enterprise formation

    Publication Year: 2003, Page(s):159 - 164
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB) | HTML iconHTML

    Virtual enterprises are complex entities and represent a number of business situations. We have analysed an agent-based approach to support the formation of Virtual Enterprises using several industrial case studies. We present our results as an evaluation framework to identify the applicability of the approach to support the formation of virtual enterprises. It is an expensive indicator of when th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic synthesis of coordinators for COTS groupware applications: an example

    Publication Year: 2003, Page(s):123 - 128
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    The coordination of concurrent activities in collaborative environments is a very important and difficult task. Many approaches for the construction of large-scale flexible group-ware applications there exist in the literature. They provide valid support to modeling, analysis and to a whitebox developing of coordination protocols for computer supported cooperative applications. Little attention ha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured Advanced Federated Environment (SAFE): a NASA solution for secure cross-organization collaboration

    Publication Year: 2003, Page(s):214 - 219
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (205 KB) | HTML iconHTML

    This paper discusses the challenges and security issues inherent in building complex cross-organizational hierarchy and inter-organizational federation, the Secured Advanced Federated Environment (SAFE) is laying the foundation for a collaborative virtual infrastructure for the NASA community. A key element of SAFE is the Micro Security Domain (MSD) concept, which balances the need to collaborate ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifying enterprise's mandatory access control policies with coloured Petri nets

    Publication Year: 2003, Page(s):184 - 189
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    The paper addresses important problems met when implementing mandatory access control policies in complex distributed systems (e.g. enterprise networks). The role of formal security models is also presented and the properties of the model suitable for systems under consideration are defined. Then a formal security model, Secure Coloured Petri - using coloured Petri net's semantics - is proposed. I... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting digital signatures in mobile environments

    Publication Year: 2003, Page(s):238 - 242
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (218 KB) | HTML iconHTML

    Digital signatures, like physical signatures, can verify that a specific user affixed their signature to a document and they can also verify that the document is the same as when the user affixed the digital signature. Digital signature systems (DSS) use public key cryptography methods to create digital signatures. The integrity of the digital signature is tied to the security of the user's privat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How much is "enough"? Risk in trust-based access control

    Publication Year: 2003, Page(s):281 - 282
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    Trust-based access control is the idea of using a model of human notions of trust and community as the basis for assigning privileges. Risk analysis is used to determine how much trust is required to assign a particular privilege in trust-based access control. Other topics mentioned are the validation of the model, investigation of how continuous probability density functions may be reasoned about... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The PROGEMM approach for managing clinical processes

    Publication Year: 2003, Page(s):332 - 337
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (260 KB) | HTML iconHTML

    In medical healthcare, two contrasting tendencies can be observed. On the one hand, recent technological advancements allow maintaining a quality in medical treatment that was hardly to imagine some years ago. On the other hand, the investment in newer medical devices and the necessary training of the physicians is highly cost intensive and can be hardly regained without proper management of the c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • E-MAGINE: the development of an evaluation method to assess groupware applications

    Publication Year: 2003, Page(s):153 - 158
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (225 KB) | HTML iconHTML

    This paper describes the development of the evaluation method E-MAGINE. The aim of this evaluation method is to support groups to efficiently assess the groupware applications, which fit them best. The method focuses on knowledge sharing groups and follows a modular structure. E-MAGINE is based on the Contingency Perspective in order to structurally characterize groups in their context. Another ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting rich queries in DHT-based peer-to-peer systems

    Publication Year: 2003, Page(s):95 - 100
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    A fundamental problem that confronts peer-to-peer (P2P) applications is to efficiently locate the node that stores a particular data item. DHT-based (distributed hash table) scheme improves the scalability and exact-match accuracy. However, it is not efficient for non-exact-match queries. In this paper, we present some techniques for supporting range queries and partial keyword search on top of DH... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • WebDAVA: An administrator-free approach to Web file-sharing

    Publication Year: 2003, Page(s):59 - 64
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows the users to define their own access-control policies to network resources that they control, enabling secure data sharing within the enterprise. Our design allows users to selectively give fine-grain access to their resources without... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The AMAS theory for complex problem solving based on self-organizing cooperative agents

    Publication Year: 2003, Page(s):383 - 388
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (301 KB) | HTML iconHTML

    In this paper, we present an approach for the design of complex adaptive systems, based on adaptive multi-agent systems and emergence. We expound the AMAS theory (Adaptive Multi-Agent Systems) and its technical working. This theory gives local agent design criteria so as to enable the emergence of an organization within the system and thus, of the global function of the system. We also present the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cooperating through a belief-based trust computation

    Publication Year: 2003, Page(s):263 - 268
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Many approaches to the trust study exist in literature. In our view, just a socio-cognitive approach to trust would be able to analyze the sub-components (the basic beliefs) on which the final decision to trust or not is taken. In this paper, we show a first implementation and advance of the socio-cognitive model of trust developed according to C. Castelfranchi and R. Falcone (1998) and R. Falcone... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Designing coordination systems for distributed teamwork

    Publication Year: 2003, Page(s):117 - 122
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (252 KB) | HTML iconHTML

    Contemporary working environments are increasingly complex, volatile and physically distributed. Coordinating work in such environments is therefore becoming a major challenge as the traditional focus on efficient schedules is shifting to include other factors such as rapid reaction to market changes. This paper argues that effective coordination support should be based on a two-level coordination... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lessons learned about distributed pair programming: what are the knowledge needs to address?

    Publication Year: 2003, Page(s):314 - 319
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (261 KB) | HTML iconHTML

    We have realized an experiment aimed at understanding the impact of distribution on time and quality of code developed with pair programming. From this experimental data's analysis the pair dismissal phenomenon has stemmed. After the experiment, we have conducted an assessment discussion guided by a questionnaire. The assessment confirmed the dismissal hypothesis and highlighted knowledge needs to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A hybrid key tree scheme for multicast to balance security and efficiency requirements

    Publication Year: 2003, Page(s):208 - 213
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (290 KB) | HTML iconHTML

    Security and efficiency of rekeying are crucial requirements for multicast key management. However, the two requirements pull in different directions and balancing them to meet the application needs is still an open issue. In this paper we introduce a hybrid key tree scheme to balance security, namely the resistance to collusion, and the efficiency. The resistance to collusion is measured by an in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.