首页 > 最新文献

Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

英文 中文
Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system 基于xml的代理系统中扩展企业分布式协同设计与可制造性评价
J. Shiau, S. Ratchev, George Valtchanov
Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.
基于协同设计和制造代理的扩展企业零件可制造性评估决策环境的试点应用报告。该系统被实现为一个基于XML/ corba的环境,用于跨传统技术边界传递设计和制造消息。该方法基于使用一种新的可制造性标记语言(MML)在不同代理之间交换可制造性请求和产品信息。本文概述了关键领域模型及其在决策环境中的集成。本研究旨在为设计人员提供一种快速的可制造性评估工具,用于扩展制造企业的早期设计阶段。
{"title":"Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system","authors":"J. Shiau, S. Ratchev, George Valtchanov","doi":"10.1109/ENABL.2000.883740","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883740","url":null,"abstract":"Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
CVE technology development based an real world application and user needs CVE技术的开发基于现实世界的应用和用户需求
E. Daphne, M. William, P.R. Steve, W.J. Adrian
Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.
认为协作虚拟环境(CVE)技术的发展必须以应用和最终用户需求为导向。基于对现实世界教育环境中使用的原型的观察,描述了人为因素和技术研究人员之间的合作。该研究的目的是为在CVE中使用虚拟角色开发一个设计因素框架,并为底层CVE技术的发展提供信息。接下来的方法论方法涉及到原型虚拟学习环境的开发,在一系列不同的阶段增加复杂性。环境是基于古埃及游戏(Senet),目标是在英国国家教育课程的关键阶段2级的孩子。本文展示了如何使用已建立的2D多媒体技术来开发健壮的原型,然后由儿童观察使用。这些阶段的结果已用于指导当前阶段的工作。这涉及到使用实验性的Deva虚拟现实系统构建一个3D共享虚拟环境。
{"title":"CVE technology development based an real world application and user needs","authors":"E. Daphne, M. William, P.R. Steve, W.J. Adrian","doi":"10.1109/ENABL.2000.883698","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883698","url":null,"abstract":"Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Secure self-certified COTS 安全的自我认证COTS
M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.
随着网络、Internet、intranet和分布式系统的出现和日益普及,安全性成为信息技术研究的主要问题之一。人们提出了越来越多的方法来确保程序的安全性。在这些方法中,经过认证的代码似乎是最有前途的。不幸的是,到目前为止,大多数关于认证代码的研究都集中在简单的类型安全和内存安全上,而不是安全性问题。因此,我们建议将这种方法扩展到程序的安全方面。我们的目的是使用这种方法作为COTS中恶意代码检测问题的有效和现实的解决方案。在本文中,我们介绍了我们在定义和实现认证编译器方面的进展,该编译器产生安全的自认证代码,可用于确保代码的安全性和安全性。
{"title":"Secure self-certified COTS","authors":"M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi","doi":"10.1109/ENABL.2000.883726","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883726","url":null,"abstract":"With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EWS-a case study on access control in workflow systems ews -工作流系统中访问控制的案例研究
Åsa Hagström, V. Fåk, M. Vandenwauver
EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.
EWS是一个正在开发的工作流引擎,具有特定的访问控制需求。我们研究了这些需求的一个子集,涉及工作分配、锁定和委托问题。另外三个系统——changengine、FloWare和Two-Schema architecture——已经针对这些问题进行了研究,我们使用从这些研究中获得的见解来给出我们自己的解决方案。在系统设计中所做的更改包括新的访问、节点、对哪些对象使用哪些访问模式的结构、流程文档文件夹和委托关系。
{"title":"EWS-a case study on access control in workflow systems","authors":"Åsa Hagström, V. Fåk, M. Vandenwauver","doi":"10.1109/ENABL.2000.883731","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883731","url":null,"abstract":"EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initialization vector attacks on the IPsec protocol suite 针对IPsec协议套件的初始化向量攻击
Christopher B. McCubbin, A. Selçuk, D. Sidhu
In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.
在本文中,我们分析了IPsec在一类被称为IV攻击的攻击下的安全性,IV攻击是基于在传输过程中修改cbc加密数据包的初始化向量(IV)。我们表明,如果不小心使用IPsec, IV攻击可能对IPsec构成严重威胁。我们还讨论了针对这些攻击的防御方法。
{"title":"Initialization vector attacks on the IPsec protocol suite","authors":"Christopher B. McCubbin, A. Selçuk, D. Sidhu","doi":"10.1109/ENABL.2000.883723","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883723","url":null,"abstract":"In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Experiments in information visualization using 3D metaphoric worlds 使用三维隐喻世界的信息可视化实验
C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris
In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.
在本文中,我们提出了关于使用三维(3D)可视化来表示信息的实验。这些实验是在CyberNet研究项目的背景下进行的。CyberNet项目的目标是增强网络管理工具的用户界面。其目的是研究隐喻三维可视化如何帮助用户监控大量动态信息的过程。虽然该项目侧重于特定的应用领域,即网络管理,但其核心框架的设计使其可以应用于其他领域,并且可以从web浏览器访问该系统,从而允许信息和知识共享。
{"title":"Experiments in information visualization using 3D metaphoric worlds","authors":"C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris","doi":"10.1109/ENABL.2000.883704","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883704","url":null,"abstract":"In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000) IEEE第九届支持技术国际研讨会:协作企业的基础设施(WET ICE 2000)
{"title":"IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000)","authors":"","doi":"10.1109/ENABL.2000.883694","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883694","url":null,"abstract":"","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1