With an increasing density of computationally enhanced objects that are distributed in physical space, it becomes important that they operate autonomously and allow for a more implicit interaction with humans. Spatial properties and relations are important in this regard, as an awareness about such context information builds up the basis for automatically adapting to spatial changes in the environment. In this paper, we propose a relation-centric approach for the development of spatially-aware applications for autonomous embedded systems, which builds upon qualitative abstractions of spatial relations and the rule-based inference of conclusions from them. We implemented a service-oriented software framework therefore and demonstrate our approach by means of two application scenarios.
{"title":"Relation-Centric Development of Spatially-Aware Applications","authors":"Clemens Holzmann, M. Hechinger, A. Ferscha","doi":"10.1109/WETICE.2008.22","DOIUrl":"https://doi.org/10.1109/WETICE.2008.22","url":null,"abstract":"With an increasing density of computationally enhanced objects that are distributed in physical space, it becomes important that they operate autonomously and allow for a more implicit interaction with humans. Spatial properties and relations are important in this regard, as an awareness about such context information builds up the basis for automatically adapting to spatial changes in the environment. In this paper, we propose a relation-centric approach for the development of spatially-aware applications for autonomous embedded systems, which builds upon qualitative abstractions of spatial relations and the rule-based inference of conclusions from them. We implemented a service-oriented software framework therefore and demonstrate our approach by means of two application scenarios.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116555930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.
{"title":"Defusing Intrusion Capabilities by Collaborative Anomalous Trust","authors":"Khalil A. Abuosba, C. Martin","doi":"10.1109/WETICE.2008.32","DOIUrl":"https://doi.org/10.1109/WETICE.2008.32","url":null,"abstract":"From a computer security perspective, services provided by distributed information systems may be organized based on their security attributes goals and requirements; these processes and services are categorized as anonymous, registered, encrypted and trusted. In this research, we propose a solution for operational trust assurance problems where vulnerabilities reduction is implicitly observed. Collaborative anomalous trust management (CATM) is a methodology that may be utilized for the purpose of affirming trust between communications endpoints. In conjunction with trusted computing base, zero knowledge protocol, and layered trust, CATM is defined. CATM builds its trust credentials based on computing environment variables. Ideally this methodology is suited for service oriented architectures such as Web services where service providers and consumers interact at different levels of security requirements. This methodology is best optimized for use as a risk management utility. In this approach vulnerabilities are implicitly reduced, hence intrusion capabilities are defused.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134242937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The notion of workflows has evolved from a means to describe the flow of paperwork through an organization to a more abstract and general technique used to express best practices and lessons learned in many application domains. When putting workflow definitions into practice, it is important to stay informed which tasks are currently performed, as this allows detecting slipping schedules or unwanted deviations. In this paper, an agent-based approach for automatically tracking the set of active tasks is presented by observing the data produced during enactment. This enables short-term planning and quality control without obliging team members to explicitly document progress.
{"title":"An Agent-Oriented System for Workflow Enactment Tracking","authors":"T. Sauer, Mirjam Minor, Sascha Werno","doi":"10.1109/WETICE.2008.28","DOIUrl":"https://doi.org/10.1109/WETICE.2008.28","url":null,"abstract":"The notion of workflows has evolved from a means to describe the flow of paperwork through an organization to a more abstract and general technique used to express best practices and lessons learned in many application domains. When putting workflow definitions into practice, it is important to stay informed which tasks are currently performed, as this allows detecting slipping schedules or unwanted deviations. In this paper, an agent-based approach for automatically tracking the set of active tasks is presented by observing the data produced during enactment. This enables short-term planning and quality control without obliging team members to explicitly document progress.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129521600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Process management incorporates a plethora of models, which are expressed in different languages for different layers of abstraction. A holistic process modeling environment must provide means for dealing with three types of modeling constraints. First, it must ensure a model's correctness. Second, a modeling environment must account for compliance of models with respect to models on higher layers of abstraction. Third, consistency of different models of the same language layer should be supported. In this paper, we exemplify these three constraint types and discuss how they can be enforced in a holistic modeling environment.
{"title":"On Correctness, Compliance and Consistency of Process Models","authors":"R. Wörzberger, T. Kurpick, T. Heer","doi":"10.1109/WETICE.2008.9","DOIUrl":"https://doi.org/10.1109/WETICE.2008.9","url":null,"abstract":"Process management incorporates a plethora of models, which are expressed in different languages for different layers of abstraction. A holistic process modeling environment must provide means for dealing with three types of modeling constraints. First, it must ensure a model's correctness. Second, a modeling environment must account for compliance of models with respect to models on higher layers of abstraction. Third, consistency of different models of the same language layer should be supported. In this paper, we exemplify these three constraint types and discuss how they can be enforced in a holistic modeling environment.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124524436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
J. A. Blaya, A. Gómez-Skarmeta, Hoa Ha Doung, I. Demeure
In this paper we present a context-aware data sharing service over MANet to enable spontaneous collaboration between mobile workers. Context information is used to adapt services and applications to user situation as well as working groups situation. The paper first presents the data sharing system. It then describes the context awareness service. We explain how data sharing uses context information to adapt to changing conditions and how the context service relies on data sharing to store context information afterwards. Context aware and data sharing services maintain a mutually beneficial interaction. Both services are part of a software framework for spontaneous collaboration over MANets that is developed within the Popeye European IST research project.
{"title":"A Context-Sware Data Sharing Service over MANet to Enable Spontaneous Collaboration","authors":"J. A. Blaya, A. Gómez-Skarmeta, Hoa Ha Doung, I. Demeure","doi":"10.1109/WETICE.2008.13","DOIUrl":"https://doi.org/10.1109/WETICE.2008.13","url":null,"abstract":"In this paper we present a context-aware data sharing service over MANet to enable spontaneous collaboration between mobile workers. Context information is used to adapt services and applications to user situation as well as working groups situation. The paper first presents the data sharing system. It then describes the context awareness service. We explain how data sharing uses context information to adapt to changing conditions and how the context service relies on data sharing to store context information afterwards. Context aware and data sharing services maintain a mutually beneficial interaction. Both services are part of a software framework for spontaneous collaboration over MANets that is developed within the Popeye European IST research project.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122585474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely accepted in military environments for its capability to specify military style confidentiality policies. The role based access control (RBAC) model has attracted extensive research effort and has been acknowledged as a flexible and policy natural model. This paper investigates a way of modeling Bell-LaPadula security policies using the RBAC model. The capability of modeling Bell-LaPadula security policies using RBAC model means that applications that are implemented using the RBAC model can then be deployed in military environments and will meet their requirements for information confidentiality.
Bell-LaPadula安全模型是一个混合模型,它结合了强制访问控制和自由访问控制。Bell-LaPadula安全模型在军事环境中被广泛接受,因为它能够指定军事风格的保密策略。基于角色的访问控制(role - based access control, RBAC)模型作为一种灵活、策略自然的模型受到了广泛的研究。本文研究了一种利用RBAC模型对Bell-LaPadula安全策略建模的方法。使用RBAC模型对Bell-LaPadula安全策略建模的能力意味着使用RBAC模型实现的应用程序随后可以部署在军事环境中,并将满足其对信息机密性的需求。
{"title":"On the Modeling of Bell-LaPadula Security Policies Using RBAC","authors":"Gansen Zhao, D. Chadwick","doi":"10.1109/WETICE.2008.34","DOIUrl":"https://doi.org/10.1109/WETICE.2008.34","url":null,"abstract":"The Bell-LaPadula security model is a hybrid model that combines mandatory access controls and discretionary access controls. The Bell-LaPadula security model has been widely accepted in military environments for its capability to specify military style confidentiality policies. The role based access control (RBAC) model has attracted extensive research effort and has been acknowledged as a flexible and policy natural model. This paper investigates a way of modeling Bell-LaPadula security policies using the RBAC model. The capability of modeling Bell-LaPadula security policies using RBAC model means that applications that are implemented using the RBAC model can then be deployed in military environments and will meet their requirements for information confidentiality.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper describes a service-oriented P2P architecture and related federated metaprogramming model to support development of highly scalable and reliable distributed collaborative applications. In the proposed architecture, autonomic service providers, corresponding to various activities that occur in the collaborative process, reside on the overlay network and are discovered dynamically during the execution of the process. To execute a specific collaboration, a set of services that map into the collaboration specification (exertion) are federated together and executed in a choreographed workflow. All services (peers) implement a standardized top-level interface and this allows any service to be seamlessly replaced with another service without affecting the performance of the federation. The paper describes a service object-oriented environment (SORCER) and presents how it supports programming of three collaboration types.
{"title":"Federated Collaborations with Exertions","authors":"M. Sobolewski","doi":"10.1109/WETICE.2008.40","DOIUrl":"https://doi.org/10.1109/WETICE.2008.40","url":null,"abstract":"This paper describes a service-oriented P2P architecture and related federated metaprogramming model to support development of highly scalable and reliable distributed collaborative applications. In the proposed architecture, autonomic service providers, corresponding to various activities that occur in the collaborative process, reside on the overlay network and are discovered dynamically during the execution of the process. To execute a specific collaboration, a set of services that map into the collaboration specification (exertion) are federated together and executed in a choreographed workflow. All services (peers) implement a standardized top-level interface and this allows any service to be seamlessly replaced with another service without affecting the performance of the federation. The paper describes a service object-oriented environment (SORCER) and presents how it supports programming of three collaboration types.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128378392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mirjam Minor, Daniel Schmalen, Jakob Weidlich, A. Koldehoff
This demo paper is on an introspection tool for an agile workflow engine that executes long-term workflows. Agile workflows are workflows whose control flow structure can be adapted at run-time. We will present the architecture of the overall agile workflow management system, briefly introduce the agile workflow modelling language, and describe the tool for the introspection into the representation and execution of the workflows.
{"title":"Introspection into an Agile Workflow Engine for Long-Term Processes","authors":"Mirjam Minor, Daniel Schmalen, Jakob Weidlich, A. Koldehoff","doi":"10.1109/WETICE.2008.24","DOIUrl":"https://doi.org/10.1109/WETICE.2008.24","url":null,"abstract":"This demo paper is on an introspection tool for an agile workflow engine that executes long-term workflows. Agile workflows are workflows whose control flow structure can be adapted at run-time. We will present the architecture of the overall agile workflow management system, briefly introduce the agile workflow modelling language, and describe the tool for the introspection into the representation and execution of the workflows.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128403052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches.
{"title":"The PIRR Methodology to Estimate Resource Requirements for Distributed NM Applications in Mobile Networks","authors":"F. Neri","doi":"10.1109/WETICE.2008.8","DOIUrl":"https://doi.org/10.1109/WETICE.2008.8","url":null,"abstract":"The current centralized Network Management approach in mobile networks may lead to problems with being able to scale up when new customer services and network nodes will be deployed in the network. The next generation mobile networks proposed by 3rd Generation Partnership Project (3GPP) envision a flat network architecture comprising some thousands of network nodes, each of which will need to be managed, in a timely and efficient fashion. This consideration has prompted a research activity to find alternative application architectures that could overcome the limits of the current centralized approaches.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121704952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manfred Bortenschlager, L. Nixon, R. Tolksdorf, E. Simperl
The "amount" of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provision of accurate knowledge with respect to a requester's context gets more challenging. Explicit coordination of knowledge can be one means to address such developments. This report summarises several works and discussions on the topic of Coordination of Knowledge in Pervasive Environments, highlights current research directions, and outlines potential future challenges.
{"title":"Coordination of Knowledge in Pervasive Environments","authors":"Manfred Bortenschlager, L. Nixon, R. Tolksdorf, E. Simperl","doi":"10.1109/WETICE.2008.53","DOIUrl":"https://doi.org/10.1109/WETICE.2008.53","url":null,"abstract":"The \"amount\" of knowledge is constantly growing. Technological advances more and more facilitate an access to knowledge in an anytime, anywhere, and anyhow manner. The provision of accurate knowledge with respect to a requester's context gets more challenging. Explicit coordination of knowledge can be one means to address such developments. This report summarises several works and discussions on the topic of Coordination of Knowledge in Pervasive Environments, highlights current research directions, and outlines potential future challenges.","PeriodicalId":259447,"journal":{"name":"2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127206664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}