A Framework for the Encapsulation of Value-Added Services in Digital Objects

  • Manolis Marazakis
  • Dimitris Papadakis
  • Stavros A. Papadakis
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1513)

Abstract

Container technology enables the encapsulation of information content together with rules and controls specifying the types of content usage permitted and the consequences of usage, such as triggering of report generation and payment. Containers have been proposed as a mechanism for securing intellectual property rights. This paper outlines other possible applications of container technology, including support for compound documents that incorporate active content, and automation of processes involving multi-party peer-to-peer interactions for the purposes of collaboration and commerce. Such value-added services are of particular interest in the context of digital libraries aiming to provide functionality extending beyond that of a simple repository of electronic documents. This paper presents the design of a container framework in the context of an architecture for network-centric applications.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    J. Bosak. “XML, Java, and the Future of the Web”. World Wide Web Journal, 2(4), 1997.Google Scholar
  2. 2.
    T. Bray, J. Paoli, and C. M. Sperberg-McQueen. “Extensible Markup Language Recommendation (XML) 1.0”, 1998. Available via WWW at URL http://www.w3.org/TR/1998/REC-xml.
  3. 3.
    “Trading Object Service Specification”. In CORBAservices: Common Object Services Specification. Object Management Group, Framingham, Mass., 1996.Google Scholar
  4. 4.
    InterTrust Technologies Corp. “Securing the Content, Not the Wire, for Information Commerce”, 1996. Available via WWW at URL http://www.intertrust.com.
  5. 5.
    A. Dan and F. Parr. “An Object Implementation of Network Centric Business Service Applications (NCBSAs): Conversational Service Transactions, Service Monitor and an Application Style”. In Proc. OOPSLA’97 Business Object Workshop, 1997. Available via URL http://www.tiac.net/users/jsuth/oopsla97/.
  6. 6.
    R. Daniel and C. Lagoze. “Distributed Active Relationships in the Warwick Framework”. In Proc. IEEE Metadata Conference, 1997.Google Scholar
  7. 7.
    U. Dayal, M. Hsu, and R. Ladin. “Organizing Long-Running Activities with Triggers and Transactions”. In Proceedings of the ACM SIGMOD Conference on Management of Data, 1993.Google Scholar
  8. 8.
    H.M. Gladney and J.B. Lotspiech. “Safeguarding Digital Library Contents and Users: Assuring Convenient Security and Data Quality”. D-Lib Magazine, May 1997. Available via http://www.dlib.org
  9. 9.
    JavaSoft. “JavaBeans API Specification (1.01) ”, 1997. Available via URL http://java.sun.com:80/beans/docs/spec.html.
  10. 10.
    R. Khare and A. Rifkin. “Capturing the State of Distributed Systems with XML”. World Wide Web Journal, 2(4), 1997.Google Scholar
  11. 11.
    R. Khare and A. Rifkin. “XML: A Door to Automated Web Applications”. IEEE Internet Computing, 1(4), 1997.Google Scholar
  12. 12.
    C. Lagoze, C.A. Lynch, and R. Daniel. “The Warwick Framework: A Container Architecture for Aggregating Sets of Metadata”. Technical Report TR96-1593, Cornell Computer Science Department, 1996. Available via URL http://cs-tr.cs.cornell.edu:80/Dienst/UI/2.0/Describe/ncstrl.cornell/TR96-1593.
  13. 13.
    C. Lagoze and S. Payette. “An Infrastructure for Open-Architecture Digital Libraries”. Technical Report TR98-1690, Cornell Computer Science Department, 1998. Available via http://cs-tr.cs.cornell.edu:80/Dienst/UI/1.0/Display/ncstrl.cornell/TR98-1690.
  14. 14.
    M. Marazakis, D. Papadakis, and C. Nikolaou. “The Aurora Architecture for Developing Network-Centric Applications by Dynamic Composition of Services”. Technical Report TR 213, FORTH/ICS, 1997.Google Scholar
  15. 15.
    C. Mohan. “Recent Trends in Workflow Management Products, Standards and Research”. In Proc. NATO Advanced Institute (ASI) Workshop on Work-flow Management Systems and Interoperability, 1997. Available via URL http://www.almaden.ibm.com/cs/exotica.
  16. 16.
    O. Nierstrasz, D. Tsichritzis, V. deMey, and M. Stadelmann. “Object + Scripts = Applications”. In D. Tsichritzis, editor, Object Composition. University of Geneva, 1991.Google Scholar
  17. 17.
    C. Nikolaou, M. Marazakis, D. Papadakis, Y. Yeorgiannakis, and J. Sairamesh. “Towards a Common Infrastructure to Support Large-Scale Distributed Applications”. In Proc. European Conference on Research and Advanced Technology for Digital Libraries, 1997.Google Scholar
  18. 18.
    J. Noonan. “Automated Service Level Management and its Supporting Technologies”. Mainframe Journal, October 1989.Google Scholar
  19. 19.
    B. Oki, M. Pfluegl, A. Siegel, and D. Skeen. “The Information Bus-An Architecture for Extensible Distributed Systems”. In Proc. ACM Symposium on Operating System Pronciples, 1993.Google Scholar
  20. 20.
    A. Paepcke. “Digital Libraries: Searching is not Enough”. D-Lib Magazine, May 1996. Available via http://www.dlib.org.
  21. 21.
    T.A. Phelps and R. Wilensky. “Toward Active, Extensible, Networked Documents: Multivalent Architecture and Applications”. In Proc. ACM Int’l Conf. on Digital Libraries, 1996.Google Scholar
  22. 22.
    M. Roscheisen and T. Winograd. “The FIRM Framework for Interoperable Rights Management: Defining a Rights Management Service Layer for the Internet”. In Forum on Technology-based Intellectual Property Management, 1997. Available via http://pcd.stanford.edu/rmr/commpacts.html.
  23. 23.
    M. Roscheisen and Terry Winograd. “A Network-Centric Design for Relationship-based Security and Access Control”. Journal of Computer Security, 1997. Special Issue on Security in the World-Wide Web.Google Scholar
  24. 24.
    A. Sheth. “From Contemporary Workflow Process Automation to Adaptive and Dynamic Work Activity Coordination and Collaboration”. In Proc. Workshop on Workflow Management in Scientific and Engineering Applications, 1997.Google Scholar
  25. 25.
    O. Sibert, D. Bernstein, and D. Van Wie. “The DigiBox: A Self-Protecting Container for Information Commerce”. In Proc. 1st USENIX workshop on Electronic Commerce, 1995.Google Scholar
  26. 26.
    M.P. Singh and M.A. Vouk. “ScientificWorkflows: ScientificWorkflow Meets Transactional Workflow”. In Proc. NSF Workshop on Workflow and Process Automation in Information Systems: State of the Art and Future Directions, 1996.Google Scholar
  27. 27.
    M. Stefik and J. Lavendel. “Libraries and Digital Property Rights”. In Proc. European Conference on Advanced Technologies for Digital Libraries, 1997.Google Scholar
  28. 28.
    N. Szabo. “Formalizing and Securing Relationships on Public Networks”. First Monday, 2(9), 1997. Available via http://www.firstmonday.dk/.
  29. 29.
    J. Wainer, M. Weske, G. Vossen, and C.B. Medeiros. “Scientific Workflow Systems”. In Proc. NSF Workshop on Workflow and Process Automation in Information Systems: State of the Art and Future Directions, 1996.Google Scholar
  30. 30.
    L. Wood, J. Sorensen, S. Byrne, R.S. Sutor, V. Apparao, S. Isaacs, G. Nicol, and M. Champion. “Document Object Model Specification (DOM) 1.0”, 1998. W3C Working Draft. Available via WWW at URL http://www.w3.org/TR/WD-DOM.

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • Manolis Marazakis
    • 1
    • 2
  • Dimitris Papadakis
    • 1
    • 2
  • Stavros A. Papadakis
    • 1
    • 2
  1. 1.Institute of Computer ScienceFORTHHeraklionGreece
  2. 2.Department of Computer ScienceUSAGreece

Personalised recommendations