首页 > 最新文献

Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)最新文献

英文 中文
Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system 基于xml的代理系统中扩展企业分布式协同设计与可制造性评价
J. Shiau, S. Ratchev, George Valtchanov
Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.
基于协同设计和制造代理的扩展企业零件可制造性评估决策环境的试点应用报告。该系统被实现为一个基于XML/ corba的环境,用于跨传统技术边界传递设计和制造消息。该方法基于使用一种新的可制造性标记语言(MML)在不同代理之间交换可制造性请求和产品信息。本文概述了关键领域模型及其在决策环境中的集成。本研究旨在为设计人员提供一种快速的可制造性评估工具,用于扩展制造企业的早期设计阶段。
{"title":"Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system","authors":"J. Shiau, S. Ratchev, George Valtchanov","doi":"10.1109/ENABL.2000.883740","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883740","url":null,"abstract":"Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Position paper on integrated broadband environment for personalized TV experience (IBEX) 关于个性化电视体验的集成宽带环境(IBEX)的立场文件
Y. Gonno, F. Nishio, Yasuaki Yamagishi, T. Tsunoda
As a next step towards the integration of TV and the Web environment, we started a new project on integrated broadband environment for personalized TV experience (IBEX). This is a position paper on IBEX describing an architectural overview of future multimedia environment. The IBEX project also intends to provide a service model for the TV-Anytime framework. The concept of the IBEX features three major viewpoints towards the future TV experience. To release audience from time constraint scheduled by broadcasters is the first target. Then to get seamless and adaptive access between TV and the Web environment from anywhere in the world is also important. In addition, such TV experience is to be securely personalized for individual audience. In order to achieve open framework, these viewpoints must be properly developed in conjunction with well-organized data models and system architecture based on de facto standard technology. The IBEX will provide a prototype system model built on upcoming integrated broadband digital TV infrastructure.
作为电视和网络环境融合的下一步,我们启动了一个新的项目——个性化电视体验集成宽带环境(IBEX)。这是一份关于IBEX的立场文件,描述了未来多媒体环境的架构概述。IBEX项目还打算为TV-Anytime框架提供一个服务模型。IBEX的概念体现了对未来电视体验的三个主要观点。将观众从广播公司安排的时间限制中解放出来是第一个目标。然后,在世界上任何地方的电视和网络环境之间获得无缝和自适应的访问也很重要。此外,这种电视体验将为个人观众提供安全的个性化服务。为了实现开放框架,必须将这些视点与组织良好的数据模型和基于事实标准技术的系统架构结合起来进行适当的开发。IBEX将提供一个基于即将到来的集成宽带数字电视基础设施的原型系统模型。
{"title":"Position paper on integrated broadband environment for personalized TV experience (IBEX)","authors":"Y. Gonno, F. Nishio, Yasuaki Yamagishi, T. Tsunoda","doi":"10.1109/ENABL.2000.883707","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883707","url":null,"abstract":"As a next step towards the integration of TV and the Web environment, we started a new project on integrated broadband environment for personalized TV experience (IBEX). This is a position paper on IBEX describing an architectural overview of future multimedia environment. The IBEX project also intends to provide a service model for the TV-Anytime framework. The concept of the IBEX features three major viewpoints towards the future TV experience. To release audience from time constraint scheduled by broadcasters is the first target. Then to get seamless and adaptive access between TV and the Web environment from anywhere in the world is also important. In addition, such TV experience is to be securely personalized for individual audience. In order to achieve open framework, these viewpoints must be properly developed in conjunction with well-organized data models and system architecture based on de facto standard technology. The IBEX will provide a prototype system model built on upcoming integrated broadband digital TV infrastructure.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121973520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Secure self-certified COTS 安全的自我认证COTS
M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.
随着网络、Internet、intranet和分布式系统的出现和日益普及,安全性成为信息技术研究的主要问题之一。人们提出了越来越多的方法来确保程序的安全性。在这些方法中,经过认证的代码似乎是最有前途的。不幸的是,到目前为止,大多数关于认证代码的研究都集中在简单的类型安全和内存安全上,而不是安全性问题。因此,我们建议将这种方法扩展到程序的安全方面。我们的目的是使用这种方法作为COTS中恶意代码检测问题的有效和现实的解决方案。在本文中,我们介绍了我们在定义和实现认证编译器方面的进展,该编译器产生安全的自认证代码,可用于确保代码的安全性和安全性。
{"title":"Secure self-certified COTS","authors":"M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi","doi":"10.1109/ENABL.2000.883726","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883726","url":null,"abstract":"With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
EWS-a case study on access control in workflow systems ews -工作流系统中访问控制的案例研究
Åsa Hagström, V. Fåk, M. Vandenwauver
EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.
EWS是一个正在开发的工作流引擎,具有特定的访问控制需求。我们研究了这些需求的一个子集,涉及工作分配、锁定和委托问题。另外三个系统——changengine、FloWare和Two-Schema architecture——已经针对这些问题进行了研究,我们使用从这些研究中获得的见解来给出我们自己的解决方案。在系统设计中所做的更改包括新的访问、节点、对哪些对象使用哪些访问模式的结构、流程文档文件夹和委托关系。
{"title":"EWS-a case study on access control in workflow systems","authors":"Åsa Hagström, V. Fåk, M. Vandenwauver","doi":"10.1109/ENABL.2000.883731","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883731","url":null,"abstract":"EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Initialization vector attacks on the IPsec protocol suite 针对IPsec协议套件的初始化向量攻击
Christopher B. McCubbin, A. Selçuk, D. Sidhu
In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.
在本文中,我们分析了IPsec在一类被称为IV攻击的攻击下的安全性,IV攻击是基于在传输过程中修改cbc加密数据包的初始化向量(IV)。我们表明,如果不小心使用IPsec, IV攻击可能对IPsec构成严重威胁。我们还讨论了针对这些攻击的防御方法。
{"title":"Initialization vector attacks on the IPsec protocol suite","authors":"Christopher B. McCubbin, A. Selçuk, D. Sidhu","doi":"10.1109/ENABL.2000.883723","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883723","url":null,"abstract":"In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Experiments in information visualization using 3D metaphoric worlds 使用三维隐喻世界的信息可视化实验
C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris
In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.
在本文中,我们提出了关于使用三维(3D)可视化来表示信息的实验。这些实验是在CyberNet研究项目的背景下进行的。CyberNet项目的目标是增强网络管理工具的用户界面。其目的是研究隐喻三维可视化如何帮助用户监控大量动态信息的过程。虽然该项目侧重于特定的应用领域,即网络管理,但其核心框架的设计使其可以应用于其他领域,并且可以从web浏览器访问该系统,从而允许信息和知识共享。
{"title":"Experiments in information visualization using 3D metaphoric worlds","authors":"C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris","doi":"10.1109/ENABL.2000.883704","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883704","url":null,"abstract":"In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000) IEEE第九届支持技术国际研讨会:协作企业的基础设施(WET ICE 2000)
{"title":"IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000)","authors":"","doi":"10.1109/ENABL.2000.883694","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883694","url":null,"abstract":"","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1