Enabling the Construction Virtual Enterprise: The OSMOS Approach.

Wilson, I., Harvey, S., Vankeisbelck, R. & Kazi, A.S., (2001). Enabling the Construction Virtual Enterprise: The OSMOS Approach. Electronic Journal of Information Technology in Construction. Special Issue on Information and Communication Technology Advances in the European Construction Industry. Volume 6 (2001), pp .85-110. ISSN 1400-6529.

Abstract

This paper gives a comprehensive overview of the findings and results from the OSMOS (IST-1999-10491) project. OSMOS aims to highlight and go some way to meeting the needs of the industry by providing a set of tools, models, APIs Read more

Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure

Chadwick, D.W., Harvey, S., New, J. & Young, A.J. (2001). Initial Experiences of Accessing Patient Confidential Data over the Internet using a Public Key Infrastructure. In Jerman-Blazic, B., Schneider, W.S. & Klobucar, T. (eds)(2001), Advanced Security Technologies in Networking. pp201-209. Amsterdam: IOS Press. ISBN: 1 58603 156 2.

Abstract

A project to Read more

Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet

D. W. Chadwick, C. Carroll, S. Harvey, J. New, A. J. Young. (2002). Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICCS 2002). Ed. Ralph H. Sprague, Jr.

Abstract

A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the results of the first set of user trials. From a user acceptance perspective, we conclude that perceived usefulness and perceived ease of use on their own, are insufficient to guarantee that a new application will be used extensively in its new environment. Other domain specific factors, such as the compatibility and integration of the new computing system with the old, the working practices of the clinicians, the costs of using the new system compared to the old, and the actual location of the computing equipment all need to be taken into account when establishing untried information technology in ‘real world ’ settings.

Download Paper

A Comprehensive Description Of The Human, Process And Technical Requirements Of A Construction Virtual Enterprise: The OSMOS Project

Harvey, S.C., Wilson, I.E., Rezgui, Y. & Cooper, G.S. (2001). A Comprehensive Description Of The Human, Process And Technical Requirements Of A Construction Virtual Enterprise: The OSMOS Project. In Proceedings of the 1st International Conference on INNOVATION IN ARCHITECTURE, ENGINEERING AND CONSTRUCTION (AEC). 18-20th July, 2001, Loughborough University, UK.

Services for Inter-enterprise Information Management in Dynamic Virtual Enterprises

Harvey, S.C., Rezgui, Y., Zarli, A. & Kazi, A.S. (2001). Services for Inter-enterprise Information Management in Dynamic Virtual Enterprises. 2nd Worldwide ECCE Symposium: Information and Communication Technology in the Practice of Building and Civil Engineering. June 6-8, 2001, Espoo, Finland.

Abstract

State of the art research in Construction IT reveals that integration has been achieved, mostly, on static models that define the structure of shared information in the form of files or databases. This paper advocates that integration should be made through frameworks that define the semantic relationships between the interfaces of separate distributed components (and the way to make those relationships evolve in the course of a project/process). Based on a requirements analysis of industrial partners, the OSMOS specification was made in the form of a set of information models and a set of required services packaged in the form of an OSMOS API. This paper focused on: e- mail based communication service, document cross-referencing/information management service, virtual enterprise manager, and information browser.

Download Paper

Engineering the information streaming within the Construction Virtual Enterprise: the OSMOS project

Marache, M., Zarli, A., Harvey, S. C., Rezgui, Y. & Kazi, A.S., (2001). Engineering the information streaming within the Construction Virtual Enterprise: the OSMOS project. In: Proceedings of the 8th Annual European Concurrent Engineering Conference (ECEC’2001). April 18-20, 2001, Valencia, Spain.

Abstract

The current evolution of business processes over digital networks today Read more

OSMOS Base Technology Selection

Harvey, S., Zarli, A., Rezgui, Y., Cooper, G.S. & Kazi, A.S. (2001). OSMOS Base Technology Selection. OSMOS Project Deliverable (D2.1). Europe: OSMOS Project Consortium. Available on the World Wide Web: (URL: http://cic.vtt.fi/projects/osmos/d21.pdf)

Summary

This document details the results from a period of investigation into the underlying technologies that could be used to provide the infrastructure on which the OSMOS Solution will be specified and built. It complements, and should be read in conjunction with, especially, D2.2 (OSMOS Architecture Definition and Specification).

This deliverable, which is aimed at the level of a reader who has some expertise in Information Technology architectures, will introduce the underlying technologies on which the OSMOS Solution could be built upon. It will introduce the reader to networks and the Internet, introduce two and three tier architectures, introduce and analyse the various middleware technologies (such as RPC, Message-Oriented Middleware, Transactional Middleware and the more recent Object Based Middleware such as CORBA, (D)COM(+) and Java), highlight some of the security issues that need to be considered, introduce some technologies used for exchanging data and finally highlight some technologies that can be used to support teamworking in the industry.

This is the second revision of D2.1 – Final Release for Iteration 2. A new release will be produced for iteration 3.

Download Paper (Local Mirror)

Initial Experience of Accessing Patient Confidential Data over the Internet using a PKI

Chadwick, D., Harvey, S., New, J. & Young, A.J. (2000). Initial Experience of Accessing Patient Confidential Data over the Internet using a PKI. Proceedings of the Information Security Solutions Europe (ISSE 2000) Conference, Barcelona. 27-29 September 2000.

Abstract

A project to enable health care professionals (GPs, practice nurses and diabetes nurse specialists) to access, via the Internet, confidential patient data held on a secondary care (hospital) diabetes information system, has been implemented. We describe the application that we chose to distribute (a diabetes register); the security mechanisms we used to protect the data (a public key infrastructure with strong encryption and digitally signed messages, plus a firewall); the reasons for the implementation decisions we made; the validation testing that we performed and the preliminary results of the pilot implementation.

Download Paper

Guidelines, Methodologies and Standards to set up a CA for Digital Signatures

Harvey, S. contributed to The GUIDES Consortium (2000). Guidelines, Methodologies and Standards to set up a CA for Digital Signatures. Version 1.0 (Draft). Available on the World Wide Web: (URL: http://www.regione.emilia-romagna.it/guides/)

Summary

These Guidelines are being developed in the framework of the project GUIDeS1. GUIDeS overall goals are:

  1. to improve emerging practices in the setting up of certification services,
    particularly within the public sector, by providing Guidelines to set up a CA for digital signatures, based on state-of-the-art technical and legal standards and requirements, and on the direct experience of the project partners in this field;
  2. to validate and demonstrate the Guidelines within the broader EU context;
  3. to disseminate improved practices, thus stimulating a wider diffusion of CA
    services;
  4. to provide feedback to the institutions which are defining, both at national and at
    European level, the requirements and standards for the provision of digital
    certification services.

This document provides a set of Guidelines for establishing a public key infrastructure (PKI). The guidelines follow a procurement model that involves issuing a Request for Information (RFI) to vendors followed by a Request for Proposal (RFP). The guidelines focus on the technical contents of these documents rather than the business and legal aspects of tendering. An organisation using these guidelines may decide that it is best to outsource the service to a trusted third party, or may decide to purchase hardware and software and establish its own certification service. Guidelines for both procurement models are provided, as well as a set of decision criteria that will be helpful in deciding whether to in- or out-source. The Guidelines cover the process up to the issuance of the first public key certificate, and do not provide guidance on the day-to-day operations and ongoing support of the certification service.

Download (Local Mirror)