The Community for Technology Leaders
2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (2002)
Pittsburgh, Pennsylvania, USA
June 10, 2002 to June 12, 2002
ISSN: 1080-1383
ISBN: 0-7695-1748-X
TABLE OF CONTENTS
Introduction
Plenary Talks

Vulnerability Analysis of Networked Systems (PDF)

Jeannette Wing , Carnegie Mellon University
pp. 4
Workshop: Evaluating Collaborative Enterprises

WETICE 2002 Evaluating Collaborative Enterprises Workshop Report (Abstract)

Elaine M. Raybourn , Sandia National Laboratories
Julian Newman , Glasgow Caledonian University
pp. 7

Evaluation Factors for Multi-Stakeholder Broadband Visual Communication Projects (Abstract)

Janice Singer , National Research Council Canada
Martin Brooks , National Research Council Canada
Bruno Emond , National Research Council Canada
Norm Vinson , National Research Council Canada
John Spence , Communications Research Center
Marion A. Barfurth , University of Ottawa
pp. 18

Evaluation of a Publish/Subscribe System for Collaborative and Mobile Working (Abstract)

Schahram Dustdar , Technical University of Vienna
Pascal Fenkam , Technical University of Vienna
Harald Gall , Technical University of Vienna
Gerald Reif , Technical University of Vienna
Engin Kirda , Technical University of Vienna
pp. 23

Characteristics of Group Development of Diagrams (Abstract)

Jeffrey D. Campbell , University of Maryland in Baltimore County
pp. 29
Workshop: Enterprise Security

Summary Report on Enterprise Security Workshop (Abstract)

David Gilliam , California Institute of Technology
pp. 43
Session 1: Anonymity

Analysis of an Anonymity Network for Web Browsing (Abstract)

Sandro Rafaeli , Lancaster University
Bernhard Plattner , Swiss Federal Institute of Technology
Marc Rennhard , Swiss Federal Institute of Technology
Laurent Mathy , Lancaster University
David Hutchison , Lancaster University
pp. 49

A Strong Proxy Signature Scheme with Proxy Signer Privacy Protection (PDF)

Victor K. Wei , Chinese University of Hong Kong
K. Shum , Chinese University of Hong Kong
pp. 55

Infinite Length Hash Chains and Their Applications (Abstract)

Kemal Bicakci , Middle East Technical University
Nazife Baykal , Middle East Technical University
pp. 57

Hydra: A Decentralised Group Key Management (Abstract)

Sandro Rafaeli , Lancaster University
David Hutchison , Lancaster University
pp. 62

A Mobile Agent Clone Detection System with Itinerary Privacy (Abstract)

Victor K. Wei , Chinese University of Hong Kong
T. C. Lam , Chinese University of Hong Kong
pp. 68
Session 2: Authentication and Access Control

What are Multi-Protocol Guessing Attacks and How to Prevent Them (Abstract)

Jim Alves-Foss , University of Idaho
Sreenivas Malladi , Satyam Computers Private Ltd.
Sreekanth Malladi , University of Idaho
pp. 77

Towards Scalable Authentication in Health Services (Abstract)

Gail-Joon Ahn , University of North Carolina at Charlotte
Dongwan Shin , University of North Carolina at Charlotte
pp. 83

Selecting a Security Architecture for a New Model of Distributed Tutorial Support (Abstract)

Xiaofeng Gong , Glasgow Caledonian University
Julian Newman , Glasgow Caledonian University
pp. 89

Towards an Access Control System for Mobile Peer-to-Peer Collaborative Environments (Abstract)

Harald Gall , Technical University of Vienna
Gerald Reif , Technical University of Vienna
Schahram Dustdar , Technical University of Vienna
Pascal Fenkam , Technical University of Vienna
Engin Kirda , Technical University of Vienna
pp. 95
Session 3: Intrusion Detection

Preemptive Distributed Intrusion Detection Using Mobile Agents (Abstract)

Victor K. Wei , Chinese University of Hong Kong
P. C. Chan , Chinese University of Hong Kong
pp. 103

Honeypots for Distributed Denial of Service Attacks (Abstract)

Nathalie Weiler , Swiss Federal Institute of Technology
pp. 109

Intrusion Detection: Systems and Models (Abstract)

Tommy G. Dearmond , California Institute of Technology
Joseph S. Sherif , California State University at Fullerton
pp. 115
Session 4: Secure Communication

Maintaining Remote Services and Resources Over the Internet and Other Networks (PDF)

Hsin-Ping Pat Chang , California Institute of Technology
Yih-Chiao Joseph Liu , California Institute of Technology
Thomas L. Wolfe , California Institute of Technology
pp. 137

On Communication Security in Wireless Ad-Hoc Sensor Networks (Abstract)

Vlasios Tsiatsis , University of California at Los Angeles
Scott Zimbeck , University of California at Los Angeles
Sasha Slijepcevic , University of California at Los Angeles
Miodrag Potkonjak , University of California at Los Angeles
Mani B. Srivastava , University of California at Los Angeles
pp. 139

ActiveSync,TCP/IP and 802.11b Wireless Vulnerabilities of WinCE-Based PDAs (Abstract)

Kyle Alexander , Purdue University
Seny Kamara , Purdue University
Scott Yost , Purdue University
Dan Noland , Purdue University
Jared Crane , Purdue University
Pascal Meunier , Purdue University
Sofie Nystrom , Purdue University
pp. 145
Session 5: Software and Network Vulnerability Analysis
Workshop: Web-Based Infrastructures and Coordination Architectures for Collaborative Applications

Collaboration Framework for Nomadic Healthcare Providers (PDF)

Sumitra Reddy , West Virginia University
Ravi Raman , West Virginia University
Ramana Reddy , West Virginia University
pp. 190
Author Index

Author Index (PDF)

pp. 193
87 ms
(Ver 3.1 (10032016))