Layered Conceptual Graphs And Their Risk Management

Size: px
Start display at page:

Download "Layered Conceptual Graphs And Their Risk Management"

Transcription

1 Expressive security policy rules using Layered Conceptual Graphs Madalina Croitoru, Liang Xiao, David Dupplaw, Paul Lewis University of Southampton Southampton, UK Abstract A method must be provided to support the analysis of security policy rules interdependencies in a (possibly distributed) environment. We propose a Conceptual Graphs based language that will allow us to represent the structure of information and to employ reasoning for consistency checking. We motivate our choice of language by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities. We explain our approach in the context of security requirements for medical systems. We evaluate our work theoretically, by means of an example of a real world policy rule. 1 Introduction In every organization there are business rules, that is compact statements that lay down what must or must not be the case in some aspect of a business [8]. According to the Object Management Group [9], rules are declarations of policy or conditions that must be satisfied. Rules capture requirements including the decisions, guidelines and controls which make up the functionality. As long as inconsistency and ambiguity are identified, either in rules or by rules, they are supposed to be useful for capturing and resolving conflicts, both at the requirements level and at the design level [7]. However, even for explicitly captured rules, (human readable and/or machine process-able form) their interdependencies are usually far from obvious. Usually the rules are set-up separately by stakeholders with different views on the system. This results in the existence of contradictory rules that may affect the behavior of the running system. Therefore, a method must be provided to support the detection of conflicting rules specified in its (possibly distributed) environment as well as the connection of the relevant ones for aggregation applications. To this end we propose a Conceptual Graphs [13] based language, Layered Conceptual Graphs [6] for representing the interdependencies amongst policy rules. The visual, logic based language will advance the state of the art by allowing the hierarchical depiction of information and consistency checking of policy rules interdependencies. Our choice of Layered Conceptual Graphs is 1

2 thus motivated by the gained expressivity, the potential for depicting policy associations rigourously and by associated reasoning capabilities. We explain our approach in the context of security requirements for medical systems. As an application scenario we use HealthAgents [1], an agentbased, distributed decision support system that employs clinical information, Magnetic Resonance Imaging (MRI) data, Magnetic Resonance Spectroscopy (MRS) data and genomic DNA profile information. The aim of this project is to help and improve brain tumour classification by providing alternative, non invasive techniques. To increase the number of cases HealthAgents is decentralizing its predecessor project, Interpret [14], by building a distributed decision support system (d-dss). Decentralizing such a system poses interesting challenges from a security point of view. These challenges are further explained in Section 2 along with the motivation for this work. Section 3 explains the security mechanisms for the HealthAgents prototype and how policy rules complement these security mechanisms. Finally, Section 4 presents our proposed language for expressing the policy rules. A real-life example is given and the advantages of this approach are evaluated theoretically by analyzing their expressive power. Section 5 concludes the paper and lays down future work directions. 2 Motivation and background Security is a growing concern in designing such systems that organizations can trust and use. Well-studied data encryption algorithms and publicly available libraries can alleviate some of the problems, yet more complex considerations are related with the management of the different levels of access rights to multiple types of resources by users distributed among and managed by multiple organizations. Some systems embed security policy modules within the application code. The tight coupling of software architecture with policies that spread all over the application, but which intend to change, makes such systems hard to maintain [15]. A recent access control model that supports efficient management is the widely accepted US National Institute of Standards and Technology model of role based access control (RBAC) [12]. In RBAC roles represent job functions in an organization. They bring together users and permissions. Permissions that describe operations upon resources are associated with roles. Users are assigned to roles to gain permissions that allow them to perform particular job functions. A major benefit of using this type of model is that the reconfiguration of user-role, role-permission, and role-role relationships, directed by administrators, can reflect changing organizational policies. The maintenance of such a sub-system that is independent from the core application minimizes the impact on the overall system of requirements changes with regard to security. RBAC is widely accepted as a best practice and implemented in one form or another in systems including Microsoft Active Directory, SELinux, FreeBSD, Solaris, and Oracle DBMS. However, several weaknesses have been identified. In a hospital,

3 different users with the same clinician role may have different permissions to particular resources. For example, one clinician that created a patient case in a hospital might have more rights than other clinicians in the same hospital. Clinicians in one hospital could have more rights to data in that hospital than clinicians from another hospital. Since permissions are not directly assignable to individual users, it is impossible to use RBAC to differentiate users with practically different capabilities in the system. Another insufficiency in the RBAC model is the lack of context access modelling. The DAFMAT approach [4] is based on the RBAC model and applied to healthcare applications. Concepts of user, role, subject and domain are used and their mappings in pairs are defined to declare access modes. Authorization requests are validated using the access modes. However, their subjects represent executable domain functions and other resource types, such as data resources, are not protected. Moreover, the presentation of this model is only for human comprehension. A mechanism of forming security policies in an executable manner has not been considered. The importance of security in the healthcare domain has also been recognized in [16], particularly for managing patient data and its communication in a distributed environment. Security tags are used to mark information with regard to privacy within the patient record structure so that access is restricted to trusted agents only. This approach is limited to secure patient data access and has paid no attention to the many security issues involved in the healthcare service provision process. As a direct consequence we believe that an adaptive security model that is configurable and reusable across applications would represent a significant advance. Therefore we extend the role concept, incorporating both role-based agent behavior and role-based access control in a single role interaction model. The easily re-configurable model maintains not only functional requirements but also security constraints in Multi-Agent Systems. Our novel adaptive security model is expressed using a knowledge rich language. This model is applied to HealthAgents, a multi agent distributed decision support system for brain tumor diagnosis. Our approach avoids weaknesses of traditional RBAC approaches and provides a practically usable security model for Multi-Agent Systems (MAS). The proposed unified role interaction model framework incorporates not only functional requirements but also security constraints in MAS. The security policy rule scheme has been used to express security requirements in relation to effective roles. The language proposed for expressing these requirements is an extension to Conceptual Graphs, Layered Conceptual Graphs. Layered Conceptual Graphs are a visual, logic based, knowledge representation formalism allowing for depiction of hierarchical knowledge. To conclude, the major contribution of this work is two fold. First, little redevelopment effort will be required when security is to be engineered into the overall architecture, minimizing the impact of security requirements changes to the MAS. Second, by employing a knowledge rich formalism for expressing policy rules we can then (i) use deduction to minimize the number of written rules for the system (inheritance), (ii) be able to check for consistency and (iii) rigourously depict the policy rules interdependencies.

4 3 Security mechanisms for HealthAgents The use of a distributed system for data collection and management is a necessity for medical decision support systems, especially when the number cases to be analyzed is limited per single node. However, the medical context poses extra interesting security requirements including ethical approval and informed consent of the participants. For multinational projects, ethical approval is devolved to regional bodies without any coordinated or uniform decision making. As a consequence, data gathered from different centers may be subject to different restrictions. Allowing for flexibility within the data security model is therefore essential. This section presents the basic security architecture implemented in the prototype for HealthAgents and how policy rules complement the existing security mechanisms. We then explain the expressivity requirements for policy rules and hence motivate the proposed Conceptual Graphs based language detailed in Section 4. In order to put our work in context a brief introduction to HealthAgents and its security requirements is also presented. 3.1 HealthAgents The HealthAgents project, a Specific Targeted Research or Innovation Project (STREP) plans to create a multi-agent distributed Decision Support System (d-dss) based on novel medical imaging and laboratory tests to help determine the diagnosis and prognosis of brain tumours. The HealthAgents decision support system implements a series of automated classifiers based on pattern recognition methodologies for the diagnosis and prognosis of brain tumours. These classifiers (implemented as agents) will need to access the data stored in the hospitals both for training and for decision making purposes. Prior to incorporation into clinical practice such methods must be fully tested within a clinical trials setting. Clinical trials commonly use data from which personal information (e.g. name, address, date of birth) is removed but to which a unique patient identifier is added, often termed link-anonymised data. Such a scheme has the advantage of having a high chance of preserving patient anonymity whilst allowing data from the same patient to be added at a later date. This scheme also allows a specific patients data to be located and removed from the project at any time they request, a condition usually imposed by ethics committees. Clinical trials are usually supported by a centralized database where the link-anonymised data are stored. For a distributed system, similarly robust arrangements must be designed to reassure ethics committees and patients that the data are secure. Security systems will need to be in place which can allow each center to potentially limit the type of data transmitted and the locations it is transmitted to.

5 Figure 1: HealthAgents security levels 3.2 Basic Architecture The HealthAgents framework provides an abstraction of the underlying agent platform, such that developers may implement new agents in a platform independent way. The framework abstraction is built upon a layered architecture that provides fundamental services to the final agent. Messages that enter the agent are effectively filtered through the layers and only if all layers understand and accept the message s credentials will the message be acted upon. Therefore, perhaps the most important of these layers is the security layer that will determine whether the credentials in the message are valid for interpretation on this particular agent. The framework has been built such that security modules, that are designed to check the credentials of a message, have to adhere to a specific pattern; that is, an application programmer s interface has been defined for this module. The agent s kernel will call upon the appropriate security module (defined by the agent s configuration) to authenticate the message. Only when a message has been authenticated will the message be provided to the functionality provider of the agent, signified by the Programmatic API in Figure Enhanced security: policy rules In HealthAgents most of the policy rules regulate the access to data of different centers. According to their type, different users/agents will have different access rights to data. In this paper we are going to focus on the following rules (agreed upon clinician feedback): Only clinicians in the same hospital as the data can fully access them.

6 Figure 2: HealthAgents Security Model Clinicians have access to a non empty subset of data from other hospitals. Classifier sites have access to data only upon accreditation. Classifiers are not to further redistribute the data. Note that other intrinsic policy rules (such as the fact that one should only access the relevant data for diagnostic purposes) are also considered within HealthAgents but, due to certain knowledge representation challenges, are beyond the scope the current paper. In [17] we extended the RBAC model to avoid its weakness and to meet the unique characteristics of MAS. A security model has been proposed (see Figure 2), motivated by the particular requirements of the HealthAgents project but generic enough so that other domains and applications may use it. In the security model depicted in Figure 2, agent behavior is specified in roles which not only meet functional requirements but also enforce security policy requirements. Figure 3 shows a prototype interaction model for invoking a classification in the HealthAgents system. In [17] we provided an analysis of the security requirements for this prototype model based on the security model shown in Figure 2. The application of the security model was discussed and sample security policies were given in a XML format. However, when expressed in a syntactic language with no attached logical semantics (such as UML, XML etc), policy rule frameworks suffer from a number of drawbacks: Policy rules are usually presented in natural language. They are often embedded directly into the final software product as part of the implementation. The misinterpretation of policy rules from their original natural

7 Figure 3: HealthAgents Interaction Model language representation into code by developers with their own assumptions will lead to later re-development. A means must be provided for explicit representation of rules in the running system that supports direct execution (and reasoning). Inconsistency and ambiguity in policy rules are hard to identify since they may be set-up by various responsible people with different views. This will confuse the running system when contradictory rules come into play at the same time. Inter-relationships among policy rules must be established but little work so far is in this direction. When a set of rules are found to be applicable and others irrelevant, the system may actually need to be sufficiently intelligent in not ruling out the seemingly irrelevant ones. This is due to the fact that when some rules are applied, extra knowledge is obtained by the system, and then the pre-conditions of other policy rules become satisfied. A graph that interconnects the policy rules to check for their relationships while ensuring validation would support the overall system decision making and human analysis.

8 4 Policy rules with Conceptual Graphs We propose a framework for policy rules that employs Layered Conceptual Graphs. We address the current limitations of existing work using a visual, structured, logic based knowledge representation (KR) formalism. Our choice of KR means that we benefit from: An extension of a KR formalism originally introduced to model natural language. This means that we can tap into existing research (and tools) looking at modelling Conceptual Graphs and natural language. Layered Conceptual Graphs are a logic based language. This means that reasoning can ensure validation, reuse and consistency. Hierarchical knowledge can be easily depicted and reasoned upon. This means that we can express the high level policy rules and their interdependencies and then get into more detail as we need to expand those rules. In the remainder of the section we present Conceptual Graphs and Layered Conceptual Graphs informally (for a mathematically rigorous presentation please refer to [5, 6]). We then show how HealthAgents policy rules can be expressed using Layered Conceptual Graphs and what expressivity and reasoning power we gain. 4.1 Conceptual Graphs During the past 30 years, a wide variety of knowledge representation schemes have been developed, each of which have their own benefits and drawbacks. Expressiveness and efficiency are the key factors that greatly affect the competence of a representational scheme. The system KL-ONE [3] and its descendants are the main representative descendants of semantic networks [11]. The lack of a clear formal semantics of the first members of KL-ONE family has been successfully repaired by the most prominent KR languages, Description Logics (DLs) [2]. John Sowa developed Conceptual Graphs (CGs) on the basis of semantic networks and Peirce s Existential Graphs [10]. These graphs can be viewed as a diagrammatic system of logic, with the purpose to express meaning in a form that is logically precise, humanly readable, and computationally tractable [13]. Conceptual Graphs(CGs) represent background knowledge, i.e. basic ontological knowledge, in a structure called support, which is implicitly used in the representation of factual knowledge as labelled graphs. A support consists of a concept type hierarchy, a relation type hierarchy, a set of individual markers that refer to specific concepts and a generic marker, denoted by *, which refers to an unspecified concept. The support defines the main concepts and relations that exist in the world we are trying to describe. These concepts and relations are going to be linked together by the means of an ordered bipartite

9 graph that will describe the facts we are interested in. The ordered bipartite graph is going to represent the stencil which is going to be filled in with the concepts/relations taken from the support. A CG can be viewed as a bipartite graph that provides a semantic set of pointers to two ontologies. This means that we can reuse sources ontologies, database schemas etc. for the purpose of describing those sources by means of a CG. Moreover, the attached semantics of Conceptual Graphs make them a powerful reasoning knowledge representation and reasoning formalism [5]. Layered Conceptual Graphs (LCGs for short) is a rigorously defined representation formalism evolved from Conceptual Graphs. It allows highlighting a new type of rendering based on the additional expansion of concept / relation nodes. This way hierarchical knowledge can be represented in a mathematically sound manner. The semantics associated with layered conceptual graphs are based on the semantics of conceptual graphs and are described in more detail in [6]. LCGs preserve the bipartite graph structure of the original model by defining transitional descriptions which allow a successive construction of bipartite graphs. Unlike existing approaches the knowledge detailed on a level of a hierarchy is put in context by using descriptions for relation nodes as well. A transitional description of a bipartite graph G provides a set D of complex nodes in one of the classes of the bipartition, each complex node having associated a description. Complex nodes are visually depicted in bold. Their descriptions are disjoint bipartite graphs. The neighbors of complex nodes either have empty descriptions or are described as bipartite graphs. These bipartite graphs contain in one of the classes of the bipartition, (V C ), all the atomic neighbors of the initial graph. The remaining nodes in each of these classes are new nodes or are taken from the descriptions of the corresponding complex neighbors of the initial graph. In other words, if we have a interconnected world described by a CG and if we can provide details about both some complex concepts and their relationships, then we can construct a second level of knowledge about this world, describing these new details as Conceptual Graphs and applying the corresponding substitutions. This process can be similarly performed with the last constructed level, thus obtaining a coherent set of layered representations of the initial world. We will use Layered Conceptual Graphs for representing the policy rules and then their associated expansion properties for highlighting the interdependencies between such rules. 4.2 Intelligent policy rules This section will present a simple real-world example of policy rules for HealthAgents. Figure 4 depicts the support for our framework. Please note that the support is not exhaustive, being intended for illustration purposes only. The concept hierarchy is comprised of the top, universal type, further refined as a subject, resource, policy rule or attribute. Policy rule is a stand alone

10 T Subject Resource Policy Rule Attribute User Agent Type Location Clinician Database Agent Classifier Agent Yellow Pages Agent Concept Hierarchy T(T,T) T(T,T,T) hasattribute (T,Attribute) access(t,t) associated (Subject, Subject,Policy Rule) managed (Resource, Subject) requests (Subject, Resource) Relation Hierarchy Figure 4: Intelligent Policy Rules Support concept as one of our aims is to represent their interdependencies. The agents are further specialised in database agent, classifier agent and yellow pages agent. The relation hierarchy is made out of binary relations: access and attribute; and ternary relations: associate. For simplicity reasons we only consider two very generic access relations: managed and requests. Database Agent: * associated Policy Rule: PR1 Clinician: * associated Policy Rule: PR2 Classifier Agent: * associated Policy Rule: PR3 Yellow Pages Agent: * associated Policy Rule: PR4 Figure 5: Some Policy Rules between Different Agents In Figure 5 a bipartite graph is depicted for four policy rules. The policy rules are depicted on the right hand side of the picture while the subjects are represented on the left. To increase readability the edges are not explicitly ordered in the Figure. The bolded out nodes stand for complex nodes, that is, nodes can be further expanded. The four agents from the interaction are:

11 Clinical GUI Agent: the clinician, working in a given hospital, requesting the d-dss for a case to be classified. In Figure 5 we used the term clinician for clarity purposes. Database Agent: gives access to the data from a given hospital. Classifier Agent: a software that classifies brain tumor cases based on their characteristics (MRS spectra, case meta-data, etc.) Yellow Pages Agent. The policy rules depicted in Figure 5 address the following scenarios: P R 1 : A clinician wants to view data from a hospital. P R 2 : A clinician directly asks a specific classifier for a case to be categorized. P R 3 : A user asks the yellow pages for a classifier and the classifier is found by the yellow pages. P R 4 : Classifiers want to exchange information for combination. Due to space limitations we only focus on a subset of the first scenario, namely the clinicians accessing data from a hospital. We want to reinforce the fact that only clinicians within the same hospital as the data have access to them. This information is captured in Figure 6. Indeed, the bolded out nodes (the relation node associates and the concept node policy rule) will be expanded to capture this information. Please note that the concepts database agent and clinician remain unchanged, but are now linked to several relations to express the required information. Figure 6 represents the fact that a clinician, which has a certain location, is allowed to access a resource which is at the same location as him and is managed by a database agent. Based on the example above we have demonstrated that we can represent hierarchical information in a consistent, mathematically correct manner. However, beside their representational capabilities, Layered Conceptual Graphs also have attached rigorous reasoning mechanisms. In the remainder of the section we will present a simple example that illustrate some of the reasoning capabilities we can benefit from. Consider the example presented in Figure 7. On the left hand side the expanded P R 1 policy rule graph is depicted. On the right hand side we consider the query graph that wants to check if Maurice, a user from Birmingham is allowed to request data from Valencia. Checking whether the rules allow for that query is done by the means of projection, a labelled graph homomorphism between the query graph and the rules graph. More precisely, the relation nodes are projected into relation nodes and concept nodes into concept nodes. The structure of the graph also has to be preserved. We can see that, in this example, the answer to the query is no. This is due to the fact that the structure of the query graph does not match the rule (more precisely, there is

12 Clinician: * associated Policy Rule: PR1 Database Agent: * Clinician:* hasattribute access sameas hasattribute Location: * Resource: * } Database Agent: * managed Location: * Figure 6: Policy Rule 1 expanded no sameas relation in the query graph). Please note that information from the support is also considered while performing the projection. For example the concept type user from the query graph has been projected onto the concept type clinician (according to the concept type hierarchy). In the same way, according to the relation hierarchy, the relation node request was projected onto the relation node access. Clinician:* hasattribute hasattribute User:Maurice Location: * access request Location: Bham Resource: * sameas Resource:* Location: * hasattribute hasattribute Location: Valencia Database Agent: * managed managed Database Agent: 12 Figure 7: Policy Rule 1 Query Projection

13 5 Conclusions and future work In this paper we proposed a knowledge intensive approach to expressing policy rules. We have motivated our approach based on current limitations of existing work: no reasoning capabilities to manage rule interdependencies. Our work was explained in the context of HealthAgents, a distributed decision support system for brain tumor diagnosis. We evaluated our work theoretically, by showing gained representational and reasoning power. The examples were based on real-life policy rules considered for the HealthAgents prototype. Future work will consider looking at further exploring policy rules interdependencies from a knowledge representation point of view. It will be interesting (both from a policy rule and a conceptual Graph research point of view) to clearly state what redundancy or incoherence means. For instance it would be interesting to investigate the reasons why a policy rule cannot be projected onto another policy rule (structural mismatch, type mismatch etc). 6 Acknowledgements This work is supported under the HealthAgents STREP project funded by EU Framework 6 under Grant number IST-FP We would also like to thank Javier Vincente Robledo, Srinandan Dasmahapatra, Andrew Peet, Horacio Gonzalez-Velez and Alex Gibb for useful feedback on earlier versions of this paper. References [1] C. Arús, B. Celda, S. Dasmahapatra, D. Dupplaw, H. González-Vélez, S. van Huffel, P. Lewis, M. Lluch i Ariet, M. Mier, A. Peet, and M. Robles. On the design of a web-based decision support system for brain tumour diagnosis using distributed agents. In WI-IATW 06: 2006 IEEE/WIC/ACM Int Conf on Web Intelligence & Intelligent Agent Technology, pages , Hong Kong, December IEEE. [2] F. Baader et al., editors. The Description Logic Handbook. Cambridge Univ. Press, [3] R. J. Brachman and J. G. Schmolze. An Overview of the KL-ONE Representation System. Cognitive Science, 9(2): , [4] R. Chandramouli. A framework for multiple authorization types in a healthcare application system. Proceedings of the 17th Annual Computer Security Applications Conference, 1: , [5] M. Chein and M.-L. Mugnier. Conceptual graphs: Fundamental notions. Revue d Intelligence Artificielle, 6(4): , 1992.

14 [6] M. Croitoru, E. Compatangelo, and C. Mellish. Hierarchical knowledge integration using layered conceptual graphs. In Proc. of the 13th Int l Conf. on Conceptual Structures (ICCS 2005), number 3596 in Lect. Notes in Artif. Intell., pages Springer, [7] A. Kleppe, J. Warmer, and W. Bast. MDA Explained: The Model Driven Architecture: Practice and Promise. Addison, [8] T. Morgan. Business Rules and Information Systems. Addison, [9] Object Management Group (OMG). The OMG Unified Modeling Language (UML) Specification Ver. 1.5, March [10] C. S. Peirce. Manuscript 514, Available at [11] M. Quillian. Semantic memory. In M. Minsky, editor, Semantic Information Processing, pages MIT Press, [12] R. Sandhu, E. Coyne, H. Feinstein, and C. Youman. Role-based access control models. Computer, 29:38 47, [13] J. F. Sowa. Conceptual Structures: Information Processing in Mind and Machine. Addison-Wesley, [14] A. R. Tate, J. Underwood, D. M. Acosta, M.. Julia-Sape, C. Majos, A. Moreno-Torres, F. A. Howe, M. van der Graaf, M. M. Lefournier, F. Murphy, A. Loosemore, C. Ladroue, P. Wesseling, J. L. Bosson, A. W. Simonetti, W. Gajewicz, J. Calvar, A. Capdevila, P. Wilkins, A. C. Bell, C. Remy, A. Heerschap, D. Watson, J. R. Griffiths, and C. Arus. Development of a decision support system for diagnosis and grading of brain tumours using in vivo magnetic resonance single voxel spectra. NMR Biomed, 19: , [15] T. Verhanneman, F. Piessens, E. Win, B.D. andtruyen, and W. Joosen. A modular access control service for supporting application-specific policies. IEEE Distributed Systems Online, 7: , [16] J. Wimalasiri, P. Ray, and C. Wilson. Maintaining security in an ontology driven multi-agent system for electronic health records. Proceedings of the 6th International Workshop on Enterprise Networking and Computing in Healthcare Industry, 1:19 34, [17] L. Xiao, L. Peet, P. Lewis, S. Dasmahapatra, C. Saez, M. Croitoru, J. Vicente, H. Gonzalez-Valez, and M. Lluch. An adaptive security model for multi-agent systems and application to a clinical trials environment. In The First IEEE International Workshop on Security in Software Engineering, 2007.

A Security Model and its Application to a Distributed Decision Support System for Healthcare

A Security Model and its Application to a Distributed Decision Support System for Healthcare A Security Model and its Application to a Distributed Decision Support System for Healthcare Liang Xiao 1, Javier Vicente 3, Carlos Sáez 3, Andrew Peet 2, Alex Gibb 2, Paul Lewis 1, Srinandan Dasmahapatra

More information

Developing a Security Protocol for a Distributed Decision Support System in a Healthcare Environment

Developing a Security Protocol for a Distributed Decision Support System in a Healthcare Environment Developing a Security Protocol for a Distributed Decision Support System in a Healthcare Environment Liang Xiao University of Southampton United Kingdom lx@ecs.soton.ac.uk Paul Lewis University of Southampton

More information

A Semantic Approach for Access Control in Web Services

A Semantic Approach for Access Control in Web Services A Semantic Approach for Access Control in Web Services M. I. Yagüe, J. Mª Troya Computer Science Department, University of Málaga, Málaga, Spain {yague, troya}@lcc.uma.es Abstract One of the most important

More information

Semantic Search in Portals using Ontologies

Semantic Search in Portals using Ontologies Semantic Search in Portals using Ontologies Wallace Anacleto Pinheiro Ana Maria de C. Moura Military Institute of Engineering - IME/RJ Department of Computer Engineering - Rio de Janeiro - Brazil [awallace,anamoura]@de9.ime.eb.br

More information

CHAPTER 22 Database Security Integration Using Role-Based Access Control

CHAPTER 22 Database Security Integration Using Role-Based Access Control CHAPTER 22 Database Security Integration Using Role-Based Access Control Sylvia Osborn Department of Computer Science, The University of Western Ontario London, Ontario, Canada, N6A-5B7 svlvia@csd.uwo.ca

More information

11 Tips to make the requirements definition process more effective and results more usable

11 Tips to make the requirements definition process more effective and results more usable 1 11 Tips to make the s definition process more effective and results more usable This article discusses what I believe are the key techniques for making s definition process repeatable from project to

More information

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens

Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens Scalable End-User Access to Big Data http://www.optique-project.eu/ HELLENIC REPUBLIC National and Kapodistrian University of Athens 1 Optique: Improving the competitiveness of European industry For many

More information

UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES

UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES UTILIZING COMPOUND TERM PROCESSING TO ADDRESS RECORDS MANAGEMENT CHALLENGES CONCEPT SEARCHING This document discusses some of the inherent challenges in implementing and maintaining a sound records management

More information

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach

Reusable Knowledge-based Components for Building Software. Applications: A Knowledge Modelling Approach Reusable Knowledge-based Components for Building Software Applications: A Knowledge Modelling Approach Martin Molina, Jose L. Sierra, Jose Cuena Department of Artificial Intelligence, Technical University

More information

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset.

Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. White Paper Using LSI for Implementing Document Management Systems Turning unstructured data from a liability to an asset. Using LSI for Implementing Document Management Systems By Mike Harrison, Director,

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1: Introduction Database System Concepts, 5th Ed. See www.db book.com for conditions on re use Chapter 1: Introduction Purpose of Database Systems View of Data Database Languages Relational Databases

More information

Chapter 8 The Enhanced Entity- Relationship (EER) Model

Chapter 8 The Enhanced Entity- Relationship (EER) Model Chapter 8 The Enhanced Entity- Relationship (EER) Model Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 8 Outline Subclasses, Superclasses, and Inheritance Specialization

More information

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0

NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0 NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5

More information

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue

Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Ubiquitous, Pervasive and Mobile Computing: A Reusable-Models-based Non-Functional Catalogue Milene Serrano 1 and Maurício Serrano 1 1 Universidade de Brasília (UnB/FGA), Curso de Engenharia de Software,

More information

Semantically Enhanced Web Personalization Approaches and Techniques

Semantically Enhanced Web Personalization Approaches and Techniques Semantically Enhanced Web Personalization Approaches and Techniques Dario Vuljani, Lidia Rovan, Mirta Baranovi Faculty of Electrical Engineering and Computing, University of Zagreb Unska 3, HR-10000 Zagreb,

More information

Completeness, Versatility, and Practicality in Role Based Administration

Completeness, Versatility, and Practicality in Role Based Administration Completeness, Versatility, and Practicality in Role Based Administration Slobodan Vukanović svuk002@ec.auckland.ac.nz Abstract Applying role based administration to role based access control systems has

More information

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements

Questions? Assignment. Techniques for Gathering Requirements. Gathering and Analysing Requirements Questions? Assignment Why is proper project management important? What is goal of domain analysis? What is the difference between functional and non- functional requirements? Why is it important for requirements

More information

ONTODESIGN; A DOMAIN ONTOLOGY FOR BUILDING AND EXPLOITING PROJECT MEMORIES IN PRODUCT DESIGN PROJECTS

ONTODESIGN; A DOMAIN ONTOLOGY FOR BUILDING AND EXPLOITING PROJECT MEMORIES IN PRODUCT DESIGN PROJECTS ONTODESIGN; A DOMAIN ONTOLOGY FOR BUILDING AND EXPLOITING PROJECT MEMORIES IN PRODUCT DESIGN PROJECTS DAVY MONTICOLO Zurfluh-Feller Company 25150 Belfort France VINCENT HILAIRE SeT Laboratory, University

More information

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.

PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS. PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software

More information

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks

Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Application of XML Tools for Enterprise-Wide RBAC Implementation Tasks Ramaswamy Chandramouli National Institute of Standards and Technology Gaithersburg, MD 20899,USA 001-301-975-5013 chandramouli@nist.gov

More information

A Pattern-based Framework of Change Operators for Ontology Evolution

A Pattern-based Framework of Change Operators for Ontology Evolution A Pattern-based Framework of Change Operators for Ontology Evolution Muhammad Javed 1, Yalemisew M. Abgaz 2, Claus Pahl 3 Centre for Next Generation Localization (CNGL), School of Computing, Dublin City

More information

Role-based Authorization Constraints Specification Using Object Constraint Language

Role-based Authorization Constraints Specification Using Object Constraint Language Role-based Authorization Constraints Specification Using Object Constraint Language Gail-Joon Ahn Department of Computer Science University of North Carolina at Charlotte gahn@uncc.edu Michael. E. Shin

More information

Implementing XML-based Role and Schema Migration Scheme for Clouds

Implementing XML-based Role and Schema Migration Scheme for Clouds Implementing XML-based Role and Schema Migration Scheme for Clouds Gurleen Kaur 1, Sarbjeet Singh 2 Computer Science and Engineering, UIET Panjab University, Chandigarh, India 1 gurleenturka@gmail.com

More information

2 AIMS: an Agent-based Intelligent Tool for Informational Support

2 AIMS: an Agent-based Intelligent Tool for Informational Support Aroyo, L. & Dicheva, D. (2000). Domain and user knowledge in a web-based courseware engineering course, knowledge-based software engineering. In T. Hruska, M. Hashimoto (Eds.) Joint Conference knowledge-based

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Ontology and automatic code generation on modeling and simulation

Ontology and automatic code generation on modeling and simulation Ontology and automatic code generation on modeling and simulation Youcef Gheraibia Computing Department University Md Messadia Souk Ahras, 41000, Algeria youcef.gheraibia@gmail.com Abdelhabib Bourouis

More information

Chapter 2. Data Model. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel

Chapter 2. Data Model. Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel Chapter 2 Data Model Database Systems: Design, Implementation, and Management, Sixth Edition, Rob and Coronel 1 In this chapter, you will learn: Why data models are important About the basic data-modeling

More information

Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches

Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches White Paper Cisco Nexus Data Broker: Deployment Use Cases with Cisco Nexus 3000 Series Switches What You Will Learn Network Traffic monitoring using taps and Switched Port Analyzer (SPAN) is not a new

More information

Requirements engineering

Requirements engineering Learning Unit 2 Requirements engineering Contents Introduction............................................... 21 2.1 Important concepts........................................ 21 2.1.1 Stakeholders and

More information

Role Based Access Control Framework for Network Enterprises

Role Based Access Control Framework for Network Enterprises Role Based Access Control Framework for Network Enterprises Dan Thomsen, Dick O Brien, and Jessica Bogle Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113 thomsen@securecomputing.com

More information

HELP DESK SYSTEMS. Using CaseBased Reasoning

HELP DESK SYSTEMS. Using CaseBased Reasoning HELP DESK SYSTEMS Using CaseBased Reasoning Topics Covered Today What is Help-Desk? Components of HelpDesk Systems Types Of HelpDesk Systems Used Need for CBR in HelpDesk Systems GE Helpdesk using ReMind

More information

Project VIDE Challenges of Executable Modelling of Business Applications

Project VIDE Challenges of Executable Modelling of Business Applications Project VIDE Challenges of Executable Modelling of Business Applications Radoslaw Adamus *, Grzegorz Falda *, Piotr Habela *, Krzysztof Kaczmarski #*, Krzysztof Stencel *+, Kazimierz Subieta * * Polish-Japanese

More information

Data Warehouses in the Path from Databases to Archives

Data Warehouses in the Path from Databases to Archives Data Warehouses in the Path from Databases to Archives Gabriel David FEUP / INESC-Porto This position paper describes a research idea submitted for funding at the Portuguese Research Agency. Introduction

More information

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS

ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS ONTOLOGY FOR MOBILE PHONE OPERATING SYSTEMS Hasni Neji and Ridha Bouallegue Innov COM Lab, Higher School of Communications of Tunis, Sup Com University of Carthage, Tunis, Tunisia. Email: hasni.neji63@laposte.net;

More information

Ontologies for Enterprise Integration

Ontologies for Enterprise Integration Ontologies for Enterprise Integration Mark S. Fox and Michael Gruninger Department of Industrial Engineering,University of Toronto, 4 Taddle Creek Road, Toronto, Ontario M5S 1A4 tel:1-416-978-6823 fax:1-416-971-1373

More information

Ontology for Home Energy Management Domain

Ontology for Home Energy Management Domain Ontology for Home Energy Management Domain Nazaraf Shah 1,, Kuo-Ming Chao 1, 1 Faculty of Engineering and Computing Coventry University, Coventry, UK {nazaraf.shah, k.chao}@coventry.ac.uk Abstract. This

More information

A Pattern-Based Method for Identifying and Analyzing Laws

A Pattern-Based Method for Identifying and Analyzing Laws A Pattern-Based Method for Identifying and Analyzing Laws Kristian Beckers, Stephan Faßbender, Jan-Christoph Küster, and Holger Schmidt paluno - The Ruhr Institute for Software Technology University of

More information

A Framework for the Delivery of Personalized Adaptive Content

A Framework for the Delivery of Personalized Adaptive Content A Framework for the Delivery of Personalized Adaptive Content Colm Howlin CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Danny Lynch CCKF Limited Dublin, Ireland colm.howlin@cckf-it.com Abstract

More information

Security challenges for internet technologies on mobile devices

Security challenges for internet technologies on mobile devices Security challenges for internet technologies on mobile devices - Geir Olsen [geiro@microsoft.com], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [anild@microsoft.com],

More information

Appendix B Data Quality Dimensions

Appendix B Data Quality Dimensions Appendix B Data Quality Dimensions Purpose Dimensions of data quality are fundamental to understanding how to improve data. This appendix summarizes, in chronological order of publication, three foundational

More information

A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS

A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS A MEDIATION LAYER FOR HETEROGENEOUS XML SCHEMAS Abdelsalam Almarimi 1, Jaroslav Pokorny 2 Abstract This paper describes an approach for mediation of heterogeneous XML schemas. Such an approach is proposed

More information

Execution of A Requirement Model in Software Development

Execution of A Requirement Model in Software Development Execution of A Requirement Model in Software Development Wuwei Shen, Mohsen Guizani and Zijiang Yang Dept of Computer Science, Western Michigan University {wwshen,mguizani,zijiang}@cs.wmich.edu Kevin Compton

More information

Architecture. Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/

Architecture. Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/ Architecture Reda Bendraou reda.bendraou{{@}}lip6.fr http://pagesperso-systeme.lip6.fr/reda.bendraou/ Some slides were adapted from L. Osterweil, B. Meyer, and P. Müller material Reda Bendraou LI386-S1

More information

Lesson 8: Introduction to Databases E-R Data Modeling

Lesson 8: Introduction to Databases E-R Data Modeling Lesson 8: Introduction to Databases E-R Data Modeling Contents Introduction to Databases Abstraction, Schemas, and Views Data Models Database Management System (DBMS) Components Entity Relationship Data

More information

MatchPoint Technical Features Tutorial 21.11.2013 Colygon AG Version 1.0

MatchPoint Technical Features Tutorial 21.11.2013 Colygon AG Version 1.0 MatchPoint Technical Features Tutorial 21.11.2013 Colygon AG Version 1.0 Disclaimer The complete content of this document is subject to the general terms and conditions of Colygon as of April 2011. The

More information

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning

SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries and technology-enhanced learning Briefing paper: Value of software agents in digital preservation Ver 1.0 Dissemination Level: Public Lead Editor: NAE 2010-08-10 Status: Draft SEVENTH FRAMEWORK PROGRAMME THEME ICT -1-4.1 Digital libraries

More information

Introduction to Database Systems

Introduction to Database Systems Introduction to Database Systems A database is a collection of related data. It is a collection of information that exists over a long period of time, often many years. The common use of the term database

More information

Requirements engineering and quality attributes

Requirements engineering and quality attributes Open Learning Universiteit Unit 2 Learning Unit 2 Requirements engineering and quality attributes Contents Introduction............................................... 21 2.1 Important concepts........................................

More information

UPDATES OF LOGIC PROGRAMS

UPDATES OF LOGIC PROGRAMS Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,

More information

Information Brokering over the Information Highway: An Internet-Based Database Navigation System

Information Brokering over the Information Highway: An Internet-Based Database Navigation System In Proc. of The Joint Pacific Asian Conference on Expert Systems, Singapore, 1997 Information Brokering over the Information Highway: An Internet-Based Database Navigation System Syed Sibte Raza ABIDI

More information

Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools

Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools Automatic Generation of Consistency-Preserving Edit Operations for MDE Tools Michaela Rindt, Timo Kehrer, Udo Kelter Software Engineering Group University of Siegen {mrindt,kehrer,kelter}@informatik.uni-siegen.de

More information

A Mind Map Based Framework for Automated Software Log File Analysis

A Mind Map Based Framework for Automated Software Log File Analysis 2011 International Conference on Software and Computer Applications IPCSIT vol.9 (2011) (2011) IACSIT Press, Singapore A Mind Map Based Framework for Automated Software Log File Analysis Dileepa Jayathilake

More information

Doctor of Philosophy in Computer Science

Doctor of Philosophy in Computer Science Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects

More information

Secure Semantic Web Service Using SAML

Secure Semantic Web Service Using SAML Secure Semantic Web Service Using SAML JOO-YOUNG LEE and KI-YOUNG MOON Information Security Department Electronics and Telecommunications Research Institute 161 Gajeong-dong, Yuseong-gu, Daejeon KOREA

More information

Semantic Modeling of Mortgage Backed Securities: Case Study. Mike Bennett, Enterprise Data Management Council Yefim Zhuk, Sallie Mae

Semantic Modeling of Mortgage Backed Securities: Case Study. Mike Bennett, Enterprise Data Management Council Yefim Zhuk, Sallie Mae Semantic Modeling of Mortgage Backed Securities: Case Study Mike Bennett, Enterprise Data Management Council Yefim Zhuk, Sallie Mae 1 Overview EDM Council Semantics Repository Regulatory challenges Project

More information

2. MOTIVATING SCENARIOS 1. INTRODUCTION

2. MOTIVATING SCENARIOS 1. INTRODUCTION Multiple Dimensions of Concern in Software Testing Stanley M. Sutton, Jr. EC Cubed, Inc. 15 River Road, Suite 310 Wilton, Connecticut 06897 ssutton@eccubed.com 1. INTRODUCTION Software testing is an area

More information

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems

Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Using Real Time Computer Vision Algorithms in Automatic Attendance Management Systems Visar Shehu 1, Agni Dika 2 Contemporary Sciences and Technologies - South East European University, Macedonia 1 Contemporary

More information

XML DATA INTEGRATION SYSTEM

XML DATA INTEGRATION SYSTEM XML DATA INTEGRATION SYSTEM Abdelsalam Almarimi The Higher Institute of Electronics Engineering Baniwalid, Libya Belgasem_2000@Yahoo.com ABSRACT This paper describes a proposal for a system for XML data

More information

The Phios Whole Product Solution Methodology

The Phios Whole Product Solution Methodology Phios Corporation White Paper The Phios Whole Product Solution Methodology Norm Kashdan Phios Chief Technology Officer 2010 Phios Corporation Page 1 1 Introduction The senior staff at Phios has several

More information

Overview of major concepts in the service oriented extended OeBTO

Overview of major concepts in the service oriented extended OeBTO Modelling business policies and behaviour based on extended Open edi Business Transaction Ontology (OeBTO) Introduction Model Driven Development (MDD) provides a basis for the alignment between business

More information

Artificial Intelligence

Artificial Intelligence Artificial Intelligence ICS461 Fall 2010 1 Lecture #12B More Representations Outline Logics Rules Frames Nancy E. Reed nreed@hawaii.edu 2 Representation Agents deal with knowledge (data) Facts (believe

More information

Lightweight Data Integration using the WebComposition Data Grid Service

Lightweight Data Integration using the WebComposition Data Grid Service Lightweight Data Integration using the WebComposition Data Grid Service Ralph Sommermeier 1, Andreas Heil 2, Martin Gaedke 1 1 Chemnitz University of Technology, Faculty of Computer Science, Distributed

More information

Generating Aspect Code from UML Models

Generating Aspect Code from UML Models Generating Aspect Code from UML Models Iris Groher Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich, Germany Iris.Groher@fh-hagenberg.at Stefan Schulze Siemens AG, CT SE 2 Otto-Hahn-Ring 6 81739 Munich,

More information

INTEROPERABILITY IN DATA WAREHOUSES

INTEROPERABILITY IN DATA WAREHOUSES INTEROPERABILITY IN DATA WAREHOUSES Riccardo Torlone Roma Tre University http://torlone.dia.uniroma3.it/ SYNONYMS Data warehouse integration DEFINITION The term refers to the ability of combining the content

More information

Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms

Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Reverse Engineering of Relational Databases to Ontologies: An Approach Based on an Analysis of HTML Forms Irina Astrova 1, Bela Stantic 2 1 Tallinn University of Technology, Ehitajate tee 5, 19086 Tallinn,

More information

Implementation of hybrid software architecture for Artificial Intelligence System

Implementation of hybrid software architecture for Artificial Intelligence System IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.1, January 2007 35 Implementation of hybrid software architecture for Artificial Intelligence System B.Vinayagasundaram and

More information

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery

Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Combining SAWSDL, OWL DL and UDDI for Semantically Enhanced Web Service Discovery Dimitrios Kourtesis, Iraklis Paraskakis SEERC South East European Research Centre, Greece Research centre of the University

More information

Thesis Summary: An Ontology for City Logistics

Thesis Summary: An Ontology for City Logistics Thesis summary This report contains the detailed course of designing an ontology that formalises the domain knowledge of City Logistics and then facilitates relevant agent-based modelling. Validation,

More information

MULTI AGENT-BASED DISTRIBUTED DATA MINING

MULTI AGENT-BASED DISTRIBUTED DATA MINING MULTI AGENT-BASED DISTRIBUTED DATA MINING REECHA B. PRAJAPATI 1, SUMITRA MENARIA 2 Department of Computer Science and Engineering, Parul Institute of Technology, Gujarat Technology University Abstract:

More information

Role Based Access Control (RBAC) Nicola Zannone

Role Based Access Control (RBAC) Nicola Zannone Role Based Access Control (RBAC) Nicola Zannone 1 DAC and MAC Discretionary Access Control (DAC) Access control determined by the owner of an object Oner can delegate access rights to other users Access

More information

Novel Data Extraction Language for Structured Log Analysis

Novel Data Extraction Language for Structured Log Analysis Novel Data Extraction Language for Structured Log Analysis P.W.D.C. Jayathilake 99X Technology, Sri Lanka. ABSTRACT This paper presents the implementation of a new log data extraction language. Theoretical

More information

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS

THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS THE IMPACT OF INHERITANCE ON SECURITY IN OBJECT-ORIENTED DATABASE SYSTEMS David L. Spooner Computer Science Department Rensselaer Polytechnic Institute Troy, New York 12180 The object-oriented programming

More information

Tool Support for Software Variability Management and Product Derivation in Software Product Lines

Tool Support for Software Variability Management and Product Derivation in Software Product Lines Tool Support for Software Variability Management and Product Derivation in Software s Hassan Gomaa 1, Michael E. Shin 2 1 Dept. of Information and Software Engineering, George Mason University, Fairfax,

More information

Mapping between Levels in the Metamodel Architecture

Mapping between Levels in the Metamodel Architecture Mapping between Levels in the Metamodel Architecture José Álvarez, Andy Evans 2, Paul Sammut 2 Dpto. de Lenguajes y Ciencias de la Computación, University Málaga, Málaga, 2907, Spain alvarezp@lcc.uma.es

More information

Masters in Information Technology

Masters in Information Technology Computer - Information Technology MSc & MPhil - 2015/6 - July 2015 Masters in Information Technology Programme Requirements Taught Element, and PG Diploma in Information Technology: 120 credits: IS5101

More information

Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606

Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606 Integration of Distributed Healthcare Records: Publishing Legacy Data as XML Documents Compliant with CEN/TC251 ENV13606 J.A. Maldonado, M. Robles, P. Crespo Bioengineering, Electronics and Telemedicine

More information

JMulTi/JStatCom - A Data Analysis Toolkit for End-users and Developers

JMulTi/JStatCom - A Data Analysis Toolkit for End-users and Developers JMulTi/JStatCom - A Data Analysis Toolkit for End-users and Developers Technology White Paper JStatCom Engineering, www.jstatcom.com by Markus Krätzig, June 4, 2007 Abstract JStatCom is a software framework

More information

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology

Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Static Analysis and Validation of Composite Behaviors in Composable Behavior Technology Jackie Zheqing Zhang Bill Hopkinson, Ph.D. 12479 Research Parkway Orlando, FL 32826-3248 407-207-0976 jackie.z.zhang@saic.com,

More information

A Tool for Searching the Semantic Web for Supplies Matching Demands

A Tool for Searching the Semantic Web for Supplies Matching Demands A Tool for Searching the Semantic Web for Supplies Matching Demands Zuzana Halanová, Pavol Návrat, Viera Rozinajová Abstract: We propose a model of searching semantic web that allows incorporating data

More information

Development of Tool Extensions with MOFLON

Development of Tool Extensions with MOFLON Development of Tool Extensions with MOFLON Ingo Weisemöller, Felix Klar, and Andy Schürr Fachgebiet Echtzeitsysteme Technische Universität Darmstadt D-64283 Darmstadt, Germany {weisemoeller klar schuerr}@es.tu-darmstadt.de

More information

Web-Based Genomic Information Integration with Gene Ontology

Web-Based Genomic Information Integration with Gene Ontology Web-Based Genomic Information Integration with Gene Ontology Kai Xu 1 IMAGEN group, National ICT Australia, Sydney, Australia, kai.xu@nicta.com.au Abstract. Despite the dramatic growth of online genomic

More information

MARAH: an RBAC model and its integration in a Web server

MARAH: an RBAC model and its integration in a Web server MARAH: an RBAC model and its integration in a Web server P. Díaz, D. Sanz & I. Aedo Departamento de Informática, Universidad Carlos III de Madrid Abstract Hypermedia systems, whether implemented as web

More information

Extended RBAC Based Design and Implementation for a Secure Data Warehouse

Extended RBAC Based Design and Implementation for a Secure Data Warehouse Extended RBAC Based Design and Implementation for a Data Warehouse Dr. Bhavani Thuraisingham The University of Texas at Dallas bhavani.thuraisingham@utdallas.edu Srinivasan Iyer The University of Texas

More information

II. PREVIOUS RELATED WORK

II. PREVIOUS RELATED WORK An extended rule framework for web forms: adding to metadata with custom rules to control appearance Atia M. Albhbah and Mick J. Ridley Abstract This paper proposes the use of rules that involve code to

More information

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object

Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Training Management System for Aircraft Engineering: indexing and retrieval of Corporate Learning Object Anne Monceaux 1, Joanna Guss 1 1 EADS-CCR, Centreda 1, 4 Avenue Didier Daurat 31700 Blagnac France

More information

1 File Processing Systems

1 File Processing Systems COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.

More information

Object-Oriented Software Specification in Programming Language Design and Implementation

Object-Oriented Software Specification in Programming Language Design and Implementation Object-Oriented Software Specification in Programming Language Design and Implementation Barrett R. Bryant and Viswanathan Vaidyanathan Department of Computer and Information Sciences University of Alabama

More information

Co-Creation of Models and Metamodels for Enterprise. Architecture Projects.

Co-Creation of Models and Metamodels for Enterprise. Architecture Projects. Co-Creation of Models and Metamodels for Enterprise Architecture Projects Paola Gómez pa.gomez398@uniandes.edu.co Hector Florez ha.florez39@uniandes.edu.co ABSTRACT The linguistic conformance and the ontological

More information

Towards an Automated Pattern Selection Procedure in Software Models

Towards an Automated Pattern Selection Procedure in Software Models Towards an Automated Pattern Selection Procedure in Software Models Alexander van den Berghe, Jan Van Haaren, Stefan Van Baelen, Yolande Berbers, and Wouter Joosen {firstname.lastname}@cs.kuleuven.be IBBT-DistriNet,

More information

From Business World to Software World: Deriving Class Diagrams from Business Process Models

From Business World to Software World: Deriving Class Diagrams from Business Process Models From Business World to Software World: Deriving Class Diagrams from Business Process Models WARARAT RUNGWORAWUT 1 AND TWITTIE SENIVONGSE 2 Department of Computer Engineering, Chulalongkorn University 254

More information

Modeling Temporal Data in Electronic Health Record Systems

Modeling Temporal Data in Electronic Health Record Systems International Journal of Information Science and Intelligent System, 3(3): 51-60, 2014 Modeling Temporal Data in Electronic Health Record Systems Chafiqa Radjai 1, Idir Rassoul², Vytautas Čyras 3 1,2 Mouloud

More information

Security Issues for the Semantic Web

Security Issues for the Semantic Web Security Issues for the Semantic Web Dr. Bhavani Thuraisingham Program Director Data and Applications Security The National Science Foundation Arlington, VA On leave from The MITRE Corporation Bedford,

More information

When security meets software engineering: A case of modelling. secure information systems

When security meets software engineering: A case of modelling. secure information systems When security meets software engineering: A case of modelling secure information systems Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 Department of Computer Science, University of Sheffield,

More information

Role Based Access Control

Role Based Access Control Role Based Access Control Role-Based Access Control Models. By R.S. Sandhu, E.J. Coyne, H.L. Feinstein, and C.E. Youman, IEEE Computer, vol 29(2):38--47, February 1996. The most cited paper in access control!

More information

Using XACML Policies as OAuth Scope

Using XACML Policies as OAuth Scope Using XACML Policies as OAuth Scope Hal Lockhart Oracle I have been exploring the possibility of expressing the Scope of an OAuth Access Token by using XACML policies. In this document I will first describe

More information

Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper

Programmabilty. Programmability in Microsoft Dynamics AX 2009. Microsoft Dynamics AX 2009. White Paper Programmabilty Microsoft Dynamics AX 2009 Programmability in Microsoft Dynamics AX 2009 White Paper December 2008 Contents Introduction... 4 Scenarios... 4 The Presentation Layer... 4 Business Intelligence

More information

Universal. Event. Product. Computer. 1 warehouse.

Universal. Event. Product. Computer. 1 warehouse. Dynamic multi-dimensional models for text warehouses Maria Zamr Bleyberg, Karthik Ganesh Computing and Information Sciences Department Kansas State University, Manhattan, KS, 66506 Abstract In this paper,

More information

Chapter 1 Databases and Database Users

Chapter 1 Databases and Database Users Chapter 1 Databases and Database Users Copyright 2011 Pearson Education, Inc. Publishing as Pearson Addison-Wesley Chapter 1 Outline Introduction An Example Characteristics of the Database Approach Actors

More information