首页 > 最新文献

2008 International MCETECH Conference on e-Technologies (mcetech 2008)最新文献

英文 中文
Learning to Trust the Crowd: Some Lessons from Wikipedia 学会信任大众:维基百科的一些教训
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.17
F. Olleros
Inspired by the open source software (OSS) movement, Wikipedia has gone further than any OSS project in decentralizing its quality control task. This is seen by many as a fatal flaw. In this short paper, the author try to show that it is rather a shrewd and fertile design choice. First, the author describes the precise way in which Wikipedia is more decentralized than OSS projects. Secondly, the author explains why Wikipedia's quality control can be and must be decentralized. Thirdly, the author show why it is wise for Wikipedia to welcome anonymous amateurs. Finally, the author argue that concerns about Wikipedia's quality and sustainable success have to be tempered by the fact that, as disruptive innovations tend to do, Wikipedia is in the process of redefining the pertinent dimensions of quality and value for general encyclopedias.
受开源软件(OSS)运动的启发,Wikipedia在分散其质量控制任务方面比任何OSS项目都走得更远。许多人认为这是一个致命的缺陷。在这篇短文中,作者试图表明这是一个相当精明和丰富的设计选择。首先,作者描述了维基百科比OSS项目更去中心化的确切方式。其次,作者解释了为什么维基百科的质量控制可以而且必须去中心化。第三,作者说明了为什么维基百科欢迎匿名的业余爱好者是明智的。最后,作者认为,对于维基百科的质量和可持续成功的担忧,必须考虑到这样一个事实:正如颠覆性创新往往会做的那样,维基百科正在重新定义一般百科全书的质量和价值的相关维度。
{"title":"Learning to Trust the Crowd: Some Lessons from Wikipedia","authors":"F. Olleros","doi":"10.1109/MCETECH.2008.17","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.17","url":null,"abstract":"Inspired by the open source software (OSS) movement, Wikipedia has gone further than any OSS project in decentralizing its quality control task. This is seen by many as a fatal flaw. In this short paper, the author try to show that it is rather a shrewd and fertile design choice. First, the author describes the precise way in which Wikipedia is more decentralized than OSS projects. Secondly, the author explains why Wikipedia's quality control can be and must be decentralized. Thirdly, the author show why it is wise for Wikipedia to welcome anonymous amateurs. Finally, the author argue that concerns about Wikipedia's quality and sustainable success have to be tempered by the fact that, as disruptive innovations tend to do, Wikipedia is in the process of redefining the pertinent dimensions of quality and value for general encyclopedias.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114550008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
A Model of Trusted Data Collection for Knowledge Discovery in B2B Networks 面向B2B网络知识发现的可信数据收集模型
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.22
Jun Hu, L. Peyton, C. Turner, H. Bishay
With widespread use of the Internet, data is often shared between organizations in B2B networks. Knowledge discovery that integrates data across all sources in a B2B network would be useful to provide a complete view of how the overall network is performing in meeting the needs of consumers. To enable this, business agreements must be in place as well as consumer consent and access controls to ensure compliance with privacy laws. This paper presents a Trusted Data Collection architecture as a legal and technical tool to allow knowledge discovery to take place while ensuring that personal information is safeguarded. A key component in this architecture is a Dataset Registry that defines and registers the datasets that can be shared, accessed, and collected across a B2B network. We propose a data and access control model for the Dataset Registry and illustrate it using an e-health scenario.
随着Internet的广泛使用,数据经常在B2B网络中的组织之间共享。集成B2B网络中所有来源的数据的知识发现对于提供整个网络如何满足消费者需求的完整视图非常有用。要实现这一点,必须制定业务协议以及消费者同意和访问控制,以确保遵守隐私法。本文提出了一种可信数据收集体系结构,作为一种法律和技术工具,在确保个人信息得到保护的同时允许进行知识发现。这个体系结构中的一个关键组件是Dataset Registry,它定义并注册可以在B2B网络中共享、访问和收集的数据集。我们为数据集注册中心提出了一个数据和访问控制模型,并使用电子健康场景对其进行了说明。
{"title":"A Model of Trusted Data Collection for Knowledge Discovery in B2B Networks","authors":"Jun Hu, L. Peyton, C. Turner, H. Bishay","doi":"10.1109/MCETECH.2008.22","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.22","url":null,"abstract":"With widespread use of the Internet, data is often shared between organizations in B2B networks. Knowledge discovery that integrates data across all sources in a B2B network would be useful to provide a complete view of how the overall network is performing in meeting the needs of consumers. To enable this, business agreements must be in place as well as consumer consent and access controls to ensure compliance with privacy laws. This paper presents a Trusted Data Collection architecture as a legal and technical tool to allow knowledge discovery to take place while ensuring that personal information is safeguarded. A key component in this architecture is a Dataset Registry that defines and registers the datasets that can be shared, accessed, and collected across a B2B network. We propose a data and access control model for the Dataset Registry and illustrate it using an e-health scenario.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117105040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Signature-Based Composition of Web Services 基于签名的Web服务组合
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.34
A. Alkamari, H. Mili, A. Obaid
The Web services family of standards promotes the interoperability of heterogeneous distributed systems by separating the definition of a service from, 1) its implementation language, 2) its internal data representation, and 3) the communication protocol used to access it. The UDDI standard addresses aspects related to the publication and querying of enterprise business services, but the kind of representation that is supported, and the corresponding queries have limited functionality. We are interested in the problem of querying a UDDI registry with a functional specification of a service, and getting in return a single service, or a composition of services that address the functional need. Existing approaches to Web service composition rely on external semantic knowledge to identify candidate component services. Our approach relies on service signatures (message types). We describe the principles underlying our approach, a family of algorithms for Web service composition, our implementation of these algorithms, and the preliminary experimental results.
Web服务标准家族通过将服务的定义与1)其实现语言、2)其内部数据表示和3)用于访问它的通信协议分离开来,促进了异构分布式系统的互操作性。UDDI标准处理与企业业务服务的发布和查询相关的方面,但是所支持的表示形式和相应的查询功能有限。我们感兴趣的问题是,用服务的功能规范查询UDDI注册中心,并得到满足功能需求的单个服务或服务组合。现有的Web服务组合方法依赖于外部语义知识来标识候选组件服务。我们的方法依赖于服务签名(消息类型)。我们描述了支持我们的方法的原则、用于Web服务组合的一系列算法、这些算法的实现以及初步的实验结果。
{"title":"Signature-Based Composition of Web Services","authors":"A. Alkamari, H. Mili, A. Obaid","doi":"10.1109/MCETECH.2008.34","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.34","url":null,"abstract":"The Web services family of standards promotes the interoperability of heterogeneous distributed systems by separating the definition of a service from, 1) its implementation language, 2) its internal data representation, and 3) the communication protocol used to access it. The UDDI standard addresses aspects related to the publication and querying of enterprise business services, but the kind of representation that is supported, and the corresponding queries have limited functionality. We are interested in the problem of querying a UDDI registry with a functional specification of a service, and getting in return a single service, or a composition of services that address the functional need. Existing approaches to Web service composition rely on external semantic knowledge to identify candidate component services. Our approach relies on service signatures (message types). We describe the principles underlying our approach, a family of algorithms for Web service composition, our implementation of these algorithms, and the preliminary experimental results.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127817911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Ontology Learning from Text Using Relational Concept Analysis 基于关系概念分析的文本本体学习
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.29
M. Hacene, A. Napoli, Petko Valtchev, Y. Toussaint, R. Bendaoud
We propose an approach for semi-automated construction of ontologies from text whose core component is a relational concept analysis (RCA) framework which extends formal concept analysis (FCA), a lattice-theory paradigm for discovering abstractions within objects x attributes tables, to the processing of several sorts of individuals described both by own properties and inter-individual links. As a pre-processing, text analysis is used to transform a document collection into a set of data tables, or contexts, and inter-context relations. RCA then turns these into a set of concept lattices with inter-related concepts. A core ontology is derived from the lattices in a semi-automated manner, by translating relevant lattice elements into ontological concepts and relations, i.e., either taxonomic or transversal ones. The ontology is further refined by abstracting new transversal relations from the initially identified ones using RCA. We discuss as well the results of an application of the method to astronomy texts.
我们提出了一种从文本中半自动构建本体的方法,其核心组件是关系概念分析(RCA)框架,该框架扩展了形式概念分析(FCA),这是一种用于发现对象x属性表中的抽象的格理论范式,用于处理由自身属性和个体间链接描述的几种个体。作为预处理,文本分析用于将文档集合转换为一组数据表或上下文以及上下文间关系。然后,RCA将这些转化为一组概念格,其中包含相互关联的概念。通过将相关的格元素转换为本体论概念和关系,即分类学或横向的概念和关系,以半自动化的方式从格中派生出核心本体。通过使用RCA从最初识别的关系中抽象出新的横向关系,进一步改进了本体。我们还讨论了将该方法应用于天文学文本的结果。
{"title":"Ontology Learning from Text Using Relational Concept Analysis","authors":"M. Hacene, A. Napoli, Petko Valtchev, Y. Toussaint, R. Bendaoud","doi":"10.1109/MCETECH.2008.29","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.29","url":null,"abstract":"We propose an approach for semi-automated construction of ontologies from text whose core component is a relational concept analysis (RCA) framework which extends formal concept analysis (FCA), a lattice-theory paradigm for discovering abstractions within objects x attributes tables, to the processing of several sorts of individuals described both by own properties and inter-individual links. As a pre-processing, text analysis is used to transform a document collection into a set of data tables, or contexts, and inter-context relations. RCA then turns these into a set of concept lattices with inter-related concepts. A core ontology is derived from the lattices in a semi-automated manner, by translating relevant lattice elements into ontological concepts and relations, i.e., either taxonomic or transversal ones. The ontology is further refined by abstracting new transversal relations from the initially identified ones using RCA. We discuss as well the results of an application of the method to astronomy texts.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114239793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Modelling the Interaction of Distributed Systems as Protocols 作为协议的分布式系统交互建模
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.37
Johannes Reich Gerbersruhstraße, Wiesloch johannes. reich
In descriptions of loosely coupled process-like interactions of computational systems and especially in the literature on electronic business processes, the protocol notion is often used only informally. However, its complete expressive power becomes effective only with a precise formalization. Based on Holzmann's protocol concept, a formal protocol definition is introduced, providing an inductive definition of the protocol transition relation. The protocol transition relation describes all possible interactions between system components which are formally specified as nondeterministic extended finite input output automata. The formal approach is illustrated by means of a buying selling business interaction. Additionally, it is used to illustrate some semantic shortcomings of the "transaction pattern" approach, which tries to partition process-like interactions into one- and two-way interactions. In the discussion, the "loose" aspect of a protocol based interaction is treated. Motivated by the non-functional system relation defined by a protocol, it is proposed to classify the exchanged information between systems according to their logical relation in documents for (nondeterministic) protocols and I/O parameters for remote function calls.
在描述计算系统的松散耦合过程交互时,特别是在电子业务流程的文献中,协议概念通常只是非正式地使用。然而,只有通过精确的形式化,其完整的表达能力才能发挥作用。在Holzmann协议概念的基础上,引入了形式化的协议定义,给出了协议转换关系的归纳定义。协议转换关系描述了系统组件之间所有可能的交互,这些交互被形式化地指定为非确定性扩展有限输入输出自动机。正式的方法是通过买卖业务交互来说明的。此外,它还用于说明“事务模式”方法的一些语义缺陷,该方法试图将类流程交互划分为单向和双向交互。在讨论中,讨论了基于协议的交互的“松散”方面。基于协议定义的非功能系统关系,提出了根据(不确定性)协议文档中的逻辑关系和远程函数调用的I/O参数对系统间交换信息进行分类。
{"title":"Modelling the Interaction of Distributed Systems as Protocols","authors":"Johannes Reich Gerbersruhstraße, Wiesloch johannes. reich","doi":"10.1109/MCETECH.2008.37","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.37","url":null,"abstract":"In descriptions of loosely coupled process-like interactions of computational systems and especially in the literature on electronic business processes, the protocol notion is often used only informally. However, its complete expressive power becomes effective only with a precise formalization. Based on Holzmann's protocol concept, a formal protocol definition is introduced, providing an inductive definition of the protocol transition relation. The protocol transition relation describes all possible interactions between system components which are formally specified as nondeterministic extended finite input output automata. The formal approach is illustrated by means of a buying selling business interaction. Additionally, it is used to illustrate some semantic shortcomings of the \"transaction pattern\" approach, which tries to partition process-like interactions into one- and two-way interactions. In the discussion, the \"loose\" aspect of a protocol based interaction is treated. Motivated by the non-functional system relation defined by a protocol, it is proposed to classify the exchanged information between systems according to their logical relation in documents for (nondeterministic) protocols and I/O parameters for remote function calls.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"145 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133810947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Toward an Integrated User Requirements Notation Framework and Tool forBusiness Process Management 面向业务流程管理的集成用户需求符号框架和工具
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.30
A. Pourshahid, Daniel Amyot, L. Peyton, S. Ghanavati, Pengfei Chen, M. Weiss, A. J. Forster
A number of recent initiatives in both academia and industry have sought to achieve improvements in e- businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business processes. The User Requirements Notation (URN) has some unique features and capabilities beyond what is available in other notations that can help address alignment issues. In this paper, a URN-based framework and its supporting toolset are introduced which provide business process monitoring and performance management capabilities integrated across the BPM lifecycle. The framework extends the URN notation with Key Performance Indicators (KPI) and other concepts to measure, and align processes and goals. A healthcare case study is used to illustrate and evaluate the framework. Early results indicate the feasibility of the approach.
学术界和工业界最近都有一些倡议,试图通过利用业务流程管理(BPM)方法和工具来实现电子商务的改进。然而,在实现业务目标和业务流程之间的一致性时,仍然有一些不足之处需要解决。用户需求表示法(URN)具有一些独特的特性和功能,这些特性和功能超出了其他可以帮助解决对齐问题的表示法。本文介绍了一个基于urn的框架及其支持工具集,它提供了跨BPM生命周期集成的业务流程监控和性能管理功能。该框架用关键性能指标(KPI)和其他概念扩展了URN符号,以度量和对齐过程和目标。使用一个医疗保健案例研究来说明和评估该框架。初步结果表明该方法是可行的。
{"title":"Toward an Integrated User Requirements Notation Framework and Tool forBusiness Process Management","authors":"A. Pourshahid, Daniel Amyot, L. Peyton, S. Ghanavati, Pengfei Chen, M. Weiss, A. J. Forster","doi":"10.1109/MCETECH.2008.30","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.30","url":null,"abstract":"A number of recent initiatives in both academia and industry have sought to achieve improvements in e- businesses through the utilization of Business Process Management (BPM) methodologies and tools. However there are still some inadequacies that need to be addressed when it comes to achieving alignment between business goals and business processes. The User Requirements Notation (URN) has some unique features and capabilities beyond what is available in other notations that can help address alignment issues. In this paper, a URN-based framework and its supporting toolset are introduced which provide business process monitoring and performance management capabilities integrated across the BPM lifecycle. The framework extends the URN notation with Key Performance Indicators (KPI) and other concepts to measure, and align processes and goals. A healthcare case study is used to illustrate and evaluate the framework. Early results indicate the feasibility of the approach.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123207367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Implementing ERP in SMEs: Towards an Ontology Supporting Managerial Decisions 中小企业ERP的实施:面向支持管理决策的本体
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.11
H. Nach, A. Lejeune
The purpose of this research project is to consolidate and formalize as ontology, on the basis of an extensive literature review, the key processes and skills required for successful implementation of ERP in an SME. Using the Protege software program, the research identified and formalized 395 terms, each of which has its own definition. Exploitation of this ontology could take multiple and varied forms, including creation of a learning system, an on-line cooperation platform, or a project management process mapping tool contributing to successful use of ERP in SMEs.
本研究项目的目的是在广泛文献综述的基础上,巩固和形式化在中小企业中成功实施ERP所需的关键流程和技能。使用Protege软件程序,该研究确定并形式化了395个术语,每个术语都有自己的定义。该本体的开发可以采取多种形式,包括创建学习系统、在线合作平台或项目管理过程映射工具,有助于在中小企业中成功使用ERP。
{"title":"Implementing ERP in SMEs: Towards an Ontology Supporting Managerial Decisions","authors":"H. Nach, A. Lejeune","doi":"10.1109/MCETECH.2008.11","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.11","url":null,"abstract":"The purpose of this research project is to consolidate and formalize as ontology, on the basis of an extensive literature review, the key processes and skills required for successful implementation of ERP in an SME. Using the Protege software program, the research identified and formalized 395 terms, each of which has its own definition. Exploitation of this ontology could take multiple and varied forms, including creation of a learning system, an on-line cooperation platform, or a project management process mapping tool contributing to successful use of ERP in SMEs.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126213083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Understanding and Countering Insider Threats in Software Development 理解和应对软件开发中的内部威胁
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.32
M. Franz
E-commerce and e-government depend on trustworthy software platforms. Unfortunately, barely a week goes by without the discovery of a "critical" software vulnerability that would give a remote party complete access to a large number of network-attached computers. Considering the rising financial incentives and the immeasurable strategic importance of such vulnerabilities, one should assume that there are parties within commercial software companies that are actively scouting out (and perhaps even inserting) such errors for future exploitation. For various reasons that we touch on briefly, software manufacturers appear to be unwilling to even discuss this possibility. We explain why open-source software development is not a solution, either. We then outline an approach that significantly reduces the problem, even when malicious insiders are part of the software development team. Our approach is based on running several slightly different versions of the same software in parallel on different cores of a multiprocessor. As a beneficial side effect, our method is able to locate actual programming errors.
电子商务和电子政务依赖于可靠的软件平台。不幸的是,几乎每周都有“关键”软件漏洞被发现,这些漏洞可以让远程方完全访问大量连接网络的计算机。考虑到不断增长的经济激励和这些漏洞的不可估量的战略重要性,人们应该假设商业软件公司中有一些人正在积极地寻找(甚至插入)这些错误,以便将来利用。由于各种原因,软件制造商似乎甚至不愿意讨论这种可能性。我们解释了为什么开源软件开发也不是一个解决方案。然后,我们概述了一种显著减少问题的方法,即使恶意的内部人员是软件开发团队的一部分。我们的方法是基于在多处理器的不同核心上并行运行同一软件的几个略有不同的版本。作为一个有益的副作用,我们的方法能够定位实际的编程错误。
{"title":"Understanding and Countering Insider Threats in Software Development","authors":"M. Franz","doi":"10.1109/MCETECH.2008.32","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.32","url":null,"abstract":"E-commerce and e-government depend on trustworthy software platforms. Unfortunately, barely a week goes by without the discovery of a \"critical\" software vulnerability that would give a remote party complete access to a large number of network-attached computers. Considering the rising financial incentives and the immeasurable strategic importance of such vulnerabilities, one should assume that there are parties within commercial software companies that are actively scouting out (and perhaps even inserting) such errors for future exploitation. For various reasons that we touch on briefly, software manufacturers appear to be unwilling to even discuss this possibility. We explain why open-source software development is not a solution, either. We then outline an approach that significantly reduces the problem, even when malicious insiders are part of the software development team. Our approach is based on running several slightly different versions of the same software in parallel on different cores of a multiprocessor. As a beneficial side effect, our method is able to locate actual programming errors.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121135427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The Security Requirements Behavior Model for Trustworthy Software 可信软件的安全需求行为模型
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.19
K. Saleh, M. Habil
The demand for web services and applications in cyberspace is hindered by security concerns that are raised by corporate service providers and service users. There are concerns about the trustworthiness of the web services from both sides of the spectrum. Testing web services security is a critical step towards enhancing their trustworthiness. To address these issues, we propose a comprehensive framework for specifying security requirements for web services and web applications. Based on these comprehensive security requirements specifications, formal security test case generation can then be derived and performed. In this paper, we introduce the Security Requirements Behavior Model (SRBM) to help obtaining secure and hence trustworthy web services and applications. Using Firesmith' security requirements categories, the SRBM is based on Sindre's misuse cases, Firesmith's security use cases, and the operational model of computer security.
企业服务提供商和服务用户提出的安全问题阻碍了对网络空间网络服务和应用的需求。双方都对web服务的可信度表示担忧。测试web服务安全性是增强其可信度的关键步骤。为了解决这些问题,我们提出了一个全面的框架,用于指定web服务和web应用程序的安全需求。基于这些全面的安全性需求规范,可以派生并执行正式的安全性测试用例生成。在本文中,我们介绍了安全需求行为模型(SRBM),以帮助获得安全的、因此值得信赖的web服务和应用程序。使用firessmith的安全需求类别,SRBM基于Sindre的误用案例、firessmith的安全用例和计算机安全的操作模型。
{"title":"The Security Requirements Behavior Model for Trustworthy Software","authors":"K. Saleh, M. Habil","doi":"10.1109/MCETECH.2008.19","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.19","url":null,"abstract":"The demand for web services and applications in cyberspace is hindered by security concerns that are raised by corporate service providers and service users. There are concerns about the trustworthiness of the web services from both sides of the spectrum. Testing web services security is a critical step towards enhancing their trustworthiness. To address these issues, we propose a comprehensive framework for specifying security requirements for web services and web applications. Based on these comprehensive security requirements specifications, formal security test case generation can then be derived and performed. In this paper, we introduce the Security Requirements Behavior Model (SRBM) to help obtaining secure and hence trustworthy web services and applications. Using Firesmith' security requirements categories, the SRBM is based on Sindre's misuse cases, Firesmith's security use cases, and the operational model of computer security.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128772372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
SecurityViews: A Dynamic Security for View-Oriented Programming SecurityViews:面向视图编程的动态安全性
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.23
H. Mcheick, E. Dallaire
In wide-enterprise information systems, the same objects play different functional roles during their lifecycle. The development and the distributtion of these functional roles can be realized using one of the aspect oriented software development techniques, in particular view oriented programming (VOP). Generally speaking, views are code fragments, which provide the implementation of different functionalities for the same object domain and theses views can be used as a units for distribution to improve performance issues. Therefore, using VOP encompasses a combination of views, which can be distributed, attached, detached dynamically throughout their object views lifecycle. In this context, an issue has to be addressed when a distributed object offers different views to different clients. A security access problem would be if a client somehow tries to perform an operation of a view, which is not attached by that client. Another issue has to be addressed is to manage views in a transparent way (implicitly) for clients. We propose a dynamic adaptation and security model based on Java security model to deal with theses issues.
在大企业信息系统中,相同的对象在其生命周期中扮演不同的功能角色。这些功能角色的开发和分配可以使用面向方面的软件开发技术之一,特别是面向视图编程(VOP)来实现。一般来说,视图是代码片段,它们为相同的对象域提供不同功能的实现,这些视图可以用作分发的单元,以改善性能问题。因此,使用VOP包含视图的组合,这些视图可以在其对象视图生命周期中动态地分布、附加和分离。在这种情况下,当分布式对象为不同的客户端提供不同的视图时,必须解决一个问题。如果客户机以某种方式试图执行视图的操作,则会出现安全访问问题,而该视图不是由该客户机附加的。另一个需要解决的问题是以透明的方式(隐式地)为客户端管理视图。针对这些问题,我们提出了一种基于Java安全模型的动态自适应安全模型。
{"title":"SecurityViews: A Dynamic Security for View-Oriented Programming","authors":"H. Mcheick, E. Dallaire","doi":"10.1109/MCETECH.2008.23","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.23","url":null,"abstract":"In wide-enterprise information systems, the same objects play different functional roles during their lifecycle. The development and the distributtion of these functional roles can be realized using one of the aspect oriented software development techniques, in particular view oriented programming (VOP). Generally speaking, views are code fragments, which provide the implementation of different functionalities for the same object domain and theses views can be used as a units for distribution to improve performance issues. Therefore, using VOP encompasses a combination of views, which can be distributed, attached, detached dynamically throughout their object views lifecycle. In this context, an issue has to be addressed when a distributed object offers different views to different clients. A security access problem would be if a client somehow tries to perform an operation of a view, which is not attached by that client. Another issue has to be addressed is to manage views in a transparent way (implicitly) for clients. We propose a dynamic adaptation and security model based on Java security model to deal with theses issues.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133777794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2008 International MCETECH Conference on e-Technologies (mcetech 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1