首页 > 最新文献

Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

英文 中文
NIST Smart Space: pervasive computing initiative NIST智能空间:普适计算计划
L. Rosenthal, V. Stanford
The field of pervasive computing is in its infancy, and many of the technologies required to make it a reality are immature and high risk. The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) has launched a pervasive computing initiative to investigate the technical and standards roadblocks impeding the integration of emerging and existing technologies. Consistent with ITL's strategic plan, the initiative involves working with industry to develop and demonstrate test methods, reference data, tests, proof-of-concept implementations and standards to help pull the underlying technologies forward and thus help the field to mature and grow. The initiative is multi-disciplinary, takes advantage of the expertise of several divisions within ITL and creates new expertise. Areas addressed by the initiative include: information access and user interfaces, networking, software and security.
普适计算领域正处于起步阶段,实现普适计算所需的许多技术都不成熟且风险很高。美国国家标准与技术研究院(NIST)信息技术实验室(ITL)发起了一项普及计算计划,以调查阻碍新兴技术和现有技术集成的技术和标准障碍。与ITL的战略计划一致,该计划涉及与行业合作开发和演示测试方法、参考数据、测试、概念验证实现和标准,以帮助推动基础技术向前发展,从而帮助该领域成熟和发展。该倡议是多学科的,利用了ITL内部几个部门的专业知识,并创造了新的专业知识。该倡议涉及的领域包括:信息访问和用户界面、网络、软件和安全。
{"title":"NIST Smart Space: pervasive computing initiative","authors":"L. Rosenthal, V. Stanford","doi":"10.1109/ENABL.2000.883697","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883697","url":null,"abstract":"The field of pervasive computing is in its infancy, and many of the technologies required to make it a reality are immature and high risk. The National Institute of Standards and Technology (NIST) Information Technology Laboratory (ITL) has launched a pervasive computing initiative to investigate the technical and standards roadblocks impeding the integration of emerging and existing technologies. Consistent with ITL's strategic plan, the initiative involves working with industry to develop and demonstrate test methods, reference data, tests, proof-of-concept implementations and standards to help pull the underlying technologies forward and thus help the field to mature and grow. The initiative is multi-disciplinary, takes advantage of the expertise of several divisions within ITL and creates new expertise. Areas addressed by the initiative include: information access and user interfaces, networking, software and security.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129788535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
ETOILE - an Environment for Team, Organizational and Individual Learning in Emergencies ETOILE -一个团队、组织和个人在紧急情况下学习的环境
R. Dörner, P. Grimm
Discusses several aspects of the ETOILE (Environment for Team Organizational and Individual Learning in Emergencies) system, which may be considered to be a knowledge networked environment. These aspects are: authoring, the combination of agents and the integration of knowledge sources (databases of external simulators), the visualization of behaviour in a 3D virtual environment, the design of the human-agent interface, and the modelling, description and assessment of human behaviour. Based on our experiences in the ETOILE project, conclusions are drawn for the design of a knowledge networked environment for learning purposes.
讨论了ETOILE(突发事件中团队、组织和个人学习环境)系统的几个方面,该系统可以被认为是一个知识网络环境。这些方面是:创作,代理的组合和知识来源的集成(外部模拟器的数据库),三维虚拟环境中行为的可视化,人-代理界面的设计,以及人类行为的建模,描述和评估。根据我们在ETOILE项目中的经验,得出了设计以学习为目的的知识网络环境的结论。
{"title":"ETOILE - an Environment for Team, Organizational and Individual Learning in Emergencies","authors":"R. Dörner, P. Grimm","doi":"10.1109/ENABL.2000.883701","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883701","url":null,"abstract":"Discusses several aspects of the ETOILE (Environment for Team Organizational and Individual Learning in Emergencies) system, which may be considered to be a knowledge networked environment. These aspects are: authoring, the combination of agents and the integration of knowledge sources (databases of external simulators), the visualization of behaviour in a 3D virtual environment, the design of the human-agent interface, and the modelling, description and assessment of human behaviour. Based on our experiences in the ETOILE project, conclusions are drawn for the design of a knowledge networked environment for learning purposes.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114445573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Commitment-based enhancement of e-commerce protocols 以承诺为基础加强电子商务协议
P. Yolum, Munindar P. Singh
Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We develop a commitment-based representation, which provides a content to the protocols, enabling flexible execution. We show how an existing protocol can be systematically enhanced to yield a protocol that allows the given actions as well as other legal moves.
协议表示通信组件之间允许的交互。协议是电子商务中约束自治实体行为的必要条件。传统的协议表示包括操作,但不包括其内容,这限制了它们在自治实体必须灵活交互以处理异常和利用机会的环境中的适用性。我们开发了一种基于承诺的表示,它为协议提供了内容,从而实现了灵活的执行。我们展示了如何系统地增强现有协议,以产生允许给定行为以及其他合法动作的协议。
{"title":"Commitment-based enhancement of e-commerce protocols","authors":"P. Yolum, Munindar P. Singh","doi":"10.1109/ENABL.2000.883743","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883743","url":null,"abstract":"Protocols represent the allowed interactions among communicating components. Protocols are essential in electronic commerce to constrain the behaviors of autonomous entities. Traditional representations of protocols include actions, but not their content, which limits their applicability in settings where autonomous entities must flexibly interact to handle exceptions and exploit opportunities. We develop a commitment-based representation, which provides a content to the protocols, enabling flexible execution. We show how an existing protocol can be systematically enhanced to yield a protocol that allows the given actions as well as other legal moves.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128542417","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Workspace awareness in mobile virtual teams 移动虚拟团队中的工作空间意识
A. Ferscha
Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has proven particularly difficult to attain in distributed collaboration systems, where the social interaction protocol is not as well established and the means for becoming aware of the environment are far less common. The work reported in this paper is focused on workspace awareness, i.e. the "up-to-the-moment understanding of another person's interaction with a shared workspace". As opposed to the traditional understanding of shared workspaces being bounded spaces where people can see and manipulate artefacts related to their activities (documents in an office, the whiteboard in a lecture hall or assembly lines in a factory), we consider virtual mobile (team) workspaces as abstract spaces containing objects that constitute the teamwork.
在日常生活中,我们认为在合作团队中保持彼此的意识是理所当然的,即使合作不是持续的面对面的,团队成员在工作会议期间经常从团队活动转移到个人活动。另一方面,在分布式协作系统中,保持这种直观的意识保真度,例如在隔壁办公室工作的团队成员,已经被证明是特别难以实现的,在分布式协作系统中,社会交互协议没有很好地建立起来,并且意识到环境的手段远不常见。本文报告的工作集中在工作空间感知上,即“对另一个人与共享工作空间交互的最新理解”。与传统的共享工作空间的理解相反,人们可以看到和操作与他们的活动相关的工件(办公室的文档,演讲厅的白板或工厂的装配线),我们认为虚拟移动(团队)工作空间是包含组成团队工作的对象的抽象空间。
{"title":"Workspace awareness in mobile virtual teams","authors":"A. Ferscha","doi":"10.1109/ENABL.2000.883742","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883742","url":null,"abstract":"Staying aware of each other in cooperative teamwork is something we take for granted in the everyday world, even if collaboration is not continuously face-to-face, and team members frequently shift from group to individual activity during work sessions. Maintaining this intuitive fidelity of awareness, e.g. of team members working in the office next door, is, on the other hand, something that has proven particularly difficult to attain in distributed collaboration systems, where the social interaction protocol is not as well established and the means for becoming aware of the environment are far less common. The work reported in this paper is focused on workspace awareness, i.e. the \"up-to-the-moment understanding of another person's interaction with a shared workspace\". As opposed to the traditional understanding of shared workspaces being bounded spaces where people can see and manipulate artefacts related to their activities (documents in an office, the whiteboard in a lecture hall or assembly lines in a factory), we consider virtual mobile (team) workspaces as abstract spaces containing objects that constitute the teamwork.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Privacy-enhanced access control by SPKI and its application to Web server 基于SPKI的隐私增强访问控制及其在Web服务器上的应用
Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno
For providing a privacy-enhanced access only for an appropriate user, anonymous access such as anonymous FTP is too weak because a service provider cannot know about a client, while authentication-based access control such as PKIX (Public Key Infrastructure with X.509) is too strong because ID information on a client is exposed to a service-provider. Instead, we present a new access control scheme by using SPKI (Simple Public Key Infrastructure), since an authorization certificate based on SPKI does not carry any ID information. This scheme needs additional mechanism for the server and clients such as issuing, delegating, validating, and revoking certificates. A web-based privacy-enhanced access control is designed on the basis of the proposed scheme and implemented by Java. The resulting system shows that the proposed scheme works well with a small amount of overheads being introduced into a normal web server.
为了仅为适当的用户提供增强隐私的访问,匿名访问(如匿名FTP)太弱,因为服务提供者无法了解客户端,而基于身份验证的访问控制(如PKIX(带有X.509的公钥基础设施))太强,因为客户端的ID信息暴露给服务提供者。由于基于简单公钥基础设施(SPKI)的授权证书不携带任何ID信息,因此我们提出了一种新的访问控制方案,即使用SPKI (Simple Public Key Infrastructure)。该方案需要为服务器和客户端提供额外的机制,例如颁发、委托、验证和撤销证书。在此基础上设计了一个基于web的增强隐私的访问控制,并使用Java实现。结果系统表明,所提出的方案工作良好,少量的开销被引入到一个普通的web服务器。
{"title":"Privacy-enhanced access control by SPKI and its application to Web server","authors":"Takamichi Saito, Kentaro Umesawa, HIroshi G. Okuno","doi":"10.1109/ENABL.2000.883729","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883729","url":null,"abstract":"For providing a privacy-enhanced access only for an appropriate user, anonymous access such as anonymous FTP is too weak because a service provider cannot know about a client, while authentication-based access control such as PKIX (Public Key Infrastructure with X.509) is too strong because ID information on a client is exposed to a service-provider. Instead, we present a new access control scheme by using SPKI (Simple Public Key Infrastructure), since an authorization certificate based on SPKI does not carry any ID information. This scheme needs additional mechanism for the server and clients such as issuing, delegating, validating, and revoking certificates. A web-based privacy-enhanced access control is designed on the basis of the proposed scheme and implemented by Java. The resulting system shows that the proposed scheme works well with a small amount of overheads being introduced into a normal web server.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122011597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A framework for secure enterprise computing 用于安全企业计算的框架
Myong H. Kang, J. Froscher
Distributed computing that supports cooperation among enterprises tends to be large and complex. Hence, it is not a trivial task to make enterprise computing secure and flexible. We have developed a prototype that supports flexible, secure, and recoverable enterprise computing. In this paper, we briefly describe the prototype secure enterprise application-building tool.
支持企业间协作的分布式计算往往是庞大而复杂的。因此,使企业计算变得安全和灵活并不是一项简单的任务。我们已经开发了一个支持灵活、安全和可恢复的企业计算的原型。本文简要介绍了安全企业应用构建工具的原型。
{"title":"A framework for secure enterprise computing","authors":"Myong H. Kang, J. Froscher","doi":"10.1109/ENABL.2000.883732","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883732","url":null,"abstract":"Distributed computing that supports cooperation among enterprises tends to be large and complex. Hence, it is not a trivial task to make enterprise computing secure and flexible. We have developed a prototype that supports flexible, secure, and recoverable enterprise computing. In this paper, we briefly describe the prototype secure enterprise application-building tool.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129199958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEMOIR: a hybrid architecture for expertise modeling and recommender systems DEMOIR:用于专业知识建模和推荐系统的混合架构
Dawit Yimam Seid, A. Kobsa
Although employees' expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently that automated systems to enhance the visibility and traceability of employees with particular expertise started to receive research attention. In this paper, we introduce a systematic classification of alternative architectures for a core functionality of expert finding systems, namely expertise modeling. We also analyze the advantages and disadvantages of each approach and present our hybrid solution. We discuss how this solution addresses the requirements of (I) distributed and heterogeneous organizational and personal expertise data sources and, (2) centralized access to extracted expertise information.
尽管员工的专业知识长期以来一直被视为组织中的重要资产,至少与资本,货物和文件化信息同等重要,但直到最近,用于增强具有特定专业知识的员工的可见性和可追溯性的自动化系统才开始受到研究的关注。在本文中,我们为专家搜索系统的核心功能,即专家建模,引入了可选架构的系统分类。我们还分析了每种方法的优缺点,并提出了我们的混合解决方案。我们将讨论该解决方案如何满足以下需求:(1)分布式和异构的组织和个人专业知识数据源;(2)集中访问提取的专业知识信息。
{"title":"DEMOIR: a hybrid architecture for expertise modeling and recommender systems","authors":"Dawit Yimam Seid, A. Kobsa","doi":"10.1109/ENABL.2000.883706","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883706","url":null,"abstract":"Although employees' expertise has long been regarded as an important asset in organizations at least on a par with capital, goods and documented information, it is only recently that automated systems to enhance the visibility and traceability of employees with particular expertise started to receive research attention. In this paper, we introduce a systematic classification of alternative architectures for a core functionality of expert finding systems, namely expertise modeling. We also analyze the advantages and disadvantages of each approach and present our hybrid solution. We discuss how this solution addresses the requirements of (I) distributed and heterogeneous organizational and personal expertise data sources and, (2) centralized access to extracted expertise information.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
Secure multicast software delivery 安全组播软件交付
Lin Han, N. Shahmehri
Nowadays, purchased software is delivered via sending CD-ROMs or downloading from the Internet. These solutions are either time-consuming or not scalable when the number of end-users becomes large. In this paper, we explore the use of multicast technology as an option for software delivery. We present a global structure for multicast software delivery and look into security issues, mainly focusing on access control in establishing a secure multicast recipient group. A communication schema between each entity in a multicast software delivery system is described in detail. We also describe briefly the implementation of our current prototype for a multicast software delivery system. Such electronic software delivery is the first phase of our ongoing project towards unattended software installation, configuration and upgrade.
如今,购买的软件是通过发送cd - rom或从互联网下载的方式交付的。当终端用户数量变大时,这些解决方案要么耗时,要么不可扩展。在本文中,我们探讨了使用多播技术作为软件交付的一种选择。我们提出了一个多播软件交付的全局结构,并研究了安全问题,主要关注建立安全多播接收组的访问控制。详细描述了组播软件交付系统中各实体之间的通信模式。我们还简要描述了当前多播软件交付系统原型的实现。这种电子软件交付是我们正在进行的无人值守软件安装、配置和升级项目的第一阶段。
{"title":"Secure multicast software delivery","authors":"Lin Han, N. Shahmehri","doi":"10.1109/ENABL.2000.883730","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883730","url":null,"abstract":"Nowadays, purchased software is delivered via sending CD-ROMs or downloading from the Internet. These solutions are either time-consuming or not scalable when the number of end-users becomes large. In this paper, we explore the use of multicast technology as an option for software delivery. We present a global structure for multicast software delivery and look into security issues, mainly focusing on access control in establishing a secure multicast recipient group. A communication schema between each entity in a multicast software delivery system is described in detail. We also describe briefly the implementation of our current prototype for a multicast software delivery system. Such electronic software delivery is the first phase of our ongoing project towards unattended software installation, configuration and upgrade.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115095537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
IPsec-WIT: the NIST IPsec Web-based interoperability test system IPsec- wit: NIST基于web的IPsec互操作性测试系统
R. Glenn, S. Frankel, D. Montgomery
NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols. As initial IETF IPsec specifications began to emerge, it became apparent that the availability of interoperability testing would be the critical barrier to the rapid evolution of early prototypes into commercial products. In this paper we describe the design and development of the NIST IPsec Web-based Interoperability Tester (IPsec-WIT). IPsec-WIT is an experimental test system aimed at exploiting WWW technology to provide remote interoperability testing services anytime and anywhere without requiring any distribution of test system software, or relocation of the systems under test. We conclude with a discussion of the potential future evolution of the system based on observations gained through putting our experimental system on-line and providing IPsec and Internet Key Exchange (IKE) testing services to the IETF research and development community for several months.
NIST是互联网工程任务组(IETF)开发互联网协议安全(IPsec)技术的积极参与者。我们的最终目标是加速IPsec协议的快速商业化和无处不在的部署。随着最初的IETF IPsec规范开始出现,互操作性测试的可用性显然将成为早期原型快速演变为商业产品的关键障碍。本文介绍了NIST IPsec web互操作性测试仪(IPsec- wit)的设计与开发。IPsec-WIT是一个试验性测试系统,旨在利用WWW技术随时随地提供远程互操作性测试服务,而不需要任何测试系统软件的分发,也不需要重新安置被测系统。最后,我们将根据我们的实验系统上线并为IETF研究和开发社区提供IPsec和Internet密钥交换(IKE)测试服务几个月所获得的观察结果,讨论该系统未来可能的发展。
{"title":"IPsec-WIT: the NIST IPsec Web-based interoperability test system","authors":"R. Glenn, S. Frankel, D. Montgomery","doi":"10.1109/ENABL.2000.883719","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883719","url":null,"abstract":"NIST is an active participant in the Internet Engineering Task Force (IETF) efforts to develop Internet Protocol Security (IPsec) technology. Our ultimate goal is to expedite the rapid commercialization and ubiquitous deployment of IPsec protocols. As initial IETF IPsec specifications began to emerge, it became apparent that the availability of interoperability testing would be the critical barrier to the rapid evolution of early prototypes into commercial products. In this paper we describe the design and development of the NIST IPsec Web-based Interoperability Tester (IPsec-WIT). IPsec-WIT is an experimental test system aimed at exploiting WWW technology to provide remote interoperability testing services anytime and anywhere without requiring any distribution of test system software, or relocation of the systems under test. We conclude with a discussion of the potential future evolution of the system based on observations gained through putting our experimental system on-line and providing IPsec and Internet Key Exchange (IKE) testing services to the IETF research and development community for several months.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the design of a mobile agent Web for supporting virtual enterprises 支持虚拟企业的移动代理Web的设计
A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann
In this paper we discuss the design of a mobile agent based infrastructure for monitoring and controlling activities in a Virtual Enterprise (VE). We define the concepts of the Virtual Enterprise and the Mobile Agent Web (MA-web).
在本文中,我们讨论了一个基于移动代理的基础设施的设计,用于监视和控制虚拟企业(VE)中的活动。定义了虚拟企业和移动代理Web的概念。
{"title":"On the design of a mobile agent Web for supporting virtual enterprises","authors":"A. Aerts, N. Szirbik, D. Hammer, J. Goossenaerts, H. Wortmann","doi":"10.1109/ENABL.2000.883736","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883736","url":null,"abstract":"In this paper we discuss the design of a mobile agent based infrastructure for monitoring and controlling activities in a Virtual Enterprise (VE). We define the concepts of the Virtual Enterprise and the Mobile Agent Web (MA-web).","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127214711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1