A Framework for the Encapsulation of Value-Added Services in Digital Objects
Container technology enables the encapsulation of information content together with rules and controls specifying the types of content usage permitted and the consequences of usage, such as triggering of report generation and payment. Containers have been proposed as a mechanism for securing intellectual property rights. This paper outlines other possible applications of container technology, including support for compound documents that incorporate active content, and automation of processes involving multi-party peer-to-peer interactions for the purposes of collaboration and commerce. Such value-added services are of particular interest in the context of digital libraries aiming to provide functionality extending beyond that of a simple repository of electronic documents. This paper presents the design of a container framework in the context of an architecture for network-centric applications.
Unable to display preview. Download preview PDF.
- 1.J. Bosak. “XML, Java, and the Future of the Web”. World Wide Web Journal, 2(4), 1997.Google Scholar
- 2.T. Bray, J. Paoli, and C. M. Sperberg-McQueen. “Extensible Markup Language Recommendation (XML) 1.0”, 1998. Available via WWW at URL http://www.w3.org/TR/1998/REC-xml.
- 3.“Trading Object Service Specification”. In CORBAservices: Common Object Services Specification. Object Management Group, Framingham, Mass., 1996.Google Scholar
- 4.InterTrust Technologies Corp. “Securing the Content, Not the Wire, for Information Commerce”, 1996. Available via WWW at URL http://www.intertrust.com.
- 5.A. Dan and F. Parr. “An Object Implementation of Network Centric Business Service Applications (NCBSAs): Conversational Service Transactions, Service Monitor and an Application Style”. In Proc. OOPSLA’97 Business Object Workshop, 1997. Available via URL http://www.tiac.net/users/jsuth/oopsla97/.
- 6.R. Daniel and C. Lagoze. “Distributed Active Relationships in the Warwick Framework”. In Proc. IEEE Metadata Conference, 1997.Google Scholar
- 7.U. Dayal, M. Hsu, and R. Ladin. “Organizing Long-Running Activities with Triggers and Transactions”. In Proceedings of the ACM SIGMOD Conference on Management of Data, 1993.Google Scholar
- 8.H.M. Gladney and J.B. Lotspiech. “Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality”. D-Lib Magazine, May 1997. Available via http://www.dlib.org
- 9.JavaSoft. “JavaBeans API Specification (1.01) ”, 1997. Available via URL http://java.sun.com:80/beans/docs/spec.html.
- 10.R. Khare and A. Rifkin. “Capturing the State of Distributed Systems with XML”. World Wide Web Journal, 2(4), 1997.Google Scholar
- 11.R. Khare and A. Rifkin. “XML: A Door to Automated Web Applications”. IEEE Internet Computing, 1(4), 1997.Google Scholar
- 12.C. Lagoze, C.A. Lynch, and R. Daniel. “The Warwick Framework: A Container Architecture for Aggregating Sets of Metadata”. Technical Report TR96-1593, Cornell Computer Science Department, 1996. Available via URL http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell/TR96-1593.
- 13.C. Lagoze and S. Payette. “An Infrastructure for Open-Architecture Digital Libraries”. Technical Report TR98-1690, Cornell Computer Science Department, 1998. Available via http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR98-1690.
- 14.M. Marazakis, D. Papadakis, and C. Nikolaou. “The Aurora Architecture for Developing Network-Centric Applications by Dynamic Composition of Services”. Technical Report TR 213, FORTH/ICS, 1997.Google Scholar
- 15.C. Mohan. “Recent Trends in Workflow Management Products, Standards and Research”. In Proc. NATO Advanced Institute (ASI) Workshop on Work-flow Management Systems and Interoperability, 1997. Available via URL http://www.almaden.ibm.com/cs/exotica.
- 16.O. Nierstrasz, D. Tsichritzis, V. deMey, and M. Stadelmann. “Object + Scripts = Applications”. In D. Tsichritzis, editor, Object Composition. University of Geneva, 1991.Google Scholar
- 17.C. Nikolaou, M. Marazakis, D. Papadakis, Y. Yeorgiannakis, and J. Sairamesh. “Towards a Common Infrastructure to Support Large-Scale Distributed Applications”. In Proc. European Conference on Research and Advanced Technology for Digital Libraries, 1997.Google Scholar
- 18.J. Noonan. “Automated Service Level Management and its Supporting Technologies”. Mainframe Journal, October 1989.Google Scholar
- 19.B. Oki, M. Pfluegl, A. Siegel, and D. Skeen. “The Information Bus-An Architecture for Extensible Distributed Systems”. In Proc. ACM Symposium on Operating System Pronciples, 1993.Google Scholar
- 20.A. Paepcke. “Digital Libraries: Searching is not Enough”. D-Lib Magazine, May 1996. Available via http://www.dlib.org.
- 21.T.A. Phelps and R. Wilensky. “Toward Active, Extensible, Networked Documents: Multivalent Architecture and Applications”. In Proc. ACM Int’l Conf. on Digital Libraries, 1996.Google Scholar
- 22.M. Roscheisen and T. Winograd. “The FIRM Framework for Interoperable Rights Management: Defining a Rights Management Service Layer for the Internet”. In Forum on Technology-based Intellectual Property Management, 1997. Available via http://pcd.stanford.edu/rmr/commpacts.html.
- 23.M. Roscheisen and Terry Winograd. “A Network-Centric Design for Relationship-based Security and Access Control”. Journal of Computer Security, 1997. Special Issue on Security in the World-Wide Web.Google Scholar
- 24.A. Sheth. “From Contemporary Workflow Process Automation to Adaptive and Dynamic Work Activity Coordination and Collaboration”. In Proc. Workshop on Workflow Management in Scientific and Engineering Applications, 1997.Google Scholar
- 25.O. Sibert, D. Bernstein, and D. Van Wie. “The DigiBox: A Self-Protecting Container for Information Commerce”. In Proc. 1st USENIX workshop on Electronic Commerce, 1995.Google Scholar
- 26.M.P. Singh and M.A. Vouk. “ScientificWorkflows: ScientificWorkflow Meets Transactional Workflow”. In Proc. NSF Workshop on Workflow and Process Automation in Information Systems: State of the Art and Future Directions, 1996.Google Scholar
- 27.M. Stefik and J. Lavendel. “Libraries and Digital Property Rights”. In Proc. European Conference on Advanced Technologies for Digital Libraries, 1997.Google Scholar
- 28.N. Szabo. “Formalizing and Securing Relationships on Public Networks”. First Monday, 2(9), 1997. Available via http://www.firstmonday.dk/.
- 29.J. Wainer, M. Weske, G. Vossen, and C.B. Medeiros. “Scientific Workflow Systems”. In Proc. NSF Workshop on Workflow and Process Automation in Information Systems: State of the Art and Future Directions, 1996.Google Scholar
- 30.L. Wood, J. Sorensen, S. Byrne, R.S. Sutor, V. Apparao, S. Isaacs, G. Nicol, and M. Champion. “Document Object Model Specification (DOM) 1.0”, 1998. W3C Working Draft. Available via WWW at URL http://www.w3.org/TR/WD-DOM.