E-Technologies: Innovation in an Open World (eBook)
XIII, 348 Seiten
Springer-Verlag
978-3-642-01187-0 (ISBN)
This volume constitutes the proceedings of the 4th International Conference on E-Technologies, MCETECH 2009, held in Ottawa, Canada, during May 4-6, 2009. The 23 full and 4 short papers included in this volume were carefully reviewed and selected from a total of 42 submissions. They cover topics such as inter-organzational processes, service-oriented architectures, security and trust, middleware infrastructures, open source and open environments, and applications including eGovernment, eEducation, and eHealth.
Title Page 2
Preface 5
Organization 7
Table of Contents 10
Internet-Based Collaborative Work/E-Education 13
Helping E-Commerce Consumers Make Good Purchase Decisions: A User Reviews-Based Approach 13
Introduction 13
Related Work 14
Proposed Approach 15
Review Helpfulness 15
Entropy and Information Gain 16
Prediction Computation 17
Experimental Evaluation 18
Measures 18
Data Set 19
Results and Analysis 19
Discussion 21
Conclusion and Future Work 22
References 22
Using Instant Messaging Systems as a Platform for Electronic Voting 24
Introduction 24
Description of Decision Scenarios 25
Scenario: No Discussion, Secret Election 25
Scenario: No Discussion and Election by Name 26
Scenario: Discussion and Election by Name 26
Scenario: Discussion by Name and Secret Voting 26
Instant Messaging as a Platform for E-Voting 27
Software Architecture of the Extended IM System 27
Overview of the Voting Procedure 28
Attacks and Countermeasures 31
E-Voting 32
Creation and Encryption of votes 33
Mixing of Votes 33
Signing of Votes 34
Counting of Votes 34
Suitability of the Mix-Method Protocol for Our Scenarios 34
Conclusions 35
Reference 35
A Multi-criteria Collaborative Filtering Approach for Research Paper Recommendation in Papyres 37
Introduction 37
Locating Research Literature 39
Background 39
Papyres 39
Paper Recommender Systems 41
Multi-criteria Hybrid Recommender System 42
Content Based 42
Multi-criteria Collaborative Filtering 43
Testing and Result 46
Results and Findings 47
Conclusions and Future Work 49
References 50
Industrial Experience 52
An Ontological Approach to Connecting SOA Implementations 52
Introduction 52
Premise 52
Purpose 52
Scope 52
Constraints 52
The Problem of SOA Discontinuity 52
The Theory 52
The Problem 54
Linking Communities - The Layered Ontological Overlay 56
General 56
The Methodology 57
Issues 60
Overview 60
Run-Time Translation 60
Conflicts 61
Inconsistencies 61
Technical Interoperability 61
Semantic Interoperability 61
Implications 62
Final Considerations 63
Conclusion 64
A Non-technical User-Oriented Display Notation for XACML Conditions 65
Motivation 65
Principles in Current XML Editors 66
Principles in Current XACML Editors 68
Our Proposed Notation 70
Our Notation in the Context of an Editor 73
Our Notation Beyond XACML 75
Conclusion 75
References 76
Goal-Driven Development of a Patient Surveillance Application for Improving Patient Safety 77
Introduction 77
Background 78
Adverse Events in Health Care 78
Business Process Modeling with the User Requirement Notation 79
Highlights of the Development Approach 80
Patient Surveillance Application 81
Defining the Goals and Evaluating Strategies 81
Modeling the Process Satisfying the Goals 83
Software Architecture and Implementation 85
Obstacles and Mitigations 85
Conclusion and Future Work 87
References 88
Global Location-Based Access to Web Applications Using Atom-Based Automatic Update 89
Introduction 90
The System Architecture of the VUA 90
Location-Based Call Routing 92
Implementation and Use of the Mobile Web Widget 93
Widget Component Structure 95
Info.plist-Property of a Widget 95
Icon.png 96
Atom 96
AtomPub Protocol (APP) 98
Results 98
Evaluation of the Atom Feed 98
Evaluation of the VOIP Providers With Asterisk 98
Conclusion 100
References 100
Inter-Organizational Processes I 101
Toward a Framework for Dynamic Service Binding in E-Procurement 101
Introduction 101
Related Standards and Technologies 102
Dynamic Service Binding in E-Procurement 104
E-Procurement Scenarios 104
The Proposed Architecture 105
The Policy-Based Message Broker 107
Discussions of Results 108
References 109
Integrating Identity Management With Federated Healthcare Data Models 112
Introduction 112
Healthcare Scenario 113
Existing Approaches for Integrating Identity Management Into Federated Data Models 114
Technical Issues for Identity Management in a Federated Data Model 114
Three-Phase Consolidation Process Model 115
Circle of Trust Model 117
DB2 Anonymous Resolution Model 118
Summary of Approaches 119
Systematic Framework for Integrating Identity Management into Federated Healthcare Data Models 119
Framework Overview 120
Preparation of Data for Sharing 120
Consolidation in Federated Data Model 121
Evaluation of Consolidated Dataset 121
Conclusions 122
References 123
Wrestling With a Paradox: Complexity in Interoperability Standards Making for Healthcare Information Systems 125
Introduction 125
Electronic Medical Record (EMR) System Adoption by Physicians 126
Healthcare System Interoperability 128
Standards Making in Healthcare 128
Technical Complexity as a Barrier to Standards Making 129
Social Complexity as a Barrier to Standards Making 130
Perceived Value of Information: Uncertainty vs. Equivocality as Factors 132
Recommendations 133
Conclusions 134
References 135
Open Source and Open Environments 138
Aligning Goal and Value Models for Information System Design 138
Introduction 138
Related Works 139
Goal Modeling 140
Case Study: Eye-Care Health Service 140
The KAOS Goal Modeling Language 140
The KAOS Requirements Engineering Process 142
Business Modeling 142
Methodology for Model Transformation 144
Goal Formulation 144
System Requirements Templates 145
Transforming KAOS to the $e^{3} value$ Ontology 145
Method Application to Create a Goal-Based Business Model 147
Conclusion 150
References 151
Model-Based Penetration Test Framework for Web Applications Using TTCN-3 153
Introduction 153
Background and Related Work 154
Model-Based Penetration Testing for Web Applications 156
Analysis of the Top Ten Web Application Vulnerabilities 2007 157
Analysis of the Commonly Used Fuzz Vectors 158
Data Model for Test Case Development 158
Algorithm for Test Case Generator 159
Penetration Test Framework Based on TTCN-3 160
Test Scenario 161
TTCN-3 Implementation Considerations 162
Analysis of Results 164
Conclusions and Future Work 165
References 165
Impact of Diversity on Open Source Software 167
Introduction 167
Diversity 167
Diversity and Organizations 168
Diversity and OSS Projects 170
Hypothesis Development 170
Research Question and Research Model 170
Hypotheses 171
Research Method 172
Unit of Analysis: Project Driven by the Eclipse Foundation 172
Study Period 172
Sample 173
Research Variables 174
Research Results 176
Summary of Key Findings 177
Conclusions 178
References 178
Web Search Based onWeb Communities Feedback Data 181
Introduction 181
Web Page Ranking Strategies 181
Opinion Data andWeb Search 182
Integrating Opinion Data inWeb Search 183
Typical Usage Scenario 183
Opinion Data Description Language 184
FeedbackWarehouses 188
Measuring the Relevance of an Instance of Opinion and Querying a Set of Warehouses of Opinions 190
Evaluation 191
Prototype 191
Experimentation Protocol 192
Results Analysis 193
Concluding Remarks and Perspectives 194
References 194
Inter-Organizational Processes II 196
Improving Trust and Reputation Modeling in E-Commerce Using Agent Lifetime and Transaction Count 196
Introduction 196
Related Work 198
Proposed Approach 199
Agent Lifetime 199
Transaction Count 199
Seniority 200
Building an Initial Advisor List 200
Weighting Advice 200
Experimental Results 201
Description 201
Base Case Model 203
Test Case Model 203
Results 204
Discussion 206
Conclusions and Future Work 206
References 207
Towards a Methodology for Representing and Classifying Business Processes 208
Introduction 208
Process Modeling 210
An Approach to Business Process Classification 211
Principles 211
Classification Using Metamodel Hotspots 213
Designing a Tool for Process Modeling and Specialization 216
Concept of Operations 216
Representing Process Models, Questions, and Specializations 217
Implementing Process Modeling and Specialization 220
Implement the Business Process Metamodel 220
The Question Model 221
Handling Specialization 222
Discussion 222
References 223
Typing for Conflict Detection in Access Control Policies 224
Introduction 224
Access Control Policies With Contexts 225
Expressing High Level Access Control Rules 226
Expressing Low Level Access Control Rules 229
Expressing Contexts 230
User Group, Activity Group and View Group Hierarchies 232
Conflict Verification by Typing 232
Dynamic Groups 233
Typing System 233
Examples 233
Typing Judgements and Typing Rules 234
Example 235
Conclusion 236
References 237
Short Research Contributions 239
Dynamic Pricing in Electronic Commerce Using Neural Network 239
Introduction 239
Feed-Forward Neural Network 240
Dynamic Pricing Using Neural Network 240
Results and Analysis 242
Related Works 243
Conclusion and Future Work 244
References 244
TwoStep: An Authentication Method Combining Text and Graphical Passwords 245
Introduction 245
Two-Step Authentication Method 246
Preliminary Security Analysis 248
Related Work 249
Concluding Remarks 250
References 250
Design Principles for E-Government Architectures 252
Introduction 252
Principles for Architecting an EGP 253
Design of the EGP 255
Conclusion 256
References 257
A Proposed Intelligent Policy-Based Interface for a Mobile eHealth Environment 258
Introduction 258
Policy-Based Networking 259
Agents in Policy-Based Environments 259
Policy-Based Interfaces 260
User Profiles 260
Local Interface Policy 260
Interface Profile 261
Central Interface Policy 261
Learning 262
Future Work 262
References 263
Security and Trust 264
Verification of Information Flow in Agent-Based Systems 264
Introduction and Motivation 264
Background 266
Information Algebra 266
Global Calculus 267
Hoare Logic 267
Illustrative Example 268
The Proposed Technique 269
Knowledge Representation 269
Specification of Communications Among Agents 272
Analysis 273
Discussion and Related Work 276
Bell-LaPadula Model 276
The Chinese Wall Model 276
Verification Techniques 276
Conclusion 277
References 278
A Legal Perspective on Business: Modeling the Impact of Law 279
Introduction 279
Related Work 280
Legal Modeling 281
HIPAA Case Study 282
Model of the Law 282
GRL Model of Law: Pros and Cons 285
Impact Analysis 286
Model of the Organization 286
The Organization Model Against the Law Model: A Business Analysis 287
Conclusions 289
References 289
A Requirement Engineering Framework for Electronic Data Sharing of Health Care Data Between Organizations 291
Introduction 291
Background 292
Palliative Care Scenario 294
Framework 298
Conclusions 299
References 300
Service-Oriented Architecture 302
An Aspect-Oriented Framework for Business Process Improvement 302
Introduction 302
Background and Related Work 304
BPM with URN 304
Aspect-Oriented Modeling With the User Requirements Notation 308
Framework 309
Case Study 310
Conclusion and Future Work 315
References 315
Integration Testing of Web Applications and Databases Using TTCN-3 318
Introduction 318
Book Store Web Application Example 319
Database Integration Testing 320
Data Typing 321
Specifying Test Oracles Using TTCN-3 Templates 321
Performing a Test 322
Separation of Concerns Between Abstract and Concrete Layer 322
Integration Testing of Web and Database Applications 324
Consistency Check Between Web Data Entries and Database State 324
Consistency Check Between Database State and Web Queries 326
Conclusions and Future Work 329
References 330
A Reference Model for Semantic Peer-to-Peer Networks 331
Introduction 331
Related Work 332
Differences Between P2P and SP2P Systems 333
SP2P Reference Architecture 333
Peers 334
Resources 335
Query Formulator 336
Semantic Neighborhood 336
Mappings 337
Router 339
Query Answerer 341
Conclusion and Future Work 344
References 344
Author Index 347
Erscheint lt. Verlag | 1.1.2009 |
---|---|
Sprache | englisch |
Themenwelt | Mathematik / Informatik ► Informatik ► Datenbanken |
Informatik ► Office Programme ► Outlook | |
Mathematik / Informatik ► Informatik ► Theorie / Studium | |
Mathematik / Informatik ► Informatik ► Web / Internet | |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Sozialwissenschaften ► Politik / Verwaltung ► Staat / Verwaltung | |
Wirtschaft ► Allgemeines / Lexika | |
Schlagworte | BPM • business process management • E-Business • E-Commerce • Middleware • Open Source • Service-Oriented Architecture • SOA • web applications |
ISBN-10 | 3-642-01187-X / 364201187X |
ISBN-13 | 978-3-642-01187-0 / 9783642011870 |
Haben Sie eine Frage zum Produkt? |
Größe: 17,0 MB
DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasserzeichen und ist damit für Sie personalisiert. Bei einer missbräuchlichen Weitergabe des eBooks an Dritte ist eine Rückverfolgung an die Quelle möglich.
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich