Sample Log Analysis in E&A - A Legal Framework

Size: px
Start display at page:

Download "Sample Log Analysis in E&A - A Legal Framework"

Transcription

1 A Formal Framework for Specifying and Analyzing Logs as Electronic Evidence Eduardo Mazza 1, Marie-Laure Potet 1, Daniel Le Métayer 2 LISE Project Funded by the Agence Nationale de la Recherce (ANR-07-SESU-00) (1) Verimag, Grenoble, France (2) INRIA, Grenoble Rhône-Alpes, France

2 Motivation Challenge: to precise legal liability for software Log as digital evidence More and more necessary PROBLEM Actual solutions that define liability are not focused in logs as digital evidence Works in log analysis show little concern in liability Proposal An integrated framework for precisely defining liability and log content as electronic evidence Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

3 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

4 Introduction LISE Project Contract based environment Legal aspects studied in previous works [ICSE 2010] Context: FAULTS CLAIMS LIABILITY Two or more agents signing a legal contract to precise liability for potential claims Contract agreement between the agents Requirements Description of application Claims taken into account covered by the contract Evidence agreement Log content and architecture Log Analyzer Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

5 LISE Approach Two phases Contractual requirements and evidence agreement Analysis - when claims appear Contractual Phase Analysis Phase Generic model Use of the B-method focus on data and behaviour Log Analyzer (attachment in contract) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

6 Assumptions & Key Concepts Distributed system distributed logs Information spread along multiple log files Communication between agents by message exchange Well adapted for B2B applications Logs are grouped by agents A single log file may contain the information of many agents Incremental Analysis would be an advantage Claims may be analyzed in a partial setting of the distributed system Not always possible to immediately obtain all logs Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

7 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

8 Logs How to represent logs? Generic model supporting distributed logs Hypothesis: preserved causality, no loss, no duplication System specification AGENT ACTION Interface : ACTION AGENT Logs and log distributions Event: (Send Rec, AGENT, AGENT, ACTION) Log file: F(AGENT ) iseq(events) Distribution: F(F(AGENT )) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

9 Example of Logs System Specification Possible log distributions {Client}, {Agency}, {Bank}, {Hotel} {Client, Agency}, {Bank}, {Hotel} Possible logs: ({Client, Agency}, [Request Send, Request Rec,... ]) ({Hotel}, [Book Rec, Cancel Rec,... ]) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

10 Claims How to represent the claims? Logs that are concerned by the claim (agents) A precise characterization when the claim is accepted (log property) A claim consists of: A plaintiff (the complaining agent) A defendant A log property If the property holds, then the agent defendant is responsible. Claim: (AGENT AGENT PROP) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

11 Properties Property: F(AGENT ) (LOG FILE BOOL) Distributed setting property for partial distribution 1 Agents concerned with this property Information needed to verify a property 2 Partial function (w.r.t. agents) that maps a log file to TRUE or FALSE IMPORTANT: agents of the property = agents of the log evaluated Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

12 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

13 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

14 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

15 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} 3 val(prop NoRoom ) = λ log.(agents(log) = {Client, Agency} Request Send events(log) Debit Send events(log) Book Send events(log) pos(request Send, log) < pos(debit Send, log)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

16 Example of Claims (claim NoRoom) Client requests a reservation and is charged but there is no reservation: 1 NoRoom CLAIM NoRoom = (Client, Agency, prop NoRoom ) 2 agents(prop NoRoom ) = {Client, Agency} 3 val(prop NoRoom ) = λ log.(agents(log) = {Client, Agency} Request Send events(log) Debit Send events(log) Book Send events(log) pos(request Send, log) < pos(debit Send, log)) Client Agency Bank Hotel Request Justify Debit Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

17 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

18 Log Functions Motivation: Manipulate distributed logs w.r.t. concerned agents Log functions: extract - obtain events in a log concerning a given group of agents merge - provide the set of logs that respect the causal order of events Several possible scenarios Property: extract ags [merge[logs]] merge[extract ags [logs]] Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

19 Example of merge Client Request Agency Cancel log Client log Agency merge[log Client, log Agency ] = {log 1, log 2 } log 1 = ({Client, Agency}, [Request Send, Request Rec, Cancel Send ]) log 2 = ({Client, Agency}, [Request Send, Cancel Send, Request Rec ]) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

20 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

21 Analyzing a claim How to establish if a claims should be accepted or rejected? Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

22 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

23 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

24 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

25 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) 4 Compute the possible set of scenarios where Prop holds. Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

26 Analyzing a claim How to establish if a claims should be accepted or rejected? 1 For a given claim (Plain, Def, Prop) select certain logs that have the information required by Prop (agents(prop) agents(logs)) 2 Merge the selected log files 3 Extract the information required by Prop (agents(prop)) 4 Compute the possible set of scenarios where Prop holds. 5 Interpretation of the results by the judge Two results: Set of all scenarios Set of scenarios where property hold (I) Conclude the investigation accept or reject a claim (II) More data needed Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

27 Log Analyzer Log Analyzer: tool that computes the two results to be interpreted INPUT: logs: set of logs prop: property OUTPUT: scen: all possible scenarios ok: scenarios where the property holds scen, ok Analysis(logs, prop) PRE agents(prop) agents(logs) THEN scen := extract agents(prop) [merge[logs]]; ok := scen val(prop) 1 [{TRUE}] END Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

28 Interpreting the results Depending of the values for scen, ok: Inconclusive results results are not enough to provide the intuition for accepting or rejecting a claim A fine study may be necessary. (incremental analysis) Some definitive conclusive results situations: if scen = ok then claim is accepted if ok = then claim is rejected Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

29 Example of analysis - claim NoRoom (paper Example 8) Client Agency Bank Hotel Request Justify Debit Agency wants to verify if the claim is valid without using Bank s log Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

30 Example of analysis - claim NoRoom (paper Example 8) Client Agency Bank Hotel Request Justify Debit Agency wants to verify if the claim is valid without using Bank s log 3 scenarios: Request Send, Request Rec, Debit Send, Justify Rec Request Send, Request Rec, Justify Rec, Debit Send Request Send, Justify Rec, Request Rec, Debit Send scen = ok claim accepted Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

31 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

32 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

33 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus 1 Compute scen, ok Analysis(logs, prop) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

34 Incremental analysis Inconclusive results may demand more logs to be analyzed Previous results may help in the computation of the new analysis scen, ok Analysis(logs logs, prop) Incremental calculus 1 Compute scen, ok Analysis(logs, prop) 2 iscen, iok IncrAnalysis(logs, prop, scen, ok) iscen := extract[merge[logs scen]] iok := extract[merge[logs ok]] ADVANTAGE: No need to verify the property again ok iok ok scen iscen scen Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

35 Example of incremental Analysis (paper Example 9) (claim LateCancel) Client complain that was charged for a reservation that had been canceled prop LateCancel : agents(prop LateCancel ) = {Client, Agency} Debit Send events(log) Cancel Send events(log) pos(cancel Send, log) < pos(debit Send, log) Client Agency Bank Hotel Request Confirm Justify Debit Cancel Book CancelDebit Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

36 First analysis Client Agency Bank Hotel Request Confirm Justify Debit Cancel Book CancelDebit scen with 20 scenarios ok with 10 scenarios Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

37 Second analysis (incremental) Client Agency Bank Hotel Request Justify Confirm Debit Cancel Book CancelDebit scen with 3 scenarios ok = claim rejected (without property verification!) Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

38 Outline Introduction Logs & Claims Log Functions Log Analyzer Conclusion Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

39 Conclusion Contributions: General framework to precisely decribe claims in terms of logs Specification of a Log Analyzer tool Study of incremental aspects over the acceptability of claims Future works: Parametrized claims and properties Integration with previous works Analysis of log architecture [SEFM 2010] Help adding logs for incremental analysis Formal definition of liability When should a claim be accepted Claim with multiples responsible agents Mazza, Potet, Le Métayer (LISE Project) SBMF / 26

Definitions of Logical Causality for Log Analysis

Definitions of Logical Causality for Log Analysis Definitions of Logical Causality for Log Analysis Gregor Gössler 1 Joint work with Daniel Le Métayer 1 and Jean-Baptiste Raclet 2 1 INRIA Grenoble Rhône-Alpes, France 2 IRIT - CNRS, Toulouse, France Synchron

More information

Constructing a Stable and Verifiable Computer Forensic System

Constructing a Stable and Verifiable Computer Forensic System Constructing a Stable and Verifiable Computer Forensic System Daniel Ayers Elementary Solutions Ltd Auckland, New Zealand Open Source Digital Forensics Conference 2011 Introduction This talk is about validation

More information

Using PI to Exchange PGP Encrypted Files in a B2B Scenario

Using PI to Exchange PGP Encrypted Files in a B2B Scenario Using PI to Exchange PGP Encrypted Files in a B2B Scenario Applies to: SAP Net Weaver Process Integration 7.1 (SAP PI 7.1). For more information, visit the SOA Management homepage. Summary This document

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

Process Document Student Self-Service: Making Credit Card Payments. Making Credit Card Payments. Concept

Process Document Student Self-Service: Making Credit Card Payments. Making Credit Card Payments. Concept Making Credit Card Payments Concept The Campus Finance component of Student Self-Service enables students to access their student bill information and manage their charges and payments. This topic covers

More information

Appendix 1 Assumptions and results of scenarios in the financial sensitivity model

Appendix 1 Assumptions and results of scenarios in the financial sensitivity model Appendix 1 Assumptions and results of scenarios in the financial sensitivity model 1.1 Introduction The financial sensitivity model ( FMS ) was developed to translate the results of the econometric model

More information

Software Active Online Monitoring Under. Anticipatory Semantics

Software Active Online Monitoring Under. Anticipatory Semantics Software Active Online Monitoring Under Anticipatory Semantics Changzhi Zhao, Wei Dong, Ji Wang, Zhichang Qi National Laboratory for Parallel and Distributed Processing P.R.China 7/21/2009 Overview Software

More information

Correlational Research

Correlational Research Correlational Research Chapter Fifteen Correlational Research Chapter Fifteen Bring folder of readings The Nature of Correlational Research Correlational Research is also known as Associational Research.

More information

LEARNING MANAGEMENT SYSTEM MANAGER GUIDE

LEARNING MANAGEMENT SYSTEM MANAGER GUIDE LEARNING MANAGEMENT SYSTEM MANAGER GUIDE Social Work Workforce Development 2 Training Team updated 20-10-14 CONTENTS CONTENTS... 3 MANAGEMENT AREA... 4 VIEW REQUESTS CALENDAR... 4 APPLICANT REQUESTS...

More information

Technical support terms and conditions

Technical support terms and conditions Technical support terms and conditions This AGREEMENT defines the terms and conditions under which ScalAgent Distributed Technologies, hereafter called SCALAGENT, provides the technical support services

More information

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java

StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java StaRVOOrS: A Tool for Combined Static and Runtime Verification of Java Jesús Mauricio Chimento 1, Wolfgang Ahrendt 1, Gordon J. Pace 2, and Gerardo Schneider 3 1 Chalmers University of Technology, Sweden.

More information

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection

Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Runtime Verification - Monitor-oriented Programming - Monitor-based Runtime Reflection Martin Leucker Technische Universität München (joint work with Andreas Bauer, Christian Schallhart et. al) FLACOS

More information

Accountability by Design for Privacy

Accountability by Design for Privacy Accountability by Design for Privacy Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 17 Introduction ICT growth adds to concern about sensitive data use Individuals share more & more PII Stronger

More information

Certification of a Scade 6 compiler

Certification of a Scade 6 compiler Certification of a Scade 6 compiler F-X Fornari Esterel Technologies 1 Introduction Topic : What does mean developping a certified software? In particular, using embedded sofware development rules! What

More information

Industrial Challenges for Content-Based Image Retrieval

Industrial Challenges for Content-Based Image Retrieval Title Slide Industrial Challenges for Content-Based Image Retrieval Chahab Nastar, CEO Vienna, 20 September 2005 www.ltutech.com LTU technologies Page 1 Agenda CBIR what is it good for? Technological challenges

More information

YOUR GUIDE TO THE iphone MOBILE APP WITH 1st SOURCE

YOUR GUIDE TO THE iphone MOBILE APP WITH 1st SOURCE YOUR GUIDE TO THE iphone MOBILE APP WITH 1st SOURCE Strong. Stable. Local. Personal. 10/12 Install, Sign On and View Account Balances 1. Visit the iphone App Store on your iphone and search for 1st Source

More information

Liability and Privacy Issues in Business

Liability and Privacy Issues in Business 1 Interactions between law and computer science: privacy and liability Daniel Le Métayer 2 Multidisciplinary approach Growing intermingling of legal and technological issues: privacy, DRM, liability, electronic

More information

E10: Controlled Experiments

E10: Controlled Experiments E10: Controlled Experiments Quantitative, empirical method Used to identify the cause of a situation or set of events X is responsible for Y Directly manipulate and control variables Correlation does not

More information

Two Flavors in Automated Software Repair: Rigid Repair and Plastic Repair

Two Flavors in Automated Software Repair: Rigid Repair and Plastic Repair Two Flavors in Automated Software Repair: Rigid Repair and Plastic Repair Martin Monperrus, Benoit Baudry Dagstuhl Preprint, Seminar #13061, 2013. Link to the latest version Abstract In this paper, we

More information

Fabio Patrizi DIS Sapienza - University of Rome

Fabio Patrizi DIS Sapienza - University of Rome Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research

More information

Static Taint-Analysis on Binary Executables

Static Taint-Analysis on Binary Executables Static Taint-Analysis on Binary Executables Sanjay Rawat, Laurent Mounier, Marie-Laure Potet VERIMAG University of Grenoble October 2011 Static Taint-Analysis on Binary Executables 1/29 Outline 1 Introduction

More information

Data Warehouse / MIS Testing: Corporate Information Factory

Data Warehouse / MIS Testing: Corporate Information Factory Data Warehouse / MIS Testing: Corporate Information Factory Introduction Data warehouse commonly known as DWH is a central repository of data that is created from several diverse sources. Businesses need

More information

BANK RECONCILIATION 08 MAY 2014

BANK RECONCILIATION 08 MAY 2014 BANK RECONCILIATION 08 MAY 2014 In this lesson we: Lesson Description Focus on Bank Reconciliation Summary In the business world, control of cash is facilitated by depositing cash sales and other receipts

More information

The following are two things that cannot be done with a lead until it has been converted to a prospect or account:

The following are two things that cannot be done with a lead until it has been converted to a prospect or account: Customer Management Work with the Leads Database & Lead Entry The Oasis-CRM Leads Database is quarantined from the main Oasis-CRM accounts and contacts database until they are converted to a prospect or

More information

Information Security Risk Management

Information Security Risk Management Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net

More information

ACH Internal Control Questionnaire

ACH Internal Control Questionnaire ACH Internal Control Questionnaire AUTOMATED CLEARING HOUSE (ACH) Assessment of the Adequacy of Internal Controls Completed by: Date Completed: Quality of Management and Support for ACH Processing Activity

More information

StreamServe Persuasion SP5 Upgrading instructions

StreamServe Persuasion SP5 Upgrading instructions StreamServe Persuasion SP5 Upgrading instructions Reference Guide Rev A Upgrading instructionsstreamserve Persuasion SP5 Reference Guide Rev A 2001-2010 STREAMSERVE, INC. ALL RIGHTS RESERVED United States

More information

HYPOTHESIS TESTING WITH SPSS:

HYPOTHESIS TESTING WITH SPSS: HYPOTHESIS TESTING WITH SPSS: A NON-STATISTICIAN S GUIDE & TUTORIAL by Dr. Jim Mirabella SPSS 14.0 screenshots reprinted with permission from SPSS Inc. Published June 2006 Copyright Dr. Jim Mirabella CHAPTER

More information

(30 September 2004 31 December 2010) SHORT-TERM INSURANCE ACT 53 OF 1998

(30 September 2004 31 December 2010) SHORT-TERM INSURANCE ACT 53 OF 1998 (30 September 2004 31 December 2010) SHORT-TERM INSURANCE ACT 53 OF 1998 (Gazette No. 19277, Notice No. 1191, dated 23 September 1998. Commencement date: 1 January 1999) POLICYHOLDER PROTECTION RULES (SHORT-TERM

More information

General Purpose Database Summarization

General Purpose Database Summarization Table of Content General Purpose Database Summarization A web service architecture for on-line database summarization Régis Saint-Paul (speaker), Guillaume Raschia, Noureddine Mouaddib LINA - Polytech

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

3. The aim of this enhanced service in 2013/14 is to establish patient online access to GP practice information systems as follows:

3. The aim of this enhanced service in 2013/14 is to establish patient online access to GP practice information systems as follows: ENHANCED SERVICE SPECIFICATION IMPROVING PATIENT ONLINE ACCESS Introduction 1. This enhanced service has been designed by the NHS Commissioning Board (NHS CB) to facilitate improvements in the electronic

More information

Software Engineering

Software Engineering Software Engineering Lecture 04: The B Specification Method Peter Thiemann University of Freiburg, Germany SS 2013 Peter Thiemann (Univ. Freiburg) Software Engineering SWT 1 / 50 The B specification method

More information

Recap. Lecture 6. Recap. Jiri Novak, IES UK 1. Accounts Receivable. 6.1 Accounts Receivable

Recap. Lecture 6. Recap. Jiri Novak, IES UK 1. Accounts Receivable. 6.1 Accounts Receivable Lecture 6 Jiri Novak IES, UK 2 Recap Inventories items held for sale (merchandise) or used in manufacturing (raw materials, work in progress, finished goods) specific identification method impractical,

More information

2 business days from the date of K-Cyber Invest registration.

2 business days from the date of K-Cyber Invest registration. How to apply K-Cyber Invest How to apply for K-Cyber Invest There are 2 following ways to apply for K-Cyber Invest; 1. Online registration via K-Cyber Service without any documents (For user who had K-Cyber

More information

Can SAS Enterprise Guide do all of that, with no programming required? Yes, it can.

Can SAS Enterprise Guide do all of that, with no programming required? Yes, it can. SAS Enterprise Guide for Educational Researchers: Data Import to Publication without Programming AnnMaria De Mars, University of Southern California, Los Angeles, CA ABSTRACT In this workshop, participants

More information

BACKING UP A DATABASE

BACKING UP A DATABASE BACKING UP A DATABASE April 2011 Level: By : Feri Djuandi Beginner Intermediate Expert Platform : MS SQL Server 2008, Visual C# 2010 Pre requisites: Suggested to read the first part of this document series

More information

Business Process Modeling

Business Process Modeling Business Process Concepts Process Mining Kelly Rosa Braghetto Instituto de Matemática e Estatística Universidade de São Paulo kellyrb@ime.usp.br January 30, 2009 1 / 41 Business Process Concepts Process

More information

Case 1:13-cv-00796-RPM Document 23 Filed 02/18/14 USDC Colorado Page 1 of 9

Case 1:13-cv-00796-RPM Document 23 Filed 02/18/14 USDC Colorado Page 1 of 9 Case 1:13-cv-00796-RPM Document 23 Filed 02/18/14 USDC Colorado Page 1 of 9 Civil Action No. 13-cv-00796-RPM MICHAEL DAY KEENEY, IN THE UNITED STATES DISTRICT COURT FOR THE DISTRICT OF COLORADO Senior

More information

Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design

Case studies: Outline. Requirement Engineering. Case Study: Automated Banking System. UML and Case Studies ITNP090 - Object Oriented Software Design I. Automated Banking System Case studies: Outline Requirements Engineering: OO and incremental software development 1. case study: withdraw money a. use cases b. identifying class/object (class diagram)

More information

Unified Static and Runtime Verification of Object-Oriented Software

Unified Static and Runtime Verification of Object-Oriented Software Unified Static and Runtime Verification of Object-Oriented Software Wolfgang Ahrendt 1, Mauricio Chimento 1, Gerardo Schneider 2, Gordon J. Pace 3 1 Chalmers University of Technology, Gothenburg, Sweden

More information

Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012

Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 OVERVIEW About this Course Data warehousing is a solution organizations use to centralize business data for reporting and analysis.

More information

Electronic Ticket System

Electronic Ticket System UNIVERSITY OF GEORGIA Electronic Ticket System New Options Available as of January 2010 Insert the complete email address (valid UGA address only) instead of the UGA MyID to send tickets to Approvers.

More information

GENERAL TERMS AND CONDITIONS OF SALE AND USE OF THE DREAMJET WEBSITE

GENERAL TERMS AND CONDITIONS OF SALE AND USE OF THE DREAMJET WEBSITE GENERAL TERMS AND CONDITIONS OF SALE AND USE OF THE DREAMJET WEBSITE Article 1 Subject matter and scope DreamJet SAS is a simplified company limited by shares with a single shareholder, whose registered

More information

IBM BPM V8.5 Standard Consistent Document Managment

IBM BPM V8.5 Standard Consistent Document Managment IBM Software An IBM Proof of Technology IBM BPM V8.5 Standard Consistent Document Managment Lab Exercises Version 1.0 Author: Sebastian Carbajales An IBM Proof of Technology Catalog Number Copyright IBM

More information

Implementing a Data Warehouse with Microsoft SQL Server 2012

Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777A: Implementing a Data Warehouse with Microsoft SQL Server 2012 Length: Audience(s): 5 Days Level: 200 IT Professionals Technology: Microsoft SQL Server 2012 Type: Delivery Method: Course Instructor-led

More information

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007

Model Based Testing for Security Checking. Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Model Based Testing for Security Checking Wissam Mallouli and Prof. Ana Cavalli National Institute of Telecommunications, France November 21, 2007 Outline Introduction Active/Passive Testing Active Testing

More information

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform

Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform PRODUCT DATASHEET Semarchy Convergence for MDM The Next Generation Evolutionary MDM Platform IT MANAGEMENT BENEFITS Get successful on time and budget Start with a tactical solution, build for tomorrow

More information

Federal Judicial Center, 2003 2004 District Court Case-Weighting Study. Appendix V. Data-Cleaning Process

Federal Judicial Center, 2003 2004 District Court Case-Weighting Study. Appendix V. Data-Cleaning Process Appendix V Data-Cleaning Process Included items: 1. Data-Cleaning Process 2. Brief Description of Main Data-Cleaning Programs Blank pages inserted to preserve pagination when printing double-sided copies.

More information

Harmless Advice. Daniel S Dantas Princeton University. with David Walker

Harmless Advice. Daniel S Dantas Princeton University. with David Walker Harmless Advice Daniel S Dantas Princeton University with David Walker Aspect Oriented Programming Aspect Oriented Programming IBM - 2004 IBM reports positive results in aspect-oriented programming experiments

More information

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER

DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER DYNAMIC FUZZY PATTERN RECOGNITION WITH APPLICATIONS TO FINANCE AND ENGINEERING LARISA ANGSTENBERGER Kluwer Academic Publishers Boston/Dordrecht/London TABLE OF CONTENTS FOREWORD ACKNOWLEDGEMENTS XIX XXI

More information

Science, Technology, Engineering & Mathematics Career Cluster

Science, Technology, Engineering & Mathematics Career Cluster Science, Technology, Engineering & Mathematics Career Cluster 1. Apply engineering skills in a project that requires project management, process control and quality assurance. ST 1.1: Apply the skills

More information

East Asia Network Sdn Bhd

East Asia Network Sdn Bhd Course: Analyzing, Designing, and Implementing a Data Warehouse with Microsoft SQL Server 2014 Elements of this syllabus may be change to cater to the participants background & knowledge. This course describes

More information

Formal Modelling and Verification of an Asynchronous Extension of SOAP

Formal Modelling and Verification of an Asynchronous Extension of SOAP Formal Modelling and Verification of an Asynchronous Extension of SOAP Maurice ter Beek FM&&T, ISTI CNR, Pisa, Italy Wednesday 6 December ECOWS 2006 joint work with: Stefania Gnesi and Franco Mazzanti

More information

Vision Document Airline Reservation System

Vision Document Airline Reservation System Vision Document Airline Reservation System Submitted in partial fulfillment of the requirements of the degree of Master of Software Engineering Kaavya Kuppa CIS 895 MSE Project Department of Computing

More information

Implementing a Data Warehouse with Microsoft SQL Server 2012

Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777 : Implementing a Data Warehouse with Microsoft SQL Server 2012 Page 1 of 8 Implementing a Data Warehouse with Microsoft SQL Server 2012 Course 10777: 4 days; Instructor-Led Introduction Data

More information

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS

REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS REQUEST FOR PROPOSAL: A NEW AUDITING SOLUTION FOR WINDOWS FILE AND DATABASE SERVERS Issued: TABLE OF CONTENTS 1. Introduction...3 1.1 Purpose...3 1.2 Background...3 1.3 Scope of Work...3 1.4 Current Infrastructure...3

More information

CRISP-DM: The life cicle of a data mining project. KDD Process

CRISP-DM: The life cicle of a data mining project. KDD Process CRISP-DM: The life cicle of a data mining project KDD Process Business understanding the project objectives and requirements from a business perspective. then converting this knowledge into a data mining

More information

BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin emmanuel.gaudin@pramadev.com

BENEFITS OF MODELING WITH A FORMAL LANGUAGE. Emmanuel Gaudin emmanuel.gaudin@pramadev.com BENEFITS OF MODELING WITH A FORMAL LANGUAGE Emmanuel Gaudin emmanuel.gaudin@pramadev.com PragmaDev French software editor based in Paris Dedicated to the development of RTDS: a modeling and testing tool

More information

6 Project Planning Matrix (PPM) - Overview (in brief)

6 Project Planning Matrix (PPM) - Overview (in brief) COMIT: ZOPP - PPM (Overview) 76 6 Project Planning Matrix (PPM) - Overview (in brief) 6.1 What is a PPM? The PPM provides a one-page summary: Why What How Which How Where a project is carried out (= who/what

More information

A science-gateway workload archive application to the self-healing of workflow incidents

A science-gateway workload archive application to the self-healing of workflow incidents A science-gateway workload archive application to the self-healing of workflow incidents Rafael FERREIRA DA SILVA, Tristan GLATARD University of Lyon, CNRS, INSERM, CREATIS Villeurbanne, France Frédéric

More information

Course Outline. Module 1: Introduction to Data Warehousing

Course Outline. Module 1: Introduction to Data Warehousing Course Outline Module 1: Introduction to Data Warehousing This module provides an introduction to the key components of a data warehousing solution and the highlevel considerations you must take into account

More information

360-FAAR Firewall Analysis, Audit, Repair

360-FAAR Firewall Analysis, Audit, Repair 360º Firewall Analysis Audit and Repair 360 Analytics Ltd. Feature Comparison v1.0 Firewall Analysis, Audit, Repair Release vs Release Feature Comparison General Feature NETWORK AND SERVICE OBJECT AND

More information

The Road from Software Testing to Theorem Proving

The Road from Software Testing to Theorem Proving The Road from Software Testing to Theorem Proving A Short Compendium of my Favorite Software Verification Techniques Frédéric Painchaud DRDC Valcartier / Robustness and Software Analysis Group December

More information

1 - General. 2 - Orders

1 - General. 2 - Orders SCI VALTERRE CHÂTEAU DE VAUX LE VICOMTE ONLINE RESERVATIONS Definitions: In these general terms and conditions (hereinafter referred to as Terms ), the following definitions shall apply: SCI VALTERRE CHÂTEAU

More information

COURSE 20463C: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER

COURSE 20463C: IMPLEMENTING A DATA WAREHOUSE WITH MICROSOFT SQL SERVER Page 1 of 8 ABOUT THIS COURSE This 5 day course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL Server

More information

Implementing a Data Warehouse with Microsoft SQL Server

Implementing a Data Warehouse with Microsoft SQL Server Page 1 of 7 Overview This course describes how to implement a data warehouse platform to support a BI solution. Students will learn how to create a data warehouse with Microsoft SQL 2014, implement ETL

More information

Architectural Patterns: From Mud to Structure

Architectural Patterns: From Mud to Structure DCC / ICEx / UFMG Architectural Patterns: From Mud to Structure Eduardo Figueiredo http://www.dcc.ufmg.br/~figueiredo From Mud to Structure Layered Architecture It helps to structure applications that

More information

ascom Technical White Paper Series Framework for Automatic Fare Collection Systems

ascom Technical White Paper Series Framework for Automatic Fare Collection Systems ascom Technical White Paper Series Framework for Automatic Fare Collection Systems Framework for Automatic Fare Collection Systems Ascom White Paper Series Issue No. 112/1999 Copyright 1999 by Ascom Autelca

More information

ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY

ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY ORACLE ENTERPRISE DATA QUALITY PRODUCT FAMILY The Oracle Enterprise Data Quality family of products helps organizations achieve maximum value from their business critical applications by delivering fit

More information

Advanced Software Engineering ( -Formal specification, verification, transformation, and application-

Advanced Software Engineering ( -Formal specification, verification, transformation, and application- Advanced Software Engineering ( -Formal specification, verification, transformation, and application- Shaoying Liu Faculty of Computer and Information Sciences Hosei Univeresity, Tokyo, Japan Email: sliu@k.hosei.ac.jp

More information

Time Matters and Billing Matters 11.1. User Guide

Time Matters and Billing Matters 11.1. User Guide Time Matters and Billing Matters 11.1 User Guide About this guide This guide provides steps to achieve basic, commonly performed tasks. For additional details, including interface elements and advanced

More information

Online Backup Client 3.12.5.3 Release Notes

Online Backup Client 3.12.5.3 Release Notes December 2008 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights can be derived

More information

Requirement engineering Exercise the POS System solution

Requirement engineering Exercise the POS System solution Requirement engineering Exercise the POS System solution Problem Description A POS (Point-Of-Sale) system is a computer system typically used to manage the sales in retail stores. It includes hardware

More information

Online credit/debit card processing with RBS WorldPay

Online credit/debit card processing with RBS WorldPay Mamut Business Software Introduction Online credit/debit card processing with RBS WorldPay 1 Online credit/debit card processing with RBS WorldPay Contents Online credit/debit card processing with RBS

More information

High Availability for Microsoft Servers

High Availability for Microsoft Servers High Availability for Microsoft Servers Whatever, New York June 2000 1 Agenda Windows 2000 dependability. Tomorrows problems. Microsoft Research/development. 2 Dependability Goal Setting. From the customers

More information

NAB EFTPOS User Guide. for Countertop & Mobile Terminals

NAB EFTPOS User Guide. for Countertop & Mobile Terminals NAB EFTPOS User Guide for Countertop & Mobile Terminals About your NAB EFTPOS Terminal NAB EFTPOS Mobile NAB EFTPOS Countertoptop Table of Contents Getting to know your NAB EFTPOS VeriFone terminal...5

More information

Log Design for Accountability

Log Design for Accountability Log Design for Accountability Denis Butin, Marcos Chicote and Daniel Le Métayer 1 / 18 Background Need for Accountability 2 / 18 Context Background Need for Accountability Data subjects share more & more

More information

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0

SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 SCATS SALES AND CUSTOMER TRACKING SYSTEM SOFTWARE REQUIREMENTS SPECIFICATION VERSION: FINAL 1.0 OCTOBER 28, 2001 REVISION CHART Version Primary Author(s) Description of Version Date Completed Draft Johnny

More information

Help-Operational Guidelines for Online RE-11 & RE-12. Step 1 : Open URL from website Go to http://peso.gov.in/index.aspx Click on Link1 or Link2

Help-Operational Guidelines for Online RE-11 & RE-12. Step 1 : Open URL from website Go to http://peso.gov.in/index.aspx Click on Link1 or Link2 Help-Operational Guidelines for Online RE-11 & RE-12 Step 1 : Open URL from website Go to http://peso.gov.in/index.aspx Click on Link1 or Link2 Step 2 : Login Page will appear for login in online system

More information

Data Analysis Process Is A Multi Risk Process. EuroCACS 2013 Session 211

Data Analysis Process Is A Multi Risk Process. EuroCACS 2013 Session 211 Data Analysis Process Is A Multi Risk Process EuroCACS 2013 Session 211 www.sr-cpa.info 17 September 2013 Content (1) Your lecturer Business processes in the modern world Data Analysis: Definition Why

More information

OnSite: Support and Software Maintenance

OnSite: Support and Software Maintenance OnSite: Support and Software Maintenance Responsible for the content: audeosoft GmbH, Kreuzberger Ring 44a, 65205 Wiesbaden, Germany, hereinafter referred to as audeosoft. (Addendum to Terms of use audeosoft

More information

SCORE An Overview. State of Colorado Registration and Election Management

SCORE An Overview. State of Colorado Registration and Election Management SCORE An Overview State of Colorado Registration and Election Management Table of Contents The Voter Registration Module 3 The Voter Search Module 4 The Voter Merge Module 5 The Batch Scan/Commit Batch

More information

Mortgage Broker Qualifying Standards (MBQS)

Mortgage Broker Qualifying Standards (MBQS) OBJECTIVES A. Compliance and Consumer Protection A1 Recognize the impact of regulation and legislation on the mortgage industry A1.1 Recognize requirements related to financial reporting and other reporting

More information

Expert Systems. A knowledge-based approach to intelligent systems. Intelligent System. Motivation. Approaches & Ingredients. Terminology.

Expert Systems. A knowledge-based approach to intelligent systems. Intelligent System. Motivation. Approaches & Ingredients. Terminology. Motivation Expert Systems A knowledge-based approach to intelligent systems Intelligent System Peter Lucas Department of Information and Knowledge Systems Institute for Computing and Information Sciences

More information

Simulating Investment Portfolios

Simulating Investment Portfolios Page 5 of 9 brackets will now appear around your formula. Array formulas control multiple cells at once. When gen_resample is used as an array formula, it assures that the random sample taken from the

More information

Business Rules. Capitation-based funding. Version 3.9

Business Rules. Capitation-based funding. Version 3.9 Business Rules Capitation-based funding Version 3.9 Citation: Ministry of Health. 2013. Business Rules: Capitation-based funding. Wellington: Ministry of Health. Published in May 2013 by the Ministry of

More information

Software Engineering Reference Framework

Software Engineering Reference Framework Software Engineering Reference Framework Michel Chaudron, Jan Friso Groote, Kees van Hee, Kees Hemerik, Lou Somers, Tom Verhoeff. Department of Mathematics and Computer Science Eindhoven University of

More information

An Oracle White Paper February 2009. Real-time Data Warehousing with ODI-EE Changed Data Capture

An Oracle White Paper February 2009. Real-time Data Warehousing with ODI-EE Changed Data Capture An Oracle White Paper February 2009 Real-time Data Warehousing with ODI-EE Changed Data Capture Executive Overview Today s integration project teams face the daunting challenge of deploying integrations

More information

Actuarial Guidance Note 9: Best Estimate Assumptions

Actuarial Guidance Note 9: Best Estimate Assumptions ACTUARIAL SOCIETY OF HONG KONG Actuarial Guidance Note 9: Best Estimate Assumptions 1. BACKGROUND AND PURPOSE 1.1 Best estimate assumptions are an essential and important component of actuarial work. The

More information

Oracle Insurance Policy Administration System Quality Assurance Testing Methodology. An Oracle White Paper August 2008

Oracle Insurance Policy Administration System Quality Assurance Testing Methodology. An Oracle White Paper August 2008 Oracle Insurance Policy Administration System Quality Assurance Testing Methodology An Oracle White Paper August 2008 Oracle Insurance Policy Administration System Quality Assurance Testing Methodology

More information

Wrestling with Python Unit testing. Warren Viant

Wrestling with Python Unit testing. Warren Viant Wrestling with Python Unit testing Warren Viant Assessment criteria OCR - 2015 Programming Techniques (12 marks) There is an attempt to solve all of the tasks using most of the techniques listed. The techniques

More information

ETL-EXTRACT, TRANSFORM & LOAD TESTING

ETL-EXTRACT, TRANSFORM & LOAD TESTING ETL-EXTRACT, TRANSFORM & LOAD TESTING Rajesh Popli Manager (Quality), Nagarro Software Pvt. Ltd., Gurgaon, INDIA rajesh.popli@nagarro.com ABSTRACT Data is most important part in any organization. Data

More information

Blue Cannon Lead Generation for IFA s

Blue Cannon Lead Generation for IFA s Blue Cannon Lead Generation for IFA s Lead Generation Lead Validation Financial Services Advice Diverse Product Range Tailored Investment Blends Managed Administration Blue Cannon look after all aspects

More information

Pragmatic theories 1/15/2010 CHAPTER 2 ACCOUNTING THEORY CONSTRUCTION. Descriptive pragmatic approach: Criticisms of descriptive pragmatic approach:

Pragmatic theories 1/15/2010 CHAPTER 2 ACCOUNTING THEORY CONSTRUCTION. Descriptive pragmatic approach: Criticisms of descriptive pragmatic approach: GODFREY HODGSON HOLMES TARCA CHAPTER 2 ACCOUNTING THEORY CONSTRUCTION Pragmatic theories Descriptive pragmatic approach: based on observed behaviour of accountants theory developed from how accountants

More information

Working with Expedia. Managing Hotel Collect Reservations

Working with Expedia. Managing Hotel Collect Reservations Working with Expedia Managing Hotel Collect Reservations Table of Contents The Hotel Collect Reservation Process 3 Confirm Reservations 4 Reconcile Reservations 6 Invoices and Payments 8 Support 9 2 The

More information

Capital Adequacy: Advanced Measurement Approaches to Operational Risk

Capital Adequacy: Advanced Measurement Approaches to Operational Risk Prudential Standard APS 115 Capital Adequacy: Advanced Measurement Approaches to Operational Risk Objective and key requirements of this Prudential Standard This Prudential Standard sets out the requirements

More information

Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days

Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days Lincoln Land Community College Capital City Training Center 130 West Mason Springfield, IL 62702 217-782-7436 www.llcc.edu/cctc Implement a Data Warehouse with Microsoft SQL Server 20463C; 5 days Course

More information

Software Test Plan (STP) Template

Software Test Plan (STP) Template (STP) Template Items that are intended to stay in as part of your document are in bold; explanatory comments are in italic text. Plain text is used where you might insert wording about your project. This

More information