Sample Log Analysis in E&A - A Legal Framework
|
|
- Jeffrey Anthony
- 3 years ago
- Views:
Transcription
1 A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence Eduardo Mazza 1, Marie-Laure Potet 1, Daniel Le Métayer 2 LISE Project Funded by the Agence Nationale de la Recherce (ANR-07-SESU-00) (1) Verimag, Grenoble, France (2) INRIA, Grenoble Rhône-Alpes, France
2 Motivation Challenge: to precise legal liability for software Log as digital evidence More and more necessary PROBLEM Actual solutions that define liability are not focused in logs as digital evidence Works in log analysis show little concern in liability Proposal An integrated framework for precisely defining liability and log content as electronic evidence Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
3 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
4 Introduction LISE Project Contract based environment Legal aspects studied in previous works [ICSE 2010] Context: FAULTS CLAIMS LIABILITY Two or more agents signing a legal contract to precise liability for potential claims Contract agreement between the agents Requirements Description of application Claims taken into account covered by the contract Evidence agreement Log content and architecture Log Analyzer Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
5 LISE Approach Two phases Contractual requirements and evidence agreement Analysis - when claims appear Contractual Phase Analysis Phase Generic model Use of the B-method focus on data and behaviour Log Analyzer (attachment in contract) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
6 Assumptions & Key Concepts Distributed system distributed logs Information spread along multiple log files Communication between agents by message exchange Well adapted for B2B applications Logs are grouped by agents A single log file may contain the information of many agents Incremental Analysis would be an advantage Claims may be analyzed in a partial setting of the distributed system Not always possible to immediately obtain all logs Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
7 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
8 Logs How to represent logs? Generic model supporting distributed logs Hypothesis: preserved causality, no loss, no duplication System specification AGENT ACTION Interface : ACTION AGENT Logs and log distributions Event: (Send Rec, AGENT, AGENT, ACTION) Log file: F(AGENT ) iseq(events) Distribution: F(F(AGENT )) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
9 Example of Logs System Specification Possible log distributions {Client}, {Agency}, {Bank}, {Hotel} {Client, Agency}, {Bank}, {Hotel} Possible logs: ({Client, Agency}, [Request Send, Request Rec,... ]) ({Hotel}, [Book Rec, Cancel Rec,... ]) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
10 Claims How to represent the claims? Logs that are concerned by the claim (agents) A precise characterization when the claim is accepted (log property) A claim consists of: A plaintiff (the complaining agent) A defendant A log property If the property holds, then the agent defendant is responsible. Claim: (AGENT AGENT PROP) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
11 Properties Property: F(AGENT ) (LOG FILE BOOL) Distributed setting property for partial distribution 1 Agents concerned with this property Information needed to verify a property 2 Partial function (w.r.t. agents) that maps a log file to TRUE or FALSE IMPORTANT: agents of the property = agents of the log evaluated Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
12 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
13 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
14 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
15 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} 3 val(prop NoRoom ) = λ log.(agents(log) = {Client, Agency} Request Send events(log) Debit Send events(log) Book Send events(log) pos(request Send, log) < pos(debit Send, log)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
16 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} 3 val(prop NoRoom ) = λ log.(agents(log) = {Client, Agency} Request Send events(log) Debit Send events(log) Book Send events(log) pos(request Send, log) < pos(debit Send, log)) Client Agency Bank Hotel Request Justify Debit Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
17 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
18 Log Functions Motivation: Manipulate distributed logs w.r.t. concerned agents Log functions: extract - obtain events in a log concerning a given group of agents merge - provide the set of logs that respect the causal order of events Several possible scenarios Property: extract ags [merge[logs]] merge[extract ags [logs]] Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
19 Example of merge Client Request Agency Cancel log Client log Agency merge[log Client, log Agency ] = {log 1, log 2 } log 1 = ({Client, Agency}, [Request Send, Request Rec, Cancel Send ]) log 2 = ({Client, Agency}, [Request Send, Cancel Send, Request Rec ]) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
20 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
21 Analyzing a claim How to establish if a claims should be accepted or rejected? Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
22 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
23 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
24 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
25 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) 4 Compute the possible set of scenarios where Prop holds. Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
26 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) 4 Compute the possible set of scenarios where Prop holds. 5 Interpretation of the results by the judge Two results: Set of all scenarios Set of scenarios where property hold (I) Conclude the investigation accept or reject a claim (II) More data needed Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
27 Log Analyzer Log Analyzer: tool that computes the two results to be interpreted INPUT: logs: set of logs prop: property OUTPUT: scen: all possible scenarios ok: scenarios where the property holds scen, ok Analysis(logs, prop) PRE agents(prop) agents(logs) THEN scen := extract agents(prop) [merge[logs]]; ok := scen val(prop) 1 [{TRUE}] END Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
28 Interpreting the results Depending of the values for scen, ok: Inconclusive results results are not enough to provide the intuition for accepting or rejecting a claim A fine study may be necessary. (incremental analysis) Some definitive conclusive results situations: if scen = ok then claim is accepted if ok = then claim is rejected Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
29 Example of analysis - claim NoRoom (paper Example 8) Client Agency Bank Hotel Request Justify Debit Agency wants to verify if the claim is valid without using Bank s log Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
30 Example of analysis - claim NoRoom (paper Example 8) Client Agency Bank Hotel Request Justify Debit Agency wants to verify if the claim is valid without using Bank s log 3 scenarios: Request Send, Request Rec, Debit Send, Justify Rec Request Send, Request Rec, Justify Rec, Debit Send Request Send, Justify Rec, Request Rec, Debit Send scen = ok claim accepted Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
31 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
32 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
33 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus 1 Compute scen, ok Analysis(logs, prop) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
34 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus 1 Compute scen, ok Analysis(logs, prop) 2 iscen, iok IncrAnalysis(logs, prop, scen, ok) iscen := extract[merge[logs scen]] iok := extract[merge[logs ok]] ADVANTAGE: No need to verify the property again ok iok ok scen iscen scen Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
35 Example of incremental Analysis (paper Example 9) (claim LateCancel) Client complain that was charged for a reservation that had been canceled prop LateCancel : agents(prop LateCancel ) = {Client, Agency} Debit Send events(log) Cancel Send events(log) pos(cancel Send, log) < pos(debit Send, log) Client Agency Bank Hotel Request Confirm Justify Debit Cancel Book CancelDebit Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
36 First analysis Client Agency Bank Hotel Request Confirm Justify Debit Cancel Book CancelDebit scen with 20 scenarios ok with 10 scenarios Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
37 Second analysis (incremental) Client Agency Bank Hotel Request Justify Confirm Debit Cancel Book CancelDebit scen with 3 scenarios ok = claim rejected (without property verification!) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
38 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
39 Conclusion Contributions: General framework to precisely decribe claims in terms of logs Specification of a Log Analyzer tool Study of incremental aspects over the acceptability of claims Future works: Parametrized claims and properties Integration with previous works Analysis of log architecture [SEFM 2010] Help adding logs for incremental analysis Formal definition of liability When should a claim be accepted Claim with multiples responsible agents Mazza, Potet, Le Métayer (LISE Project) SBMF / 26
Definitions of Logical Causality for Log Analysis
Definitions of Logical Causality for Log Analysis Gregor Gössler 1 Joint work with Daniel Le Métayer 1 and Jean-Baptiste Raclet 2 1 INRIA Grenoble Rhône-Alpes, France 2 IRIT - CNRS, Toulouse, France Synchron
More informationConstructing a Stable and Verifiable Computer Forensic System
Constructing a Stable and Verifiable Computer Forensic System Daniel Ayers Elementary Solutions Ltd Auckland, New Zealand Open Source Digital Forensics Conference 2011 Introduction This talk is about validation
More informationUsing PI to Exchange PGP Encrypted Files in a B2B Scenario
Using PI to Exchange PGP Encrypted Files in a B2B Scenario Applies to: SAP Net Weaver Process Integration 7.1 (SAP PI 7.1). For more information, visit the SOA Management homepage. Summary This document
More informationSpecification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
More informationProcess Document Student Self-Service: Making Credit Card Payments. Making Credit Card Payments. Concept
Making Credit Card Payments Concept The Campus Finance component of Student Self-Service enables students to access their student bill information and manage their charges and payments. This topic covers
More informationAppendix 1 Assumptions and results of scenarios in the financial sensitivity model
Appendix 1 Assumptions and results of scenarios in the financial sensitivity model 1.1 Introduction The financial sensitivity model ( FMS ) was developed to translate the results of the econometric model
More informationSoftware Active Online Monitoring Under. Anticipatory Semantics
Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software
More informationCorrelational Research
Correlational Research Chapter Fifteen Correlational Research Chapter Fifteen Bring folder of readings The Nature of Correlational Research Correlational Research is also known as Associational Research.
More informationLEARNING MANAGEMENT SYSTEM MANAGER GUIDE
LEARNING MANAGEMENT SYSTEM MANAGER GUIDE Social Work Workforce Development 2 Training Team updated 20-10-14 CONTENTS CONTENTS... 3 MANAGEMENT AREA... 4 VIEW REQUESTS CALENDAR... 4 APPLICANT REQUESTS...
More informationTechnical support terms and conditions
Technical support terms and conditions This AGREEMENT defines the terms and conditions under which ScalAgent Distributed Technologies, hereafter called SCALAGENT, provides the technical support services
More informationStaRVOOrS: A Tool for Combined Static and Runtime Verification of Java
StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.
More informationRuntime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection
Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS
More informationAccountability by Design for Privacy
Accountability by Design for Privacy Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 17 Introduction ICT growth adds to concern about sensitive data use Individuals share more & more PII Stronger
More informationCertification of a Scade 6 compiler
Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What
More informationIndustrial Challenges for Content-Based Image Retrieval
Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September 2005 www.ltutech.com LTU technologies Page 1 Agenda CBIR what is it good for? Technological challenges
More informationYOUR GUIDE TO THE iphone MOBILE APP WITH 1st SOURCE
YOUR GUIDE TO THE iphone MOBILE APP WITH 1st SOURCE Strong. Stable. Local. Personal. 10/12 Install, Sign On and View Account Balances 1. Visit the iphone App Store on your iphone and search for 1st Source
More informationLiability and Privacy Issues in Business
1 Interactions between law and computer science: privacy and liability Daniel Le Métayer 2 Multidisciplinary approach Growing intermingling of legal and technological issues: privacy, DRM, liability, electronic
More informationE10: Controlled Experiments
E10: Controlled Experiments Quantitative, empirical method Used to identify the cause of a situation or set of events X is responsible for Y Directly manipulate and control variables Correlation does not
More informationTwo Flavors in Automated Software Repair: Rigid Repair and Plastic Repair
Two Flavors in Automated Software Repair: Rigid Repair and Plastic Repair Martin Monperrus, Benoit Baudry Dagstuhl Preprint, Seminar #13061, 2013. Link to the latest version Abstract In this paper, we
More informationFabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
More informationStatic Taint-Analysis on Binary Executables
Static Taint-Analysis on Binary Executables Sanjay Rawat, Laurent Mounier, Marie-Laure Potet VERIMAG University of Grenoble October 2011 Static Taint-Analysis on Binary Executables 1/29 Outline 1 Introduction
More informationData Warehouse / MIS Testing: Corporate Information Factory
Data Warehouse / MIS Testing: Corporate Information Factory Introduction Data warehouse commonly known as DWH is a central repository of data that is created from several diverse sources. Businesses need
More informationBANK RECONCILIATION 08 MAY 2014
BANK RECONCILIATION 08 MAY 2014 In this lesson we: Lesson Description Focus on Bank Reconciliation Summary In the business world, control of cash is facilitated by depositing cash sales and other receipts
More informationThe following are two things that cannot be done with a lead until it has been converted to a prospect or account:
Customer Management Work with the Leads Database & Lead Entry The Oasis-CRM Leads Database is quarantined from the main Oasis-CRM accounts and contacts database until they are converted to a prospect or
More informationInformation Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net
More informationACH Internal Control Questionnaire
ACH Internal Control Questionnaire AUTOMATED CLEARING HOUSE (ACH) Assessment of the Adequacy of Internal Controls Completed by: Date Completed: Quality of Management and Support for ACH Processing Activity
More informationStreamServe Persuasion SP5 Upgrading instructions
StreamServe Persuasion SP5 Upgrading instructions Reference Guide Rev A Upgrading instructionsstreamserve Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States
More informationHYPOTHESIS TESTING WITH SPSS:
HYPOTHESIS TESTING WITH SPSS: A NON-STATISTICIAN S GUIDE & TUTORIAL by Dr. Jim Mirabella SPSS 14.0 screenshots reprinted with permission from SPSS Inc. Published June 2006 Copyright Dr. Jim Mirabella CHAPTER
More information(30 September 2004 31 December 2010) SHORT-TERM INSURANCE ACT 53 OF 1998
(30 September 2004 31 December 2010) SHORT-TERM INSURANCE ACT 53 OF 1998 (Gazette No. 19277, Notice No. 1191, dated 23 September 1998. Commencement date: 1 January 1999) POLICYHOLDER PROTECTION RULES (SHORT-TERM
More informationGeneral Purpose Database Summarization
Table of Content General Purpose Database Summarization A web service architecture for on-line database summarization Régis Saint-Paul (speaker), Guillaume Raschia, Noureddine Mouaddib LINA - Polytech
More informationFrom Workflow Design Patterns to Logical Specifications
AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software
More information3. The aim of this enhanced service in 2013/14 is to establish patient online access to GP practice information systems as follows:
ENHANCED SERVICE SPECIFICATION IMPROVING PATIENT ONLINE ACCESS Introduction 1. This enhanced service has been designed by the NHS Commissioning Board (NHS CB) to facilitate improvements in the electronic
More informationSoftware Engineering
Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method
More informationRecap. Lecture 6. Recap. Jiri Novak, IES UK 1. Accounts Receivable. 6.1 Accounts Receivable
Lecture 6 Jiri Novak IES, UK 2 Recap Inventories items held for sale (merchandise) or used in manufacturing (raw materials, work in progress, finished goods) specific identification method impractical,
More information2 business days from the date of K-Cyber Invest registration.
How to apply K-Cyber Invest How to apply for K-Cyber Invest There are 2 following ways to apply for K-Cyber Invest; 1. Online registration via K-Cyber Service without any documents (For user who had K-Cyber
More informationCan SAS Enterprise Guide do all of that, with no programming required? Yes, it can.
SAS Enterprise Guide for Educational Researchers: Data Import to Publication without Programming AnnMaria De Mars, University of Southern California, Los Angeles, CA ABSTRACT In this workshop, participants
More informationBACKING UP A DATABASE
BACKING UP A DATABASE April 2011 Level: By : Feri Djuandi Beginner Intermediate Expert Platform : MS SQL Server 2008, Visual C# 2010 Pre requisites: Suggested to read the first part of this document series
More informationBusiness Process Modeling
Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process
More informationCase 1:13-cv-00796-RPM Document 23 Filed 02/18/14 USDC Colorado Page 1 of 9
Case 1:13-cv-00796-RPM Document 23 Filed 02/18/14 USDC Colorado Page 1 of 9 Civil Action No. 13-cv-00796-RPM MICHAEL DAY KEENEY, IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Senior
More informationCase studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design
I. Automated Banking System Case studies: Outline Requirements Engineering: OO and incremental software development 1. case study: withdraw money a. use cases b. identifying class/object (class diagram)
More informationUnified Static and Runtime Verification of Object-Oriented Software
Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden
More informationCourse 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 OVERVIEW About this Course Data warehousing is a solution organizations use to centralize business data for reporting and analysis.
More informationElectronic Ticket System
UNIVERSITY OF GEORGIA Electronic Ticket System New Options Available as of January 2010 Insert the complete email address (valid UGA address only) instead of the UGA MyID to send tickets to Approvers.
More informationGENERAL TERMS AND CONDITIONS OF SALE AND USE OF THE DREAMJET WEBSITE
GENERAL TERMS AND CONDITIONS OF SALE AND USE OF THE DREAMJET WEBSITE Article 1 Subject matter and scope DreamJet SAS is a simplified company limited by shares with a single shareholder, whose registered
More informationIBM BPM V8.5 Standard Consistent Document Managment
IBM Software An IBM Proof of Technology IBM BPM V8.5 Standard Consistent Document Managment Lab Exercises Version 1.0 Author: Sebastian Carbajales An IBM Proof of Technology Catalog Number Copyright IBM
More informationImplementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 200 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led
More informationModel Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007
Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing
More informationSemarchy Convergence for MDM The Next Generation Evolutionary MDM Platform
PRODUCT DATASHEET Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform IT MANAGEMENT BENEFITS Get successful on time and budget Start with a tactical solution, build for tomorrow
More informationFederal Judicial Center, 2003 2004 District Court Case-Weighting Study. Appendix V. Data-Cleaning Process
Appendix V Data-Cleaning Process Included items: 1. Data-Cleaning Process 2. Brief Description of Main Data-Cleaning Programs Blank pages inserted to preserve pagination when printing double-sided copies.
More informationHarmless Advice. Daniel S Dantas Princeton University. with David Walker
Harmless Advice Daniel S Dantas Princeton University with David Walker Aspect Oriented Programming Aspect Oriented Programming IBM - 2004 IBM reports positive results in aspect-oriented programming experiments
More informationDYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER
DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER Kluwer Academic Publishers Boston/Dordrecht/London TABLE OF CONTENTS FOREWORD ACKNOWLEDGEMENTS XIX XXI
More informationScience, Technology, Engineering & Mathematics Career Cluster
Science, Technology, Engineering & Mathematics Career Cluster 1. Apply engineering skills in a project that requires project management, process control and quality assurance. ST 1.1: Apply the skills
More informationEast Asia Network Sdn Bhd
Course: Analyzing, Designing, and Implementing a Data Warehouse with Microsoft SQL Server 2014 Elements of this syllabus may be change to cater to the participants background & knowledge. This course describes
More informationFormal Modelling and Verification of an Asynchronous Extension of SOAP
Formal Modelling and Verification of an Asynchronous Extension of SOAP Maurice ter Beek FM&&T, ISTI CNR, Pisa, Italy Wednesday 6 December ECOWS 2006 joint work with: Stefania Gnesi and Franco Mazzanti
More informationVision Document Airline Reservation System
Vision Document Airline Reservation System Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering Kaavya Kuppa CIS 895 MSE Project Department of Computing
More informationImplementing a Data Warehouse with Microsoft SQL Server 2012
Course 10777 : Implementing a Data Warehouse with Microsoft SQL Server 2012 Page 1 of 8 Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777: 4 days; Instructor-Led Introduction Data
More informationREQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS
REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3
More informationCRISP-DM: The life cicle of a data mining project. KDD Process
CRISP-DM: The life cicle of a data mining project KDD Process Business understanding the project objectives and requirements from a business perspective. then converting this knowledge into a data mining
More informationBENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin emmanuel.gaudin@pramadev.com
BENEFITS OF MODELING WITH A FORMAL LANGUAGE Emmanuel Gaudin emmanuel.gaudin@pramadev.com PragmaDev French software editor based in Paris Dedicated to the development of RTDS: a modeling and testing tool
More information6 Project Planning Matrix (PPM) - Overview (in brief)
COMIT: ZOPP - PPM (Overview) 76 6 Project Planning Matrix (PPM) - Overview (in brief) 6.1 What is a PPM? The PPM provides a one-page summary: Why What How Which How Where a project is carried out (= who/what
More informationA science-gateway workload archive application to the self-healing of workflow incidents
A science-gateway workload archive application to the self-healing of workflow incidents Rafael FERREIRA DA SILVA, Tristan GLATARD University of Lyon, CNRS, INSERM, CREATIS Villeurbanne, France Frédéric
More informationCourse Outline. Module 1: Introduction to Data Warehousing
Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing solution and the highlevel considerations you must take into account
More information360-FAAR Firewall Analysis, Audit, Repair
360º Firewall Analysis Audit and Repair 360 Analytics Ltd. Feature Comparison v1.0 Firewall Analysis, Audit, Repair Release vs Release Feature Comparison General Feature NETWORK AND SERVICE OBJECT AND
More informationThe Road from Software Testing to Theorem Proving
The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December
More information1 - General. 2 - Orders
SCI VALTERRE CHÂTEAU DE VAUX LE VICOMTE ONLINE RESERVATIONS Definitions: In these general terms and conditions (hereinafter referred to as Terms ), the following definitions shall apply: SCI VALTERRE CHÂTEAU
More informationCOURSE 20463C: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER
Page 1 of 8 ABOUT THIS COURSE This 5 day course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL Server
More informationImplementing a Data Warehouse with Microsoft SQL Server
Page 1 of 7 Overview This course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL 2014, implement ETL
More informationArchitectural Patterns: From Mud to Structure
DCC / ICEx / UFMG Architectural Patterns: From Mud to Structure Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo From Mud to Structure Layered Architecture It helps to structure applications that
More informationascom Technical White Paper Series Framework for Automatic Fare Collection Systems
ascom Technical White Paper Series Framework for Automatic Fare Collection Systems Framework for Automatic Fare Collection Systems Ascom White Paper Series Issue No. 112/1999 Copyright 1999 by Ascom Autelca
More informationORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY
ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY The Oracle Enterprise Data Quality family of products helps organizations achieve maximum value from their business critical applications by delivering fit
More informationAdvanced Software Engineering ( -Formal specification, verification, transformation, and application-
Advanced Software Engineering ( -Formal specification, verification, transformation, and application- Shaoying Liu Faculty of Computer and Information Sciences Hosei Univeresity, Tokyo, Japan Email: sliu@k.hosei.ac.jp
More informationTime Matters and Billing Matters 11.1. User Guide
Time Matters and Billing Matters 11.1 User Guide About this guide This guide provides steps to achieve basic, commonly performed tasks. For additional details, including interface elements and advanced
More informationOnline Backup Client 3.12.5.3 Release Notes
December 2008 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights can be derived
More informationRequirement engineering Exercise the POS System solution
Requirement engineering Exercise the POS System solution Problem Description A POS (Point-Of-Sale) system is a computer system typically used to manage the sales in retail stores. It includes hardware
More informationOnline credit/debit card processing with RBS WorldPay
Mamut Business Software Introduction Online credit/debit card processing with RBS WorldPay 1 Online credit/debit card processing with RBS WorldPay Contents Online credit/debit card processing with RBS
More informationHigh Availability for Microsoft Servers
High Availability for Microsoft Servers Whatever, New York June 2000 1 Agenda Windows 2000 dependability. Tomorrows problems. Microsoft Research/development. 2 Dependability Goal Setting. From the customers
More informationNAB EFTPOS User Guide. for Countertop & Mobile Terminals
NAB EFTPOS User Guide for Countertop & Mobile Terminals About your NAB EFTPOS Terminal NAB EFTPOS Mobile NAB EFTPOS Countertoptop Table of Contents Getting to know your NAB EFTPOS VeriFone terminal...5
More informationLog Design for Accountability
Log Design for Accountability Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 18 Background Need for Accountability 2 / 18 Context Background Need for Accountability Data subjects share more & more
More informationSCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0
SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 OCTOBER 28, 2001 REVISION CHART Version Primary Author(s) Description of Version Date Completed Draft Johnny
More informationHelp-Operational Guidelines for Online RE-11 & RE-12. Step 1 : Open URL from website Go to http://peso.gov.in/index.aspx Click on Link1 or Link2
Help-Operational Guidelines for Online RE-11 & RE-12 Step 1 : Open URL from website Go to http://peso.gov.in/index.aspx Click on Link1 or Link2 Step 2 : Login Page will appear for login in online system
More informationData Analysis Process Is A Multi Risk Process. EuroCACS 2013 Session 211
Data Analysis Process Is A Multi Risk Process EuroCACS 2013 Session 211 www.sr-cpa.info 17 September 2013 Content (1) Your lecturer Business processes in the modern world Data Analysis: Definition Why
More informationOnSite: Support and Software Maintenance
OnSite: Support and Software Maintenance Responsible for the content: audeosoft GmbH, Kreuzberger Ring 44a, 65205 Wiesbaden, Germany, hereinafter referred to as audeosoft. (Addendum to Terms of use audeosoft
More informationSCORE An Overview. State of Colorado Registration and Election Management
SCORE An Overview State of Colorado Registration and Election Management Table of Contents The Voter Registration Module 3 The Voter Search Module 4 The Voter Merge Module 5 The Batch Scan/Commit Batch
More informationMortgage Broker Qualifying Standards (MBQS)
OBJECTIVES A. Compliance and Consumer Protection A1 Recognize the impact of regulation and legislation on the mortgage industry A1.1 Recognize requirements related to financial reporting and other reporting
More informationExpert Systems. A knowledge-based approach to intelligent systems. Intelligent System. Motivation. Approaches & Ingredients. Terminology.
Motivation Expert Systems A knowledge-based approach to intelligent systems Intelligent System Peter Lucas Department of Information and Knowledge Systems Institute for Computing and Information Sciences
More informationSimulating Investment Portfolios
Page 5 of 9 brackets will now appear around your formula. Array formulas control multiple cells at once. When gen_resample is used as an array formula, it assures that the random sample taken from the
More informationBusiness Rules. Capitation-based funding. Version 3.9
Business Rules Capitation-based funding Version 3.9 Citation: Ministry of Health. 2013. Business Rules: Capitation-based funding. Wellington: Ministry of Health. Published in May 2013 by the Ministry of
More informationSoftware Engineering Reference Framework
Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of
More informationAn Oracle White Paper February 2009. Real-time Data Warehousing with ODI-EE Changed Data Capture
An Oracle White Paper February 2009 Real-time Data Warehousing with ODI-EE Changed Data Capture Executive Overview Today s integration project teams face the daunting challenge of deploying integrations
More informationActuarial Guidance Note 9: Best Estimate Assumptions
ACTUARIAL SOCIETY OF HONG KONG Actuarial Guidance Note 9: Best Estimate Assumptions 1. BACKGROUND AND PURPOSE 1.1 Best estimate assumptions are an essential and important component of actuarial work. The
More informationOracle Insurance Policy Administration System Quality Assurance Testing Methodology. An Oracle White Paper August 2008
Oracle Insurance Policy Administration System Quality Assurance Testing Methodology An Oracle White Paper August 2008 Oracle Insurance Policy Administration System Quality Assurance Testing Methodology
More informationWrestling with Python Unit testing. Warren Viant
Wrestling with Python Unit testing Warren Viant Assessment criteria OCR - 2015 Programming Techniques (12 marks) There is an attempt to solve all of the tasks using most of the techniques listed. The techniques
More informationETL-EXTRACT, TRANSFORM & LOAD TESTING
ETL-EXTRACT, TRANSFORM & LOAD TESTING Rajesh Popli Manager (Quality), Nagarro Software Pvt. Ltd., Gurgaon, INDIA rajesh.popli@nagarro.com ABSTRACT Data is most important part in any organization. Data
More informationBlue Cannon Lead Generation for IFA s
Blue Cannon Lead Generation for IFA s Lead Generation Lead Validation Financial Services Advice Diverse Product Range Tailored Investment Blends Managed Administration Blue Cannon look after all aspects
More informationPragmatic theories 1/15/2010 CHAPTER 2 ACCOUNTING THEORY CONSTRUCTION. Descriptive pragmatic approach: Criticisms of descriptive pragmatic approach:
GODFREY HODGSON HOLMES TARCA CHAPTER 2 ACCOUNTING THEORY CONSTRUCTION Pragmatic theories Descriptive pragmatic approach: based on observed behaviour of accountants theory developed from how accountants
More informationWorking with Expedia. Managing Hotel Collect Reservations
Working with Expedia Managing Hotel Collect Reservations Table of Contents The Hotel Collect Reservation Process 3 Confirm Reservations 4 Reconcile Reservations 6 Invoices and Payments 8 Support 9 2 The
More informationCapital Adequacy: Advanced Measurement Approaches to Operational Risk
Prudential Standard APS 115 Capital Adequacy: Advanced Measurement Approaches to Operational Risk Objective and key requirements of this Prudential Standard This Prudential Standard sets out the requirements
More informationImplement a Data Warehouse with Microsoft SQL Server 20463C; 5 days
Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days Course
More informationSoftware Test Plan (STP) Template
(STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This
More information