In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system's performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs' expectations. The reputation mechanism is distributed, considers both first-hand information (acquired from the SRR's direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs' past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings.
{"title":"Trust Management Framework for Efficient Service Provisioning in Dynamic Distributed Computing Environments","authors":"M. Louta, A. Michalas","doi":"10.1109/ICIW.2008.44","DOIUrl":"https://doi.org/10.1109/ICIW.2008.44","url":null,"abstract":"In dynamic distributed computing environments, system entities may be classified into two main categories that are, in principle, in conflict. These are the Service Resource Requestors (SRRs) wishing to use services and/or exploit resources offered by the other system entities and the Service Resource Providers (SRPs) that offer the services/resources requested. Seeking for the maximisation of their welfare, while achieving their own goals and aims, entities may misbehave (intentionally or unintentionally), thus, leading to a significant deterioration of system's performance. In this study, a reputation mechanism is proposed which helps estimating SRPs trustworthiness and predicting their future behaviour, taking into account their past performance in consistently satisfying SRRs' expectations. The reputation mechanism is distributed, considers both first-hand information (acquired from the SRR's direct past experiences with the SRPs) and second-hand information (disseminated from other SRRs' past experiences with the SRPs), while it exhibits a robust behaviour against inaccurate reputation ratings.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"100 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121113199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime.
本项目概述了一些利用信息通信技术促进可持续高等教育培训计划的教师培训战略,以及信息通信技术在向普及培训环境转变中的作用。墨西哥南阿纳瓦克大学(Anahuac Mexico Sur University)的企业电子学习中心(CELC)已努力实施不同的方法来培训教师使用ict。第一种方法包括使用学习管理系统的技术工具对教师进行协作学习策略的培训。第二种方法包括在一个受控空间进行个性化培训,并为教师课程提供特定工具。第二种方法是建立一个名为CEIC实验室的实验室,该实验室具有人体工程学教学布局。本项目描述了第三种方法,并将前两种方法的经验和结果结合起来。第三种方法称为u-training,它结合了教学设计、电子商务、营销、信息通信技术、度量控制方案和奖励管理方案,创建了一个无处不在的培训门户,以便随时随地提供教师培训。
{"title":"U-Training. A Framework to Create Ubiquitous Training Portals for Higher Education Teachers","authors":"Oscar Díaz-Alcántara","doi":"10.1109/ICIW.2008.27","DOIUrl":"https://doi.org/10.1109/ICIW.2008.27","url":null,"abstract":"This project outlines some teacher training strategies using the information and communication technologies (ICTs) to contribute to sustainable higher educational training programmes and their role in the shift towards ubiquitous training environments. The Corporate E-Learning Centre (CELC), at Anahuac Mexico Sur University, has made some efforts to implement different approaches for training teachers in ICTs. The first approach consisted of training teachers in the collaborative learning strategy using the technology tools of a learning management system. The second approach consisted of personalised training in a controlled space and with specific tools for teachers courses. This second approach was concluded with the creation of a laboratory called CEIC lab, which has an ergonomic-didactic layout. The third approach is described in this project and unites the experiences and results of the previous two approaches. This third approach called u-training combines instructional design, e-commerce, marketing, ICTs, a metric control programme and a reward management programme to create a ubiquitous training portal so that teacher training can be available anywhere and anytime.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130736022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Peer-to-peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism enables mobile users to contribute with any device and receive P2P services with mobile devices. We explore security issues related to a centralized incentive mechanism by analyzing and classifying threats and potential security mechanisms. We propose a privacy preserving security architecture. The architecture is based on authentication, software tamper protection, and misbehavior detection mechanisms. Further, we provide a discussion on potential security compromises, not jeopardizing sufficient security level, and describe a prototype implementation for mobile BitTorrent file sharing peers.
{"title":"A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices","authors":"Jani Suomalainen, Anssi Pehrsson, J. Nurminen","doi":"10.1109/ICIW.2008.116","DOIUrl":"https://doi.org/10.1109/ICIW.2008.116","url":null,"abstract":"Peer-to-peer applications are emerging into mobile devices. However, resource limitations of these devices introduce new challenges for P2P technologies. For instance, there is a need for incentive mechanisms, which address the free riding problem but do not waste devices' battery or communication resources. A centralized and user-identity based incentive mechanism enables mobile users to contribute with any device and receive P2P services with mobile devices. We explore security issues related to a centralized incentive mechanism by analyzing and classifying threats and potential security mechanisms. We propose a privacy preserving security architecture. The architecture is based on authentication, software tamper protection, and misbehavior detection mechanisms. Further, we provide a discussion on potential security compromises, not jeopardizing sufficient security level, and describe a prototype implementation for mobile BitTorrent file sharing peers.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131039221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bus route system is the fundamental transportation device for aged people and students, and has an important role in every province. However, passengers decreases year by year, therefore the authors have developed the shortest path searching system called "BUS-NET" as a web application to sustain the public transport. Here, we take up generation of timetables. In general, timetable generation is considered as a very simple problem. However, there are some difficult problems. Firstly, bus stops of the same name are managed as one bus stop in the database of our system on grounds that error and cost decrease. Therefore, when timetables are generated, such bus stops must be distinguished. Secondly, there are so many bus stops in the timetables of bus route. However, all of them are not needed for an individual user in most cases. Thus, some bus stops may be excluded when a user intends to obtain a timetable of a bus route. In this paper, the authors report on the algorithms to solve those problems and the implementations, experiments of the functions.
{"title":"Web Application to Generate Route Bus Timetables","authors":"K. Toshioka, T. Kawamura, K. Sugahara","doi":"10.1109/ICIW.2008.75","DOIUrl":"https://doi.org/10.1109/ICIW.2008.75","url":null,"abstract":"Bus route system is the fundamental transportation device for aged people and students, and has an important role in every province. However, passengers decreases year by year, therefore the authors have developed the shortest path searching system called \"BUS-NET\" as a web application to sustain the public transport. Here, we take up generation of timetables. In general, timetable generation is considered as a very simple problem. However, there are some difficult problems. Firstly, bus stops of the same name are managed as one bus stop in the database of our system on grounds that error and cost decrease. Therefore, when timetables are generated, such bus stops must be distinguished. Secondly, there are so many bus stops in the timetables of bus route. However, all of them are not needed for an individual user in most cases. Thus, some bus stops may be excluded when a user intends to obtain a timetable of a bus route. In this paper, the authors report on the algorithms to solve those problems and the implementations, experiments of the functions.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133505243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper evaluates replication possibilities for Web services at the operating system level and how they affect Web service performance. This is done in the context of architectural translucency - an approach that defines layers in a service-oriented architecture and states that similar measures have different implications on nonfunctional properties when applied at different layers in different ways. The observed layer here is the operating system. The work presents current request processing techniques and how they are implemented in a typical platform for Web services (Windows Server 2003, IIS and .NET). It then proposes two ways to replicate Web services - per-process replication and per-thread replication and techniques to configure them on the selected platform. The case study demonstrates the feasibility of the concept with performance advantages of up to 50%.
本文评估了操作系统级别上Web服务的复制可能性,以及它们如何影响Web服务性能。这是在体系结构半透明的上下文中完成的——这种方法在面向服务的体系结构中定义层,并声明当以不同的方式应用于不同的层时,类似的度量对非功能属性有不同的含义。这里观察的层是操作系统。本书介绍了当前的请求处理技术,以及如何在典型的Web服务平台(Windows Server 2003、IIS和. net)中实现这些技术。然后提出了两种复制Web服务的方法——每进程复制和每线程复制,以及在所选平台上配置它们的技术。案例研究证明了该概念的可行性,性能优势高达50%。
{"title":"Addressing Web Service Performance by Replication at the Operating System Level","authors":"V. Stantchev, M. Malek","doi":"10.1109/ICIW.2008.113","DOIUrl":"https://doi.org/10.1109/ICIW.2008.113","url":null,"abstract":"This paper evaluates replication possibilities for Web services at the operating system level and how they affect Web service performance. This is done in the context of architectural translucency - an approach that defines layers in a service-oriented architecture and states that similar measures have different implications on nonfunctional properties when applied at different layers in different ways. The observed layer here is the operating system. The work presents current request processing techniques and how they are implemented in a typical platform for Web services (Windows Server 2003, IIS and .NET). It then proposes two ways to replicate Web services - per-process replication and per-thread replication and techniques to configure them on the selected platform. The case study demonstrates the feasibility of the concept with performance advantages of up to 50%.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133458880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many companies today are providing customer services via the Web and the telephone. Demand for providing Web data in audio form is increasing every day. Voice response facilities are used for various kinds of information over the phone: time, weather, horoscopes, lottery results, sports events, news, etc. VoiceXML is an enabling technology for creating a streamlined speech-based interface for web-based information services. Speech technology, as it improves, will become a very natural and powerful interface for ubiquitous access to information. Moreover, VoiceXML applications are available through computers or through the telephone, which is a universal means of communication. In this paper, we describe a dynamic speech-enabled system powered by VoiceXML in which the available information is dynamically generated by PHP.
{"title":"A Dynamic Voice Portal for Delivery of Cultural Content","authors":"Evangelia Boufardea, J. Garofalakis, A. Plessas","doi":"10.1109/ICIW.2008.90","DOIUrl":"https://doi.org/10.1109/ICIW.2008.90","url":null,"abstract":"Many companies today are providing customer services via the Web and the telephone. Demand for providing Web data in audio form is increasing every day. Voice response facilities are used for various kinds of information over the phone: time, weather, horoscopes, lottery results, sports events, news, etc. VoiceXML is an enabling technology for creating a streamlined speech-based interface for web-based information services. Speech technology, as it improves, will become a very natural and powerful interface for ubiquitous access to information. Moreover, VoiceXML applications are available through computers or through the telephone, which is a universal means of communication. In this paper, we describe a dynamic speech-enabled system powered by VoiceXML in which the available information is dynamically generated by PHP.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131350758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we consider the use of XML technology for the data repository and data layer in the Hyperbook system. We propose the Hyperbook data layer (HBDL) for Hyperbook data repository using RDBMS. In HBDL the transformation technique from XML to relational data is the schema independent. The approach observes an XML file as consisting of terms of hierarchical data structure. Each node of data is made up of label and data fields. Each node is converted to a record in a relational table.
{"title":"Data Repository and Data Layer in Hyperbook System Using XML RDBS","authors":"Abdoulmajid Hakki, A. Kaarna","doi":"10.1109/ICIW.2008.92","DOIUrl":"https://doi.org/10.1109/ICIW.2008.92","url":null,"abstract":"In this paper we consider the use of XML technology for the data repository and data layer in the Hyperbook system. We propose the Hyperbook data layer (HBDL) for Hyperbook data repository using RDBMS. In HBDL the transformation technique from XML to relational data is the schema independent. The approach observes an XML file as consisting of terms of hierarchical data structure. Each node of data is made up of label and data fields. Each node is converted to a record in a relational table.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner
The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919).
{"title":"Business Episodes and Workflow Integration: A Use Case in LD-CAST","authors":"D. Karagiannis, R. Woitsch, W. Utz, Vedran Hrgovcic, H. Eichner","doi":"10.1109/ICIW.2008.88","DOIUrl":"https://doi.org/10.1109/ICIW.2008.88","url":null,"abstract":"The integration of the business and technical views allows domain experts from the business view to take control over the whole process of service delivery (including the generation of the executable workflows) to the end users. The integration approach of business and technical views presented in this paper is supported by semi-automatic generation of ontology from the modeled business episodes. This approach is evaluated and presented through the use case example from the LD-CAST project (FP6-ICT-26919).","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129077482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed protocols, and propose a secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed protocol is able to simultaneously solve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed protocol, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.
{"title":"On Secure and Anonymous Buyer-Seller Watermarking Protocol","authors":"Mina Deng, B. Preneel","doi":"10.1109/ICIW.2008.28","DOIUrl":"https://doi.org/10.1109/ICIW.2008.28","url":null,"abstract":"Buyer-seller watermarking protocols incorporate digital watermarking with cryptography, in order to protect digital copyrights and privacy rights for the seller and the buyer before, during, and after purchase activities in e-commerce. In this paper, we analyze the security of some previously proposed protocols, and propose a secure and anonymous buyer-seller watermarking protocol. In contrast to early work, our improvement on the protocol's security properties ensures that the design requirements are fulfilled. The proposed protocol is able to simultaneously solve the piracy tracing problem, the customer's rights problem, the unbinding problem, the anonymity problem, the conspiracy problem, and the dispute problem. In the proposed protocol, a buyer can purchase digital contents anonymously but his anonymity can be revoked as soon as he is adjudicated to be guilty by a legal institute, such as civil court.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126360408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Control of pervasive computing environments is a well- known problem. Such management has to tackle issues of heterogeneity, dynamic binding, interoperability, security, and scalability, among others. The approach used in our AutoHAN home automation system is presented here. It employs a high-level rule-based control atop an ontological substrate, interacting with an application-level layer of rules. This design allows formalised representation of a domain, which lends itself to checkability, along with its reliable control. We discuss the implementation and characteristics of our approach.
{"title":"Checkable Domain Management with Ontology and Rules","authors":"Atif Alvi, D. Greaves","doi":"10.1109/ICIW.2008.65","DOIUrl":"https://doi.org/10.1109/ICIW.2008.65","url":null,"abstract":"Control of pervasive computing environments is a well- known problem. Such management has to tackle issues of heterogeneity, dynamic binding, interoperability, security, and scalability, among others. The approach used in our AutoHAN home automation system is presented here. It employs a high-level rule-based control atop an ontological substrate, interacting with an application-level layer of rules. This design allows formalised representation of a domain, which lends itself to checkability, along with its reliable control. We discuss the implementation and characteristics of our approach.","PeriodicalId":139145,"journal":{"name":"2008 Third International Conference on Internet and Web Applications and Services","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122876729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}