首页 > 最新文献

2008 International MCETECH Conference on e-Technologies (mcetech 2008)最新文献

英文 中文
Formal Modeling for Security Behavior Analysis of Computer Systems 计算机系统安全行为分析的形式化建模
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.20
K. Adi, L. Hamza, L. Pene
This paper proposes a formal framework aimed at specifying and verifying computer systems security behavior. In this approach, systems and their interactions are modeled through processes with a new dedicated calculus inspired from the ambient calculus. We demonstrate how, given a network security policy implementation, our dedicated calculus allows to verify that the specification offers or not sufficient protection from a malicious intruder.
本文提出了一个形式化的框架,旨在规范和验证计算机系统的安全行为。在这种方法中,系统和它们之间的相互作用是通过一种新的专门的微积分过程来建模的,这种微积分是从环境微积分中得到灵感的。我们将演示,给定一个网络安全策略实现,我们的专用演算如何允许验证该规范是否提供了针对恶意入侵者的足够保护。
{"title":"Formal Modeling for Security Behavior Analysis of Computer Systems","authors":"K. Adi, L. Hamza, L. Pene","doi":"10.1109/MCETECH.2008.20","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.20","url":null,"abstract":"This paper proposes a formal framework aimed at specifying and verifying computer systems security behavior. In this approach, systems and their interactions are modeled through processes with a new dedicated calculus inspired from the ambient calculus. We demonstrate how, given a network security policy implementation, our dedicated calculus allows to verify that the specification offers or not sufficient protection from a malicious intruder.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133890197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Practical Load Distribution Models for Web Services Based environments 基于Web服务环境的实用负载分配模型
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.21
E. Badidi, M. Serhani, L. Esmahi, M. Elkoutbi
Web services QoS management frameworks proposed in the literature deal essentially with issues such as QoS specification, QoS-based discovery and selection, and QoS monitoring of Web services. However, only few works have considered the issue of load distribution in a Web services context. In this paper, we investigate three models that might be used to achieve load distribution in a Web services environment. We focus on load distribution at the operation level by considering the assignment of methods execution to appropriate Web services according to some selection policies. The experiments we have conducted using the broker-oriented model have shown that better results are obtained using the random policy for Web service selection.
文献中提出的Web服务QoS管理框架主要处理诸如QoS规范、基于QoS的发现和选择以及Web服务的QoS监控等问题。然而,只有少数作品考虑了Web服务上下文中的负载分配问题。在本文中,我们研究了可能用于在Web服务环境中实现负载分配的三个模型。通过考虑根据一些选择策略将方法执行分配给适当的Web服务,我们将重点放在操作级别的负载分配上。我们使用面向代理的模型进行的实验表明,使用随机策略进行Web服务选择可以获得更好的结果。
{"title":"Practical Load Distribution Models for Web Services Based environments","authors":"E. Badidi, M. Serhani, L. Esmahi, M. Elkoutbi","doi":"10.1109/MCETECH.2008.21","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.21","url":null,"abstract":"Web services QoS management frameworks proposed in the literature deal essentially with issues such as QoS specification, QoS-based discovery and selection, and QoS monitoring of Web services. However, only few works have considered the issue of load distribution in a Web services context. In this paper, we investigate three models that might be used to achieve load distribution in a Web services environment. We focus on load distribution at the operation level by considering the assignment of methods execution to appropriate Web services according to some selection policies. The experiments we have conducted using the broker-oriented model have shown that better results are obtained using the random policy for Web service selection.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128769427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessing the Applicability of Use Case Maps for Business Process and Workflow Description 评估业务流程和工作流描述用例图的适用性
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.18
G. Mussbacher, Daniel Amyot
Use Case Maps (UCMs) have already been used to describe business processes and workflows at a high level of abstraction. The semantics of UCMs, however, require further clarification and enhancement. An initial assessment based on 27 workflow and communication patterns (a) highlighted some of the semantic variation points of UCMs, (b) introduced small extensions to the UCM language in order to more precisely define scenarios, high-level business processes, and workflows, and (c) compared UCMs with other business process and workflow languages. This short paper summarizes the continuation of the assessment with a larger set of workflow patterns recently made available. The assessment concludes that the UCM notation including the proposed extensions is a competitive language to describe high-level business processes and workflows, while providing additional benefits over the other languages.
用例图(ucm)已经被用于描述高层次抽象的业务过程和工作流。然而,ucm的语义需要进一步的澄清和增强。基于27个工作流和通信模式的初步评估(a)突出了UCM的一些语义变化点,(b)引入了对UCM语言的小扩展,以便更精确地定义场景、高级业务过程和工作流,以及(c)将UCM与其他业务过程和工作流语言进行比较。这篇简短的文章用最近可用的一组更大的工作流模式总结了评估的延续。评估得出的结论是,UCM符号包括建议的扩展是描述高级业务过程和工作流的竞争性语言,同时提供了比其他语言更多的好处。
{"title":"Assessing the Applicability of Use Case Maps for Business Process and Workflow Description","authors":"G. Mussbacher, Daniel Amyot","doi":"10.1109/MCETECH.2008.18","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.18","url":null,"abstract":"Use Case Maps (UCMs) have already been used to describe business processes and workflows at a high level of abstraction. The semantics of UCMs, however, require further clarification and enhancement. An initial assessment based on 27 workflow and communication patterns (a) highlighted some of the semantic variation points of UCMs, (b) introduced small extensions to the UCM language in order to more precisely define scenarios, high-level business processes, and workflows, and (c) compared UCMs with other business process and workflow languages. This short paper summarizes the continuation of the assessment with a larger set of workflow patterns recently made available. The assessment concludes that the UCM notation including the proposed extensions is a competitive language to describe high-level business processes and workflows, while providing additional benefits over the other languages.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129769167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Proposition of a Method for the Development and Deployment of e-Government Systems that Emphasize Good Governance 强调善治的电子政务系统开发与部署方法的提出
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.35
D. Kettani, B. Moulin, A. el Mahdi
Although it is commonly agreed that e-government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to adopt e-government, especially in local governmental agencies in developing countries, In the context of the e-Fez project and in a close collaboration with the municipality of the Moroccan city of Fez, we developed a pilot e-government system that facilitates citizens' access to governmental information and services. In the course of the e-Fez project and other similar projects, we set up a methodology that emphasizes good governance at each step of an e-government project and enables us to continuously assess the outcomes of the resulting e-gov systems on governance. The ultimate goal is to reduce the reluctance of decision makers and to contribute in the dissemination of e-technology in developing countries through a scientific and proven methodology that systematically links egovernment outcomes to good governance attributes.
虽然人们普遍认为电子政务系统可以加强治理,但缺乏经验证据来建立这一假设,这合理地造成了关键决策者不愿采用电子政务,特别是在发展中国家的地方政府机构中。在e-Fez项目的背景下,在与摩洛哥非斯市市政府的密切合作中,开展电子政务试点,方便公民获取政府信息和服务。在e-Fez项目和其他类似项目的过程中,我们建立了一种方法,强调在电子政务项目的每一步都要进行良好的治理,并使我们能够不断评估电子政务系统在治理方面的成果。最终目标是减少决策者的不情愿,并通过科学和经过验证的方法在发展中国家传播电子技术,该方法将电子政务的结果与良好的治理属性系统地联系起来。
{"title":"Proposition of a Method for the Development and Deployment of e-Government Systems that Emphasize Good Governance","authors":"D. Kettani, B. Moulin, A. el Mahdi","doi":"10.1109/MCETECH.2008.35","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.35","url":null,"abstract":"Although it is commonly agreed that e-government systems enhance governance, there is a lack of empirical evidence to build upon this hypothesis which, legitimately, creates reluctance among key decision makers to adopt e-government, especially in local governmental agencies in developing countries, In the context of the e-Fez project and in a close collaboration with the municipality of the Moroccan city of Fez, we developed a pilot e-government system that facilitates citizens' access to governmental information and services. In the course of the e-Fez project and other similar projects, we set up a methodology that emphasizes good governance at each step of an e-government project and enables us to continuously assess the outcomes of the resulting e-gov systems on governance. The ultimate goal is to reduce the reluctance of decision makers and to contribute in the dissemination of e-technology in developing countries through a scientific and proven methodology that systematically links egovernment outcomes to good governance attributes.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125364465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Recommendation Quality Evolution Based on Neighbors Discrimination 基于邻域识别的推荐质量进化
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.28
Z. Zaier, R. Godin, L. Faucher
An "automated recommender system" plays an essential role in e-commerce applications. Such systems try to recommend items (movies, music, books, news, etc.) which the user should be interested in. The spectrum of proposed recommendation algorithms are based on information including content of the items, ratings of the users, and demographic information about the users. These systems hold the promise of delivering high quality recommendations. However, the incredible growth of users and applications bring some key challenges for recommender systems. One of the concerns in current recommenders is that the quality of recommendations is strongly dependant on the neighborhood size and quality. In this paper, we propose a new peer-to-peer architecture based on prior selection of the neighbors. We investigate the evolution of different recommendation techniques performance, coverage and quality of prediction. Also, we identify which recommendation method would be the most efficient with this new peer-to-peer architecture.
“自动推荐系统”在电子商务应用中起着至关重要的作用。这样的系统会尝试推荐用户可能感兴趣的项目(电影、音乐、书籍、新闻等)。所提出的推荐算法的频谱是基于信息的,包括项目的内容、用户的评分和用户的人口统计信息。这些系统承诺提供高质量的推荐。然而,用户和应用程序的惊人增长给推荐系统带来了一些关键的挑战。当前推荐器的一个问题是,推荐的质量强烈依赖于邻域的大小和质量。在本文中,我们提出了一种新的基于邻居先验选择的点对点架构。我们研究了不同推荐技术的发展,性能,覆盖率和预测质量。此外,我们还确定了哪种推荐方法在这种新的点对点架构中是最有效的。
{"title":"Recommendation Quality Evolution Based on Neighbors Discrimination","authors":"Z. Zaier, R. Godin, L. Faucher","doi":"10.1109/MCETECH.2008.28","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.28","url":null,"abstract":"An \"automated recommender system\" plays an essential role in e-commerce applications. Such systems try to recommend items (movies, music, books, news, etc.) which the user should be interested in. The spectrum of proposed recommendation algorithms are based on information including content of the items, ratings of the users, and demographic information about the users. These systems hold the promise of delivering high quality recommendations. However, the incredible growth of users and applications bring some key challenges for recommender systems. One of the concerns in current recommenders is that the quality of recommendations is strongly dependant on the neighborhood size and quality. In this paper, we propose a new peer-to-peer architecture based on prior selection of the neighbors. We investigate the evolution of different recommendation techniques performance, coverage and quality of prediction. Also, we identify which recommendation method would be the most efficient with this new peer-to-peer architecture.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Human Workflows via Document-Driven Process Choreography 通过文档驱动的流程编排的人工工作流
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.15
Jiangbo Dang, C. Toklu, K. Hampel, U. Enke
Workflows are ubiquitous in enterprise applications from manufacturing industry to healthcare industry. A human workflow is a dynamic set of tasks performed by human participants to reach a shared goal. Commitments among participants can be used to model the workflow and coordinate their execution of it. These commitments can be captured by role-based orchestrations in a Microsoft workflow implementation with Microsoft BizTalk server (BizTalk). BizTalk provides tools and methodologies to compose these orchestrations that can be executed as business processes and monitored by Business Activity Monitoring (BAM) dashboards. In this paper, we present methodologies to develop a human workflow by using role-based BizTalk orchestrations to capture commitments extracted from a process- centric workflow definition. In addition, we discuss the life- cycle management of a human workflow with an emphasis on process design and monitoring.
工作流在从制造业到医疗保健行业的企业应用程序中无处不在。人工工作流是由人工参与者执行的一组动态任务,以达到共同的目标。参与者之间的承诺可以用来对工作流建模,并协调他们对工作流的执行。这些承诺可以通过使用Microsoft BizTalk服务器(BizTalk)的Microsoft工作流实现中的基于角色的编排来捕获。BizTalk提供了工具和方法来组合这些编排,这些编排可以作为业务流程执行,并由业务活动监控(BAM)仪表板进行监控。在本文中,我们介绍了通过使用基于角色的BizTalk编排来捕获从以流程为中心的工作流定义中提取的承诺来开发人工工作流的方法。此外,我们还讨论了人工工作流的生命周期管理,重点是流程设计和监控。
{"title":"Human Workflows via Document-Driven Process Choreography","authors":"Jiangbo Dang, C. Toklu, K. Hampel, U. Enke","doi":"10.1109/MCETECH.2008.15","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.15","url":null,"abstract":"Workflows are ubiquitous in enterprise applications from manufacturing industry to healthcare industry. A human workflow is a dynamic set of tasks performed by human participants to reach a shared goal. Commitments among participants can be used to model the workflow and coordinate their execution of it. These commitments can be captured by role-based orchestrations in a Microsoft workflow implementation with Microsoft BizTalk server (BizTalk). BizTalk provides tools and methodologies to compose these orchestrations that can be executed as business processes and monitored by Business Activity Monitoring (BAM) dashboards. In this paper, we present methodologies to develop a human workflow by using role-based BizTalk orchestrations to capture commitments extracted from a process- centric workflow definition. In addition, we discuss the life- cycle management of a human workflow with an emphasis on process design and monitoring.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"282 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115841709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Issues for IT Governance in a Large Not-for-Profit Organization: A Case Study 大型非营利组织中的IT治理问题:案例研究
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.24
C. Wilkin, Jon Riddett
This paper reports on the implementation of IT Governance in a not-for-profit healthcare organization. The motivation behind such an undertaking was partly the need to run the IT Division as a business aligned to the strategic goals of the organization, and partly to be able to demonstrate the professional accountability of the IT decision-making investment process. Certainly, top management's support for the roll out of IT Governance was related to the latter motive. In this case study the organizational gains in focusing on best value for the investment dollar, accountable time-frames and cost- controls, were real. As such, the move enhanced the professional status of the IT Department. However, the organizational structure imposed by IT Governance provided such transparency that the IT Department additionally achieved more widespread participation and buy in from the wider business.
本文报告了一家非营利医疗保健组织中IT治理的实现。这样一个任务背后的动机部分是需要将IT部门作为一个与组织的战略目标一致的业务来运行,部分是为了能够证明IT决策投资过程的专业责任。当然,高层管理人员对推出IT治理的支持与后一种动机有关。在这个案例研究中,专注于投资美元的最佳价值、负责任的时间框架和成本控制的组织收益是真实的。因此,此举提高了IT部门的专业地位。然而,由IT治理强加的组织结构提供了这样的透明性,IT部门额外地获得了更广泛的参与,并从更广泛的业务中购买。
{"title":"Issues for IT Governance in a Large Not-for-Profit Organization: A Case Study","authors":"C. Wilkin, Jon Riddett","doi":"10.1109/MCETECH.2008.24","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.24","url":null,"abstract":"This paper reports on the implementation of IT Governance in a not-for-profit healthcare organization. The motivation behind such an undertaking was partly the need to run the IT Division as a business aligned to the strategic goals of the organization, and partly to be able to demonstrate the professional accountability of the IT decision-making investment process. Certainly, top management's support for the roll out of IT Governance was related to the latter motive. In this case study the organizational gains in focusing on best value for the investment dollar, accountable time-frames and cost- controls, were real. As such, the move enhanced the professional status of the IT Department. However, the organizational structure imposed by IT Governance provided such transparency that the IT Department additionally achieved more widespread participation and buy in from the wider business.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121347488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Public-Private Partnership in e-Government: A Case Implementation 电子政府中的公私伙伴关系:一个案例实施
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.14
Alain Sandoz, Jean-René Eudes, R. Prevot
Public-private partnerships (PPP) are used by governments as a means to finance infrastructure services such as roads, bridges or hospitals. In e-government, public services are provided and delivered to citizens and businesses through the Internet. The end user should be able to measure a difference in terms of service quality and comfort, or necessary effort, delay, and cost, between acquiring the service over the net vs. using traditional channels. This paper presents a case implementation of PPP in e-government in Geneva, Switzerland. In this scheme, a private third party is introduced aside the public administration and the end-user in order to maximize the added value to the user. In comparison to the traditional client-server model of Internet transaction, several new problems are encountered at the organizational, process and technical levels. The paper describes the solutions and underlying architectures.
公私伙伴关系(PPP)是政府为道路、桥梁或医院等基础设施服务融资的一种手段。在电子政务中,公共服务是通过互联网提供给公民和企业的。终端用户应该能够衡量通过网络获取服务与使用传统渠道获取服务之间在服务质量和舒适度方面的差异,或者必要的努力、延迟和成本方面的差异。本文介绍了在瑞士日内瓦实施PPP电子政务的一个案例。在该方案中,在公共管理部门和最终用户之外引入了一个私人第三方,以最大限度地提高用户的附加值。与传统的Internet事务的客户机-服务器模型相比,在组织、流程和技术层面上遇到了一些新的问题。本文描述了解决方案和底层架构。
{"title":"Public-Private Partnership in e-Government: A Case Implementation","authors":"Alain Sandoz, Jean-René Eudes, R. Prevot","doi":"10.1109/MCETECH.2008.14","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.14","url":null,"abstract":"Public-private partnerships (PPP) are used by governments as a means to finance infrastructure services such as roads, bridges or hospitals. In e-government, public services are provided and delivered to citizens and businesses through the Internet. The end user should be able to measure a difference in terms of service quality and comfort, or necessary effort, delay, and cost, between acquiring the service over the net vs. using traditional channels. This paper presents a case implementation of PPP in e-government in Geneva, Switzerland. In this scheme, a private third party is introduced aside the public administration and the end-user in order to maximize the added value to the user. In comparison to the traditional client-server model of Internet transaction, several new problems are encountered at the organizational, process and technical levels. The paper describes the solutions and underlying architectures.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121435545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Failure Semantics in a SOA Environment SOA环境中的失败语义
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.31
C. Hobbs, H. Becha, Daniel Amyot
In a Service-Oriented Architecture (SOA), services publish descriptions to permit their composition into larger services. There are however serious gaps in the semantics of such service descriptions and these hinder the adoption of SOAs in mission-critical applications. This paper identifies some of these lacunae and proposes a foundation for resolving one of them - service failure. The technique of crash-only failure is proposed as a useful first step and we illustrate how it is particularly applicable to web services in a SOA.
在面向服务的体系结构(SOA)中,服务发布描述以允许将它们组合成更大的服务。然而,这种服务描述的语义存在严重的缺陷,这些缺陷阻碍了在关键任务应用程序中采用soa。本文指出了其中的一些缺陷,并提出了解决其中一个缺陷的基础——服务故障。建议将仅崩溃故障技术作为有用的第一步,并说明它如何特别适用于SOA中的web服务。
{"title":"Failure Semantics in a SOA Environment","authors":"C. Hobbs, H. Becha, Daniel Amyot","doi":"10.1109/MCETECH.2008.31","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.31","url":null,"abstract":"In a Service-Oriented Architecture (SOA), services publish descriptions to permit their composition into larger services. There are however serious gaps in the semantics of such service descriptions and these hinder the adoption of SOAs in mission-critical applications. This paper identifies some of these lacunae and proposes a foundation for resolving one of them - service failure. The technique of crash-only failure is proposed as a useful first step and we illustrate how it is particularly applicable to web services in a SOA.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124977134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Anonymous Credentials for Privacy-Preserving E-learning 用于保护隐私的电子学习的匿名凭证
Pub Date : 2008-01-23 DOI: 10.1109/MCETECH.2008.26
E. Aimeur, H. Hage, F. Onana
E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection, but remains unsatisfactory on several levels. On the other hand, privacy preserving solutions that are appropriate and used in E-commerce environments are inadequate and unsuitable to the context of E-learning. Indeed, while in most E-commerce applications different transactions between the client and the system are pretty much independent, in E-learning the interactions between the learner and system are intertwined into a developing process that depends heavily on the path the leaner is following. In this paper, we introduce the anonymous credentials for E- learning systems (ACES), a set of protocols to preserve learner's privacy in E-learning environments. In particular, the ACES allows learners to provide anonymous credentials throughout the learning process, such as when they need to prove that they possess the necessary requirements to register for a course, and/or to prove that they are the legitimate owners of an anonymous transcript or an anonymous degree. Although the concept of anonymous credentials is not novel, ACES takes into account the specificities of E-learning. Moreover, in order to prevent the misuse of privacy, ACES prevents the possibility of sharing credentials between learners.
电子学习系统在过去几年中取得了相当大的进步。然而,学习者隐私问题实际上一直被忽视。现有的电子学习标准为隐私提供了一些规定,电子学习系统的安全性提供了一些隐私保护,但在几个层面上仍不令人满意。另一方面,适用于电子商务环境的隐私保护解决方案不适合电子学习环境。事实上,虽然在大多数电子商务应用程序中,客户端和系统之间的不同事务几乎是独立的,但在电子学习中,学习者和系统之间的交互交织在一起,形成一个开发过程,这在很大程度上取决于学习者所遵循的路径。本文介绍了电子学习系统的匿名证书,这是一套在电子学习环境中保护学习者隐私的协议。特别是,ACES允许学习者在整个学习过程中提供匿名证书,例如当他们需要证明他们拥有注册课程的必要条件时,和/或证明他们是匿名成绩单或匿名学位的合法所有者。虽然匿名证书的概念并不新颖,但ACES考虑到了电子学习的特殊性。此外,为了防止滥用隐私,ACES防止学习者之间共享证书的可能性。
{"title":"Anonymous Credentials for Privacy-Preserving E-learning","authors":"E. Aimeur, H. Hage, F. Onana","doi":"10.1109/MCETECH.2008.26","DOIUrl":"https://doi.org/10.1109/MCETECH.2008.26","url":null,"abstract":"E-learning systems have made considerable progress within the last few years. Nonetheless, the issue of learner privacy has been practically ignored. Existing E-learning standards offer some provisions for privacy and the security of E-learning systems offers some privacy protection, but remains unsatisfactory on several levels. On the other hand, privacy preserving solutions that are appropriate and used in E-commerce environments are inadequate and unsuitable to the context of E-learning. Indeed, while in most E-commerce applications different transactions between the client and the system are pretty much independent, in E-learning the interactions between the learner and system are intertwined into a developing process that depends heavily on the path the leaner is following. In this paper, we introduce the anonymous credentials for E- learning systems (ACES), a set of protocols to preserve learner's privacy in E-learning environments. In particular, the ACES allows learners to provide anonymous credentials throughout the learning process, such as when they need to prove that they possess the necessary requirements to register for a course, and/or to prove that they are the legitimate owners of an anonymous transcript or an anonymous degree. Although the concept of anonymous credentials is not novel, ACES takes into account the specificities of E-learning. Moreover, in order to prevent the misuse of privacy, ACES prevents the possibility of sharing credentials between learners.","PeriodicalId":299458,"journal":{"name":"2008 International MCETECH Conference on e-Technologies (mcetech 2008)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-01-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128626210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
期刊
2008 International MCETECH Conference on e-Technologies (mcetech 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1