Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883740
J. Shiau, S. Ratchev, George Valtchanov
Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.
{"title":"Distributed collaborative design and manufacturability assessment for extended enterprise in XML-based agent system","authors":"J. Shiau, S. Ratchev, George Valtchanov","doi":"10.1109/ENABL.2000.883740","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883740","url":null,"abstract":"Reports on a pilot application of a decision-making environment for part manufacturability assessment in extended enterprises using collaborative design and manufacturing agents. The system is implemented as an XML/CORBA-based environment for conveying design and manufacturing messages across traditional technology boundaries. The approach is based on the exchange of manufacturability requests and product information between different agents using a new Manufacturability Markup Language (MML). This paper provides an overview of key domain models and their integration within the decision-making environment. The reported research aims to provide designers with a rapid manufacturability assessment tool to be used at an early design stage in extended manufacturing enterprises.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883698
E. Daphne, M. William, P.R. Steve, W.J. Adrian
Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.
{"title":"CVE technology development based an real world application and user needs","authors":"E. Daphne, M. William, P.R. Steve, W.J. Adrian","doi":"10.1109/ENABL.2000.883698","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883698","url":null,"abstract":"Argues that the development of collaborative virtual environment (CVE) technology must be guided by application and end-user needs. A collaboration is described between human factors and technological researchers based on observations of prototypes in use in a real-world educational situation. The aim of the research is to develop a framework of design factors for the use of virtual actors in CVEs and to inform the development of the underlying CVE technology. The methodological approach followed involves the development of prototype virtual learning environments in a series of distinct phases of increasing sophistication. The environments are based on an ancient Egyptian game (Senet) and are aimed at children at Key Stage Level 2 of the National Curriculum for education in England. The paper shows how established 2D multimedia technologies were used to develop robust prototypes which were then observed in use by children. Results from these phases have been used to guide the current phase of work. This involves the construction of a 3D shared virtual environment using the experimental Deva virtual reality system.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115730519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883726
M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi
With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.
{"title":"Secure self-certified COTS","authors":"M. Debbabi, E. Giasson, Béchir Ktari, F. Michaud, N. Tawbi","doi":"10.1109/ENABL.2000.883726","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883726","url":null,"abstract":"With the advent and the rising popularity of networks, Internet, intranets and distributed systems, security is becoming one of the major concerns in IT research. An increasing number of approaches have been proposed to ensure the safety and security of programs. Among those approaches, certified code seems to be the most promising. Unfortunately, as of today, most of the research on certified code have focused on simple type safety and memory safety, rather than security issues. We therefore propose to extend this approach to the security aspects of a program. Our intention is to use such an approach as an efficient and realistic solution to the problem of malicious code detection in COTS. In this paper, we present our progress in defining and implementing a certifying compiler that produces a secure self-certified code that can be used to ensure both safety and security of the code.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130635079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883731
Åsa Hagström, V. Fåk, M. Vandenwauver
EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.
{"title":"EWS-a case study on access control in workflow systems","authors":"Åsa Hagström, V. Fåk, M. Vandenwauver","doi":"10.1109/ENABL.2000.883731","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883731","url":null,"abstract":"EWS is a workflow engine under development with specific requirements for the access control. We study a subset of these requirements, concerning work assignment, lockups and delegation issues. Three other systems-Changengine, FloWare and the Two-Schema Architecture-have been studied with respect to these problems, and we use the insights gained from these studies to give our own solutions to the problems. Changes that are made in the design of the system include new access, nodes, a structure for which access modes to use for which objects, a process document folder, and a delegation relation.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132880688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883723
Christopher B. McCubbin, A. Selçuk, D. Sidhu
In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.
{"title":"Initialization vector attacks on the IPsec protocol suite","authors":"Christopher B. McCubbin, A. Selçuk, D. Sidhu","doi":"10.1109/ENABL.2000.883723","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883723","url":null,"abstract":"In this paper, we analyze the security of IPsec against a class of attacks known as the IV attacks, which are based on modifying the initialization vector (IV) of a CBC-encrypted packet during transmission. We show that IV attacks can be a serious threat for IPsec if IPsec is not used carefully. We also discuss the defense methods against these attacks.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115832941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2000-06-04DOI: 10.1109/ENABL.2000.883704
C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris
In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.
{"title":"Experiments in information visualization using 3D metaphoric worlds","authors":"C. R. D. Santos, P. Gros, P. Abel, D. Loisel, N. Trichaud, J. Paris","doi":"10.1109/ENABL.2000.883704","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883704","url":null,"abstract":"In this paper we present experiments concerning the use of three-dimensional (3D) visualization for representing information. These experiments were conducted in the context of the CyberNet research project. The CyberNet project is oriented toward the enhancement of the user interface of network management tools. Its aim is to study how metaphoric 3D visualization may help the user in the process of monitoring large amounts of dynamic information. Although the project focuses on a specific application domain, network management, the core framework is designed so that it can be applied to other domains, and the system may be accessed from a web browser, thus allowing for information and knowledge sharing.","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"229 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123193013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/ENABL.2000.883694
{"title":"IEEE 9th international workshops on enabling technologies: infrastructure for collaborative enterprises (WET ICE 2000)","authors":"","doi":"10.1109/ENABL.2000.883694","DOIUrl":"https://doi.org/10.1109/ENABL.2000.883694","url":null,"abstract":"","PeriodicalId":435283,"journal":{"name":"Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122877306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}