Aalst / Mylopoulos / Szyperski | E-Technologies: Innovation in an Open World | E-Book | www.sack.de
E-Book

E-Book, Englisch, 348 Seiten

Aalst / Mylopoulos / Szyperski E-Technologies: Innovation in an Open World

4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009, Proceedings
1. Auflage 2009
ISBN: 978-3-642-01187-0
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

4th International Conference, MCETECH 2009, Ottawa, Canada, May 4-6, 2009, Proceedings

E-Book, Englisch, 348 Seiten

ISBN: 978-3-642-01187-0
Verlag: Springer
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The 23 full and 4 short papers included in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.

Aalst / Mylopoulos / Szyperski E-Technologies: Innovation in an Open World jetzt bestellen!

Weitere Infos & Material


1;Title Page;2
2;Preface;5
3;Organization;7
4;Table of Contents;10
5;Internet-Based Collaborative Work/E-Education;13
5.1;Helping E-Commerce Consumers Make Good Purchase Decisions: A User Reviews-Based Approach;13
5.1.1;Introduction;13
5.1.2;Related Work;14
5.1.3;Proposed Approach;15
5.1.3.1;Review Helpfulness;15
5.1.3.2;Entropy and Information Gain;16
5.1.3.3;Prediction Computation;17
5.1.4;Experimental Evaluation;18
5.1.4.1;Measures;18
5.1.4.2;Data Set;19
5.1.4.3;Results and Analysis;19
5.1.4.4;Discussion;21
5.1.5;Conclusion and Future Work;22
5.1.6;References;22
5.2;Using Instant Messaging Systems as a Platform for Electronic Voting;24
5.2.1;Introduction;24
5.2.2;Description of Decision Scenarios;25
5.2.2.1;Scenario: No Discussion, Secret Election;25
5.2.2.2;Scenario: No Discussion and Election by Name;26
5.2.2.3;Scenario: Discussion and Election by Name;26
5.2.2.4;Scenario: Discussion by Name and Secret Voting;26
5.2.3;Instant Messaging as a Platform for E-Voting;27
5.2.3.1;Software Architecture of the Extended IM System;27
5.2.3.2;Overview of the Voting Procedure;28
5.2.3.3;Attacks and Countermeasures;31
5.2.4;E-Voting;32
5.2.4.1;Creation and Encryption of votes;33
5.2.4.2;Mixing of Votes;33
5.2.4.3;Signing of Votes;34
5.2.4.4;Counting of Votes;34
5.2.4.5;Suitability of the Mix-Method Protocol for Our Scenarios;34
5.2.5;Conclusions;35
5.2.6;Reference;35
5.3;A Multi-criteria Collaborative Filtering Approach for Research Paper Recommendation in Papyres;37
5.3.1;Introduction;37
5.3.2;Locating Research Literature;39
5.3.3;Background;39
5.3.3.1;Papyres;39
5.3.3.2;Paper Recommender Systems;41
5.3.4;Multi-criteria Hybrid Recommender System;42
5.3.4.1;Content Based;42
5.3.4.2;Multi-criteria Collaborative Filtering;43
5.3.5;Testing and Result;46
5.3.5.1;Results and Findings;47
5.3.6;Conclusions and Future Work;49
5.3.7;References;50
6;Industrial Experience;52
6.1;An Ontological Approach to Connecting SOA Implementations;52
6.1.1;Introduction;52
6.1.1.1;Premise;52
6.1.1.2;Purpose;52
6.1.1.3;Scope;52
6.1.1.4;Constraints;52
6.1.2;The Problem of SOA Discontinuity;52
6.1.2.1;The Theory;52
6.1.2.2;The Problem;54
6.1.3;Linking Communities - The Layered Ontological Overlay;56
6.1.3.1;General;56
6.1.3.2;The Methodology;57
6.1.4;Issues;60
6.1.4.1;Overview;60
6.1.4.2;Run-Time Translation;60
6.1.4.3;Conflicts;61
6.1.4.4;Inconsistencies;61
6.1.4.5;Technical Interoperability;61
6.1.4.6;Semantic Interoperability;61
6.1.5;Implications;62
6.1.6;Final Considerations;63
6.1.7;Conclusion;64
6.2;A Non-technical User-Oriented Display Notation for XACML Conditions;65
6.2.1;Motivation;65
6.2.2;Principles in Current XML Editors;66
6.2.3;Principles in Current XACML Editors;68
6.2.4;Our Proposed Notation;70
6.2.5;Our Notation in the Context of an Editor;73
6.2.6;Our Notation Beyond XACML;75
6.2.7;Conclusion;75
6.2.8;References;76
6.3;Goal-Driven Development of a Patient Surveillance Application for Improving Patient Safety;77
6.3.1;Introduction;77
6.3.2;Background;78
6.3.2.1;Adverse Events in Health Care;78
6.3.2.2;Business Process Modeling with the User Requirement Notation;79
6.3.3;Highlights of the Development Approach;80
6.3.4;Patient Surveillance Application;81
6.3.4.1;Defining the Goals and Evaluating Strategies;81
6.3.4.2;Modeling the Process Satisfying the Goals;83
6.3.4.3;Software Architecture and Implementation;85
6.3.4.4;Obstacles and Mitigations;85
6.3.5;Conclusion and Future Work;87
6.3.6;References;88
6.4;Global Location-Based Access to Web Applications Using Atom-Based Automatic Update;89
6.4.1;Introduction;90
6.4.2;The System Architecture of the VUA;90
6.4.3;Location-Based Call Routing;92
6.4.3.1;Implementation and Use of the Mobile Web Widget;93
6.4.3.2;Widget Component Structure;95
6.4.3.3;Info.plist-Property of a Widget;95
6.4.3.4;Icon.png;96
6.4.4;Atom;96
6.4.4.1;AtomPub Protocol (APP);98
6.4.5;Results;98
6.4.5.1;Evaluation of the Atom Feed;98
6.4.5.2;Evaluation of the VOIP Providers With Asterisk;98
6.4.6;Conclusion;100
6.4.7;References;100
7;Inter-Organizational Processes I;101
7.1;Toward a Framework for Dynamic Service Binding in E-Procurement;101
7.1.1;Introduction;101
7.1.2;Related Standards and Technologies;102
7.1.3;Dynamic Service Binding in E-Procurement;104
7.1.3.1;E-Procurement Scenarios;104
7.1.3.2;The Proposed Architecture;105
7.1.3.3;The Policy-Based Message Broker;107
7.1.4;Discussions of Results;108
7.1.5;References;109
7.2;Integrating Identity Management With Federated Healthcare Data Models;112
7.2.1;Introduction;112
7.2.2;Healthcare Scenario;113
7.2.3;Existing Approaches for Integrating Identity Management Into Federated Data Models;114
7.2.3.1;Technical Issues for Identity Management in a Federated Data Model;114
7.2.3.2;Three-Phase Consolidation Process Model;115
7.2.3.3;Circle of Trust Model;117
7.2.3.4;DB2 Anonymous Resolution Model;118
7.2.3.5;Summary of Approaches;119
7.2.4;Systematic Framework for Integrating Identity Management into Federated Healthcare Data Models;119
7.2.4.1;Framework Overview;120
7.2.4.2;Preparation of Data for Sharing;120
7.2.4.3;Consolidation in Federated Data Model;121
7.2.4.4;Evaluation of Consolidated Dataset;121
7.2.5;Conclusions;122
7.2.6;References;123
7.3;Wrestling With a Paradox: Complexity in Interoperability Standards Making for Healthcare Information Systems;125
7.3.1;Introduction;125
7.3.2;Electronic Medical Record (EMR) System Adoption by Physicians;126
7.3.3;Healthcare System Interoperability;128
7.3.3.1;Standards Making in Healthcare;128
7.3.3.2;Technical Complexity as a Barrier to Standards Making;129
7.3.3.3;Social Complexity as a Barrier to Standards Making;130
7.3.4;Perceived Value of Information: Uncertainty vs. Equivocality as Factors;132
7.3.5;Recommendations;133
7.3.6;Conclusions;134
7.3.7;References;135
8;Open Source and Open Environments;138
8.1;Aligning Goal and Value Models for Information System Design;138
8.1.1;Introduction;138
8.1.2;Related Works;139
8.1.3;Goal Modeling;140
8.1.3.1;Case Study: Eye-Care Health Service;140
8.1.3.2;The KAOS Goal Modeling Language;140
8.1.3.3;The KAOS Requirements Engineering Process;142
8.1.4;Business Modeling;142
8.1.5;Methodology for Model Transformation;144
8.1.5.1;Goal Formulation;144
8.1.5.2;System Requirements Templates;145
8.1.5.3;Transforming KAOS to the $e^{3} value$ Ontology;145
8.1.6;Method Application to Create a Goal-Based Business Model;147
8.1.7;Conclusion;150
8.1.8;References;151
8.2;Model-Based Penetration Test Framework for Web Applications Using TTCN-3;153
8.2.1;Introduction;153
8.2.2;Background and Related Work;154
8.2.3;Model-Based Penetration Testing for Web Applications;156
8.2.3.1;Analysis of the Top Ten Web Application Vulnerabilities 2007;157
8.2.3.2;Analysis of the Commonly Used Fuzz Vectors;158
8.2.3.3;Data Model for Test Case Development;158
8.2.3.4;Algorithm for Test Case Generator;159
8.2.4;Penetration Test Framework Based on TTCN-3;160
8.2.4.1;Test Scenario;161
8.2.4.2;TTCN-3 Implementation Considerations;162
8.2.5;Analysis of Results;164
8.2.6;Conclusions and Future Work;165
8.2.7;References;165
8.3;Impact of Diversity on Open Source Software;167
8.3.1;Introduction;167
8.3.2;Diversity;167
8.3.3;Diversity and Organizations;168
8.3.4;Diversity and OSS Projects;170
8.3.5;Hypothesis Development;170
8.3.5.1;Research Question and Research Model;170
8.3.5.2;Hypotheses;171
8.3.6;Research Method;172
8.3.6.1;Unit of Analysis: Project Driven by the Eclipse Foundation;172
8.3.6.2;Study Period;172
8.3.6.3;Sample;173
8.3.6.4;Research Variables;174
8.3.7;Research Results;176
8.3.8;Summary of Key Findings;177
8.3.9;Conclusions;178
8.3.10;References;178
8.4;Web Search Based onWeb Communities Feedback Data;181
8.4.1;Introduction;181
8.4.1.1;Web Page Ranking Strategies;181
8.4.1.2;Opinion Data andWeb Search;182
8.4.2;Integrating Opinion Data inWeb Search;183
8.4.2.1;Typical Usage Scenario;183
8.4.2.2;Opinion Data Description Language;184
8.4.2.3;FeedbackWarehouses;188
8.4.2.4;Measuring the Relevance of an Instance of Opinion and Querying a Set of Warehouses of Opinions;190
8.4.3;Evaluation;191
8.4.3.1;Prototype;191
8.4.3.2;Experimentation Protocol;192
8.4.3.3;Results Analysis;193
8.4.4;Concluding Remarks and Perspectives;194
8.4.5;References;194
9;Inter-Organizational Processes II;196
9.1;Improving Trust and Reputation Modeling in E-Commerce Using Agent Lifetime and Transaction Count;196
9.1.1;Introduction;196
9.1.2;Related Work;198
9.1.3;Proposed Approach;199
9.1.3.1;Agent Lifetime;199
9.1.3.2;Transaction Count;199
9.1.3.3;Seniority;200
9.1.3.4;Building an Initial Advisor List;200
9.1.3.5;Weighting Advice;200
9.1.4;Experimental Results;201
9.1.4.1;Description;201
9.1.4.2;Base Case Model;203
9.1.4.3;Test Case Model;203
9.1.4.4;Results;204
9.1.5;Discussion;206
9.1.6;Conclusions and Future Work;206
9.1.7;References;207
9.2;Towards a Methodology for Representing and Classifying Business Processes;208
9.2.1;Introduction;208
9.2.2;Process Modeling;210
9.2.3;An Approach to Business Process Classification;211
9.2.3.1;Principles;211
9.2.3.2;Classification Using Metamodel Hotspots;213
9.2.4;Designing a Tool for Process Modeling and Specialization;216
9.2.4.1;Concept of Operations;216
9.2.4.2;Representing Process Models, Questions, and Specializations;217
9.2.5;Implementing Process Modeling and Specialization;220
9.2.5.1;Implement the Business Process Metamodel;220
9.2.5.2;The Question Model;221
9.2.5.3;Handling Specialization;222
9.2.6;Discussion;222
9.2.7;References;223
9.3;Typing for Conflict Detection in Access Control Policies;224
9.3.1;Introduction;224
9.3.2;Access Control Policies With Contexts;225
9.3.2.1;Expressing High Level Access Control Rules;226
9.3.2.2;Expressing Low Level Access Control Rules;229
9.3.2.3;Expressing Contexts;230
9.3.2.4;User Group, Activity Group and View Group Hierarchies;232
9.3.3;Conflict Verification by Typing;232
9.3.3.1;Dynamic Groups;233
9.3.3.2;Typing System;233
9.3.3.3;Examples;233
9.3.3.4;Typing Judgements and Typing Rules;234
9.3.4;Example;235
9.3.5;Conclusion;236
9.3.6;References;237
10;Short Research Contributions;239
10.1;Dynamic Pricing in Electronic Commerce Using Neural Network;239
10.1.1;Introduction;239
10.1.2;Feed-Forward Neural Network;240
10.1.3;Dynamic Pricing Using Neural Network;240
10.1.4;Results and Analysis;242
10.1.5;Related Works;243
10.1.6;Conclusion and Future Work;244
10.1.7;References;244
10.2;TwoStep: An Authentication Method Combining Text and Graphical Passwords;245
10.2.1;Introduction;245
10.2.2;Two-Step Authentication Method;246
10.2.3;Preliminary Security Analysis;248
10.2.4;Related Work;249
10.2.5;Concluding Remarks;250
10.2.6;References;250
10.3;Design Principles for E-Government Architectures;252
10.3.1;Introduction;252
10.3.2;Principles for Architecting an EGP;253
10.3.3;Design of the EGP;255
10.3.4;Conclusion;256
10.3.5;References;257
10.4;A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment;258
10.4.1;Introduction;258
10.4.2;Policy-Based Networking;259
10.4.3;Agents in Policy-Based Environments;259
10.4.4;Policy-Based Interfaces;260
10.4.4.1;User Profiles;260
10.4.4.2;Local Interface Policy;260
10.4.4.3;Interface Profile;261
10.4.4.4;Central Interface Policy;261
10.4.4.5;Learning;262
10.4.5;Future Work;262
10.4.6;References;263
11;Security and Trust;264
11.1;Verification of Information Flow in Agent-Based Systems;264
11.1.1;Introduction and Motivation;264
11.1.2;Background;266
11.1.2.1;Information Algebra;266
11.1.2.2;Global Calculus;267
11.1.2.3;Hoare Logic;267
11.1.3;Illustrative Example;268
11.1.4;The Proposed Technique;269
11.1.4.1;Knowledge Representation;269
11.1.4.2;Specification of Communications Among Agents;272
11.1.4.3;Analysis;273
11.1.5;Discussion and Related Work;276
11.1.5.1;Bell-LaPadula Model;276
11.1.5.2;The Chinese Wall Model;276
11.1.5.3;Verification Techniques;276
11.1.6;Conclusion;277
11.1.7;References;278
11.2;A Legal Perspective on Business: Modeling the Impact of Law;279
11.2.1;Introduction;279
11.2.2;Related Work;280
11.2.3;Legal Modeling;281
11.2.4;HIPAA Case Study;282
11.2.4.1;Model of the Law;282
11.2.4.2;GRL Model of Law: Pros and Cons;285
11.2.5;Impact Analysis;286
11.2.5.1;Model of the Organization;286
11.2.5.2;The Organization Model Against the Law Model: A Business Analysis;287
11.2.6;Conclusions;289
11.2.7;References;289
11.3;A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations;291
11.3.1;Introduction;291
11.3.2;Background;292
11.3.3;Palliative Care Scenario;294
11.3.4;Framework;298
11.3.5;Conclusions;299
11.3.6;References;300
12;Service-Oriented Architecture;302
12.1;An Aspect-Oriented Framework for Business Process Improvement;302
12.1.1;Introduction;302
12.1.2;Background and Related Work;304
12.1.2.1;BPM with URN;304
12.1.2.2;Aspect-Oriented Modeling With the User Requirements Notation;308
12.1.3;Framework;309
12.1.4;Case Study;310
12.1.5;Conclusion and Future Work;315
12.1.6;References;315
12.2;Integration Testing of Web Applications and Databases Using TTCN-3;318
12.2.1;Introduction;318
12.2.2;Book Store Web Application Example;319
12.2.3;Database Integration Testing;320
12.2.3.1;Data Typing;321
12.2.3.2;Specifying Test Oracles Using TTCN-3 Templates;321
12.2.3.3;Performing a Test;322
12.2.3.4;Separation of Concerns Between Abstract and Concrete Layer;322
12.2.4;Integration Testing of Web and Database Applications;324
12.2.4.1;Consistency Check Between Web Data Entries and Database State;324
12.2.4.2;Consistency Check Between Database State and Web Queries;326
12.2.5;Conclusions and Future Work;329
12.2.6;References;330
12.3;A Reference Model for Semantic Peer-to-Peer Networks;331
12.3.1;Introduction;331
12.3.2;Related Work;332
12.3.3;Differences Between P2P and SP2P Systems;333
12.3.4;SP2P Reference Architecture;333
12.3.4.1;Peers;334
12.3.4.2;Resources;335
12.3.4.3;Query Formulator;336
12.3.4.4;Semantic Neighborhood;336
12.3.4.5;Mappings;337
12.3.4.6;Router;339
12.3.4.7;Query Answerer;341
12.3.5;Conclusion and Future Work;344
12.3.6;References;344
13;Author Index;347



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.