E-Book, Englisch, 348 Seiten
Aalst / Mylopoulos / Szyperski E-Technologies: Innovation in an Open World
1. Auflage 2009
ISBN: 978-3-642-01187-0
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009, Proceedings
E-Book, Englisch, 348 Seiten
ISBN: 978-3-642-01187-0
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The 23 full and 4 short papers included in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.
Autoren/Hrsg.
Weitere Infos & Material
1;Title Page;2
2;Preface;5
3;Organization;7
4;Table of Contents;10
5;Internet-Based Collaborative Work/E-Education;13
5.1;Helping E-Commerce Consumers Make Good Purchase Decisions: A User Reviews-Based Approach;13
5.1.1;Introduction;13
5.1.2;Related Work;14
5.1.3;Proposed Approach;15
5.1.3.1;Review Helpfulness;15
5.1.3.2;Entropy and Information Gain;16
5.1.3.3;Prediction Computation;17
5.1.4;Experimental Evaluation;18
5.1.4.1;Measures;18
5.1.4.2;Data Set;19
5.1.4.3;Results and Analysis;19
5.1.4.4;Discussion;21
5.1.5;Conclusion and Future Work;22
5.1.6;References;22
5.2;Using Instant Messaging Systems as a Platform for Electronic Voting;24
5.2.1;Introduction;24
5.2.2;Description of Decision Scenarios;25
5.2.2.1;Scenario: No Discussion, Secret Election;25
5.2.2.2;Scenario: No Discussion and Election by Name;26
5.2.2.3;Scenario: Discussion and Election by Name;26
5.2.2.4;Scenario: Discussion by Name and Secret Voting;26
5.2.3;Instant Messaging as a Platform for E-Voting;27
5.2.3.1;Software Architecture of the Extended IM System;27
5.2.3.2;Overview of the Voting Procedure;28
5.2.3.3;Attacks and Countermeasures;31
5.2.4;E-Voting;32
5.2.4.1;Creation and Encryption of votes;33
5.2.4.2;Mixing of Votes;33
5.2.4.3;Signing of Votes;34
5.2.4.4;Counting of Votes;34
5.2.4.5;Suitability of the Mix-Method Protocol for Our Scenarios;34
5.2.5;Conclusions;35
5.2.6;Reference;35
5.3;A Multi-criteria Collaborative Filtering Approach for Research Paper Recommendation in Papyres;37
5.3.1;Introduction;37
5.3.2;Locating Research Literature;39
5.3.3;Background;39
5.3.3.1;Papyres;39
5.3.3.2;Paper Recommender Systems;41
5.3.4;Multi-criteria Hybrid Recommender System;42
5.3.4.1;Content Based;42
5.3.4.2;Multi-criteria Collaborative Filtering;43
5.3.5;Testing and Result;46
5.3.5.1;Results and Findings;47
5.3.6;Conclusions and Future Work;49
5.3.7;References;50
6;Industrial Experience;52
6.1;An Ontological Approach to Connecting SOA Implementations;52
6.1.1;Introduction;52
6.1.1.1;Premise;52
6.1.1.2;Purpose;52
6.1.1.3;Scope;52
6.1.1.4;Constraints;52
6.1.2;The Problem of SOA Discontinuity;52
6.1.2.1;The Theory;52
6.1.2.2;The Problem;54
6.1.3;Linking Communities - The Layered Ontological Overlay;56
6.1.3.1;General;56
6.1.3.2;The Methodology;57
6.1.4;Issues;60
6.1.4.1;Overview;60
6.1.4.2;Run-Time Translation;60
6.1.4.3;Conflicts;61
6.1.4.4;Inconsistencies;61
6.1.4.5;Technical Interoperability;61
6.1.4.6;Semantic Interoperability;61
6.1.5;Implications;62
6.1.6;Final Considerations;63
6.1.7;Conclusion;64
6.2;A Non-technical User-Oriented Display Notation for XACML Conditions;65
6.2.1;Motivation;65
6.2.2;Principles in Current XML Editors;66
6.2.3;Principles in Current XACML Editors;68
6.2.4;Our Proposed Notation;70
6.2.5;Our Notation in the Context of an Editor;73
6.2.6;Our Notation Beyond XACML;75
6.2.7;Conclusion;75
6.2.8;References;76
6.3;Goal-Driven Development of a Patient Surveillance Application for Improving Patient Safety;77
6.3.1;Introduction;77
6.3.2;Background;78
6.3.2.1;Adverse Events in Health Care;78
6.3.2.2;Business Process Modeling with the User Requirement Notation;79
6.3.3;Highlights of the Development Approach;80
6.3.4;Patient Surveillance Application;81
6.3.4.1;Defining the Goals and Evaluating Strategies;81
6.3.4.2;Modeling the Process Satisfying the Goals;83
6.3.4.3;Software Architecture and Implementation;85
6.3.4.4;Obstacles and Mitigations;85
6.3.5;Conclusion and Future Work;87
6.3.6;References;88
6.4;Global Location-Based Access to Web Applications Using Atom-Based Automatic Update;89
6.4.1;Introduction;90
6.4.2;The System Architecture of the VUA;90
6.4.3;Location-Based Call Routing;92
6.4.3.1;Implementation and Use of the Mobile Web Widget;93
6.4.3.2;Widget Component Structure;95
6.4.3.3;Info.plist-Property of a Widget;95
6.4.3.4;Icon.png;96
6.4.4;Atom;96
6.4.4.1;AtomPub Protocol (APP);98
6.4.5;Results;98
6.4.5.1;Evaluation of the Atom Feed;98
6.4.5.2;Evaluation of the VOIP Providers With Asterisk;98
6.4.6;Conclusion;100
6.4.7;References;100
7;Inter-Organizational Processes I;101
7.1;Toward a Framework for Dynamic Service Binding in E-Procurement;101
7.1.1;Introduction;101
7.1.2;Related Standards and Technologies;102
7.1.3;Dynamic Service Binding in E-Procurement;104
7.1.3.1;E-Procurement Scenarios;104
7.1.3.2;The Proposed Architecture;105
7.1.3.3;The Policy-Based Message Broker;107
7.1.4;Discussions of Results;108
7.1.5;References;109
7.2;Integrating Identity Management With Federated Healthcare Data Models;112
7.2.1;Introduction;112
7.2.2;Healthcare Scenario;113
7.2.3;Existing Approaches for Integrating Identity Management Into Federated Data Models;114
7.2.3.1;Technical Issues for Identity Management in a Federated Data Model;114
7.2.3.2;Three-Phase Consolidation Process Model;115
7.2.3.3;Circle of Trust Model;117
7.2.3.4;DB2 Anonymous Resolution Model;118
7.2.3.5;Summary of Approaches;119
7.2.4;Systematic Framework for Integrating Identity Management into Federated Healthcare Data Models;119
7.2.4.1;Framework Overview;120
7.2.4.2;Preparation of Data for Sharing;120
7.2.4.3;Consolidation in Federated Data Model;121
7.2.4.4;Evaluation of Consolidated Dataset;121
7.2.5;Conclusions;122
7.2.6;References;123
7.3;Wrestling With a Paradox: Complexity in Interoperability Standards Making for Healthcare Information Systems;125
7.3.1;Introduction;125
7.3.2;Electronic Medical Record (EMR) System Adoption by Physicians;126
7.3.3;Healthcare System Interoperability;128
7.3.3.1;Standards Making in Healthcare;128
7.3.3.2;Technical Complexity as a Barrier to Standards Making;129
7.3.3.3;Social Complexity as a Barrier to Standards Making;130
7.3.4;Perceived Value of Information: Uncertainty vs. Equivocality as Factors;132
7.3.5;Recommendations;133
7.3.6;Conclusions;134
7.3.7;References;135
8;Open Source and Open Environments;138
8.1;Aligning Goal and Value Models for Information System Design;138
8.1.1;Introduction;138
8.1.2;Related Works;139
8.1.3;Goal Modeling;140
8.1.3.1;Case Study: Eye-Care Health Service;140
8.1.3.2;The KAOS Goal Modeling Language;140
8.1.3.3;The KAOS Requirements Engineering Process;142
8.1.4;Business Modeling;142
8.1.5;Methodology for Model Transformation;144
8.1.5.1;Goal Formulation;144
8.1.5.2;System Requirements Templates;145
8.1.5.3;Transforming KAOS to the $e^{3} value$ Ontology;145
8.1.6;Method Application to Create a Goal-Based Business Model;147
8.1.7;Conclusion;150
8.1.8;References;151
8.2;Model-Based Penetration Test Framework for Web Applications Using TTCN-3;153
8.2.1;Introduction;153
8.2.2;Background and Related Work;154
8.2.3;Model-Based Penetration Testing for Web Applications;156
8.2.3.1;Analysis of the Top Ten Web Application Vulnerabilities 2007;157
8.2.3.2;Analysis of the Commonly Used Fuzz Vectors;158
8.2.3.3;Data Model for Test Case Development;158
8.2.3.4;Algorithm for Test Case Generator;159
8.2.4;Penetration Test Framework Based on TTCN-3;160
8.2.4.1;Test Scenario;161
8.2.4.2;TTCN-3 Implementation Considerations;162
8.2.5;Analysis of Results;164
8.2.6;Conclusions and Future Work;165
8.2.7;References;165
8.3;Impact of Diversity on Open Source Software;167
8.3.1;Introduction;167
8.3.2;Diversity;167
8.3.3;Diversity and Organizations;168
8.3.4;Diversity and OSS Projects;170
8.3.5;Hypothesis Development;170
8.3.5.1;Research Question and Research Model;170
8.3.5.2;Hypotheses;171
8.3.6;Research Method;172
8.3.6.1;Unit of Analysis: Project Driven by the Eclipse Foundation;172
8.3.6.2;Study Period;172
8.3.6.3;Sample;173
8.3.6.4;Research Variables;174
8.3.7;Research Results;176
8.3.8;Summary of Key Findings;177
8.3.9;Conclusions;178
8.3.10;References;178
8.4;Web Search Based onWeb Communities Feedback Data;181
8.4.1;Introduction;181
8.4.1.1;Web Page Ranking Strategies;181
8.4.1.2;Opinion Data andWeb Search;182
8.4.2;Integrating Opinion Data inWeb Search;183
8.4.2.1;Typical Usage Scenario;183
8.4.2.2;Opinion Data Description Language;184
8.4.2.3;FeedbackWarehouses;188
8.4.2.4;Measuring the Relevance of an Instance of Opinion and Querying a Set of Warehouses of Opinions;190
8.4.3;Evaluation;191
8.4.3.1;Prototype;191
8.4.3.2;Experimentation Protocol;192
8.4.3.3;Results Analysis;193
8.4.4;Concluding Remarks and Perspectives;194
8.4.5;References;194
9;Inter-Organizational Processes II;196
9.1;Improving Trust and Reputation Modeling in E-Commerce Using Agent Lifetime and Transaction Count;196
9.1.1;Introduction;196
9.1.2;Related Work;198
9.1.3;Proposed Approach;199
9.1.3.1;Agent Lifetime;199
9.1.3.2;Transaction Count;199
9.1.3.3;Seniority;200
9.1.3.4;Building an Initial Advisor List;200
9.1.3.5;Weighting Advice;200
9.1.4;Experimental Results;201
9.1.4.1;Description;201
9.1.4.2;Base Case Model;203
9.1.4.3;Test Case Model;203
9.1.4.4;Results;204
9.1.5;Discussion;206
9.1.6;Conclusions and Future Work;206
9.1.7;References;207
9.2;Towards a Methodology for Representing and Classifying Business Processes;208
9.2.1;Introduction;208
9.2.2;Process Modeling;210
9.2.3;An Approach to Business Process Classification;211
9.2.3.1;Principles;211
9.2.3.2;Classification Using Metamodel Hotspots;213
9.2.4;Designing a Tool for Process Modeling and Specialization;216
9.2.4.1;Concept of Operations;216
9.2.4.2;Representing Process Models, Questions, and Specializations;217
9.2.5;Implementing Process Modeling and Specialization;220
9.2.5.1;Implement the Business Process Metamodel;220
9.2.5.2;The Question Model;221
9.2.5.3;Handling Specialization;222
9.2.6;Discussion;222
9.2.7;References;223
9.3;Typing for Conflict Detection in Access Control Policies;224
9.3.1;Introduction;224
9.3.2;Access Control Policies With Contexts;225
9.3.2.1;Expressing High Level Access Control Rules;226
9.3.2.2;Expressing Low Level Access Control Rules;229
9.3.2.3;Expressing Contexts;230
9.3.2.4;User Group, Activity Group and View Group Hierarchies;232
9.3.3;Conflict Verification by Typing;232
9.3.3.1;Dynamic Groups;233
9.3.3.2;Typing System;233
9.3.3.3;Examples;233
9.3.3.4;Typing Judgements and Typing Rules;234
9.3.4;Example;235
9.3.5;Conclusion;236
9.3.6;References;237
10;Short Research Contributions;239
10.1;Dynamic Pricing in Electronic Commerce Using Neural Network;239
10.1.1;Introduction;239
10.1.2;Feed-Forward Neural Network;240
10.1.3;Dynamic Pricing Using Neural Network;240
10.1.4;Results and Analysis;242
10.1.5;Related Works;243
10.1.6;Conclusion and Future Work;244
10.1.7;References;244
10.2;TwoStep: An Authentication Method Combining Text and Graphical Passwords;245
10.2.1;Introduction;245
10.2.2;Two-Step Authentication Method;246
10.2.3;Preliminary Security Analysis;248
10.2.4;Related Work;249
10.2.5;Concluding Remarks;250
10.2.6;References;250
10.3;Design Principles for E-Government Architectures;252
10.3.1;Introduction;252
10.3.2;Principles for Architecting an EGP;253
10.3.3;Design of the EGP;255
10.3.4;Conclusion;256
10.3.5;References;257
10.4;A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment;258
10.4.1;Introduction;258
10.4.2;Policy-Based Networking;259
10.4.3;Agents in Policy-Based Environments;259
10.4.4;Policy-Based Interfaces;260
10.4.4.1;User Profiles;260
10.4.4.2;Local Interface Policy;260
10.4.4.3;Interface Profile;261
10.4.4.4;Central Interface Policy;261
10.4.4.5;Learning;262
10.4.5;Future Work;262
10.4.6;References;263
11;Security and Trust;264
11.1;Verification of Information Flow in Agent-Based Systems;264
11.1.1;Introduction and Motivation;264
11.1.2;Background;266
11.1.2.1;Information Algebra;266
11.1.2.2;Global Calculus;267
11.1.2.3;Hoare Logic;267
11.1.3;Illustrative Example;268
11.1.4;The Proposed Technique;269
11.1.4.1;Knowledge Representation;269
11.1.4.2;Specification of Communications Among Agents;272
11.1.4.3;Analysis;273
11.1.5;Discussion and Related Work;276
11.1.5.1;Bell-LaPadula Model;276
11.1.5.2;The Chinese Wall Model;276
11.1.5.3;Verification Techniques;276
11.1.6;Conclusion;277
11.1.7;References;278
11.2;A Legal Perspective on Business: Modeling the Impact of Law;279
11.2.1;Introduction;279
11.2.2;Related Work;280
11.2.3;Legal Modeling;281
11.2.4;HIPAA Case Study;282
11.2.4.1;Model of the Law;282
11.2.4.2;GRL Model of Law: Pros and Cons;285
11.2.5;Impact Analysis;286
11.2.5.1;Model of the Organization;286
11.2.5.2;The Organization Model Against the Law Model: A Business Analysis;287
11.2.6;Conclusions;289
11.2.7;References;289
11.3;A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations;291
11.3.1;Introduction;291
11.3.2;Background;292
11.3.3;Palliative Care Scenario;294
11.3.4;Framework;298
11.3.5;Conclusions;299
11.3.6;References;300
12;Service-Oriented Architecture;302
12.1;An Aspect-Oriented Framework for Business Process Improvement;302
12.1.1;Introduction;302
12.1.2;Background and Related Work;304
12.1.2.1;BPM with URN;304
12.1.2.2;Aspect-Oriented Modeling With the User Requirements Notation;308
12.1.3;Framework;309
12.1.4;Case Study;310
12.1.5;Conclusion and Future Work;315
12.1.6;References;315
12.2;Integration Testing of Web Applications and Databases Using TTCN-3;318
12.2.1;Introduction;318
12.2.2;Book Store Web Application Example;319
12.2.3;Database Integration Testing;320
12.2.3.1;Data Typing;321
12.2.3.2;Specifying Test Oracles Using TTCN-3 Templates;321
12.2.3.3;Performing a Test;322
12.2.3.4;Separation of Concerns Between Abstract and Concrete Layer;322
12.2.4;Integration Testing of Web and Database Applications;324
12.2.4.1;Consistency Check Between Web Data Entries and Database State;324
12.2.4.2;Consistency Check Between Database State and Web Queries;326
12.2.5;Conclusions and Future Work;329
12.2.6;References;330
12.3;A Reference Model for Semantic Peer-to-Peer Networks;331
12.3.1;Introduction;331
12.3.2;Related Work;332
12.3.3;Differences Between P2P and SP2P Systems;333
12.3.4;SP2P Reference Architecture;333
12.3.4.1;Peers;334
12.3.4.2;Resources;335
12.3.4.3;Query Formulator;336
12.3.4.4;Semantic Neighborhood;336
12.3.4.5;Mappings;337
12.3.4.6;Router;339
12.3.4.7;Query Answerer;341
12.3.5;Conclusion and Future Work;344
12.3.6;References;344
13;Author Index;347




