A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang

Size: px
Start display at page:

Download "A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang"

Transcription

1 A Faster Way to Temporarily Redirect the Role Based Access Control Workflow Processes Christine Liang ABSTRACT In recent years, many large organizations have used the Role Based Access Control (RBAC) Workflow Management System (WFMS) to manage their daily workflow. It allows the flow of work between individuals and/or departments to be clearly defined and tracked. Some of these workflow processes require human interactions, such as review/approval processes. If the specific reviewers or approvers are temporarily not available, because of sick days, business travel, vacation, etc., then these processes will be stuck in user accounts for days and may cost the company thousands or millions of dollars. This paper introduces a new temporary redirect method Acting and By- Direction, and demonstrates that this method is more efficient than the existing workflow redirect method. Keywords Workflow, Workflow Model, Workflow Management System, WFMS, Role Based Access Control, RBAC, temporary routing path, Flexible Process, Acting and By-Direction 1. INTRODUCTION Workflow Management Systems (WFMS) can be described as a technology that uses electronic systems to manage, monitor, and automate business processes. It allows the flow of work between individuals and/or departments to be clearly defined and tracked. Most of the workflow processes are developed with Role Based Access Control (RBAC) for security purposes [5]. Within a RBAC WFMS, every user is associated with one or more roles. The user s assigned roles indicate to the workflow system this user s privileges level and grants only permitted access to this user [4]. The simple and more understandable roles are often combined with organization roles (positions), departments, divisions, locations and more. Within organizations, and thus in workflow applications, the concept of a hierarchy of people/roles is prevalent. People are placed in one or more units such as department, divisions, or groups and they have different bosses, at different hierarchical levels [5]. There are also role hierarchies and permissions involved in the RBAC WFMS model [2]. Figure 1 shows a typical organizational structure. This structure clearly defines a chain of command (role hierarchies) within the organization, where the top-most role is the first in command, then the next in command is down one level, and so on. Workflow designers can use roles to specify the routing chains for the workflow process types as the example shows in Table 1. Figure 1. Organizational Structure example Table 1. Workflow processes specification example Process Types Routing Chains Employees=>Supervisors=>Managers Timecard Approval =>Time Keeping =>Accounting Employees=>Supervisors=>H.R. Maternity Leave =>Insurance =>Accounting Sick Leave (>5 Employees=>Medical Center days) =>Security=>Supervisors Purchase Order Employees=>Finance=>Purchasing Approval =>Accounting Business Travel Employees=>Supervisors=>Managers Reimbursements =>Finance=>Accounting Employees=>Supervisors=>Managers Educational =>Directors=>H.R.=>Finance Reimbursements Accounting A workflow process type is defined as a unique workflow process identifier that contains a unique routing chain. A routing chain is a list of pre-defined routing paths for a particular workflow process type, with a specific order. There are two basic types of order, sequential and parallel, as shown in Figures 2 and 3 respectively. A routing chain can be designed using sequential order, parallel order or the combination of both. Sequential order allows the workflow process instance to route to one node at a time. Figure 2 demonstrates the transitional states diagram for a sequential order workflow process instance. This instance of a workflow process type strictly follows the routing chain, starting from the first available node, then waiting for a response. If the response is a subset of {rejected, disapproved, timeout}, then the SB2-T1-1

2 workflow process instance stops and reaches an End state. If the response is in the subset of {accepted, approved}, the RBAC WFMS routes the workflow process instance to the next available node. 2. CURRENT WORKFLOW TEMPORARY REDIRECT METHOD In [1], the multi-agent based workflow management system provides some flexibility by guiding the end users to build valid workflow specifications at run time. It distributes the workload to the end users and allows them to redirect their workflow process instances. The workflow designer does not need to be aware of all of the semantics, all services offered by these workflow processes, or all steps or rules involved in the business process. The path can be virtually specified, since the physical path will be determined during the execution of workflow process instances. The creation of such models will still involve analysis of the actual processes in the organization, interviews with the users, etc., but it does not have to be as detailed as in the traditional workflows case. [1] This model provides a redirect method, but also increases the number of operations. Figure 2. Sequential order states graph A routing chain with parallel order allows the RBAC WFMS to route the workflow process instance to all nodes simultaneously. Figure 3 demonstrates the transitional states diagram for the parallel order workflow process instance. This workflow process instance reaches the End state only if all nodes have responded, or if a timeout occurs. For example, a theoretical company that has 10,000 employees is divided into 200 departments. Each department has about fifty people and three or four divisions. Supervisors are the division heads and managers are the department heads. In order for employees to get their paychecks, they are required to submit a timecard for approval each week. According to company policy, timecards have to be approved by a list of authorized personnel as shown in Table 2. Timecards are due before 2:00 p.m. every Monday. Late timecards are deferred to the next week. Table 2. Timecard Approval Personnel Example Sequence number Description 1 Submitter => any employee 2 Approver 1 => supervisor 3 Approver 2 => manager 4 Approver 3 => human resource 5 Approver 4 => time keeping 6 Approver 5 => accounting department Figure 3. Parallel order states graph Regardless of which order the routing chain follows, if one node is temporarily not available, then the workflow process instance is stuck until it reaches the timeout limit. Once the timeout occurs, the workflow process instance ends as incomplete. The end users have to resubmit the workflow process in order to complete the work. The existing workflow system provides a temporary redirect method described in Section 2. Section 3 introduces the new temporary redirect method. Section 4 demonstrates that the new redirect method is more efficient than the existing temporary redirect method. Section 5 discusses some related work. Section 6 concludes the paper and suggests future work. In this example, the workflow designers create a workflow process type: timecard approval process. This workflow process type has a unique sequential routing chain as shown in Table 2. During runtime, as soon as an employee submits a timecard approval process, a timecard approval process instance is created. Each workflow process instance has its individual routing path instance. The RBAC WFMS uses the submitter s information and follows the routing chain to determine the routing path for the particular workflow process instance. In this case, the RBAC WFMS uses the submitter s department and division to find the submitter s supervisor and routes the timecard approval process instance to the supervisor. Once the submitter s supervisor approves the timecard, the RBAC WFMS then uses the supervisor s information to find the appropriate manager, and so on. Since there are 200 departments and each department has three to four supervisors, there are a total of 600 to 800 supervisors and 200 managers. There is a good chance that one or more supervisors or managers will be temporarily out of the office. Assume that Department 001 s manager is on a business trip for two weeks. During these two weeks, Employee X is acting as SB2-T1-2

3 the manager of Department 001 for everyday business needs. However, the RBAC WFMS has no way to know that the manager of Department 001 is on travel, since he is a valid user in the system. According to the existing workflow redirect method [1], the end users (employees) can change the routing path for their workflow process instance at runtime. To complete the timecard approval process on time, all department 001 employees (about 50 of them) have to manually change their routing path to Employee X for every process instance. The total number of affected process instances for one workflow process type (timecard approval process) is: 50 process instances x 2 weeks = 100 process instances. End users must manually make the same routing path changes 100 times. If it takes at least one operation to change one workflow process instance s routing path, then 100 process instances require at least 100 operations to change the process instance s routing path. This example does not include Department 001 manager s involvement in other typical workflow process types (sick leave approval process, travel reimbursement process, educational reimbursement process, purchase requisition process, etc.). There could be hundreds or thousands of workflow process instances affected by this one person. Thus, the existing workflow redirect method requires at lease n operations (OP) to redirect n workflow process instances (WFPI). 3. THE NEW TEMPORARY REDIRECT METHOD: ACTING AND BY-DIRECTION This section introduces the Acting and By-Direction redirect method. The basic approach is to provide the temporary routing path before runtime. The key idea is to allow the unavailable node to specify a temporary substitute node to perform its duty. For instance, in the timecard approval example, if the RBAC WFMS allows the Department 001 manager to assign Employee X as his temporary substitute before he leaves, then all of his employees timecards will be automatically routed to Employee X. In fact, his employees do not need to perform any extra operation to change the instances of the routing chain for their timecards. Furthermore, when he returns from the trip, he can remove the temporary substitution. This new method, Acting and By-Direction, significantly reduces the total number of operations for redirecting the workflow process instances. Acting and By-direction can be described as authorization (permission) delegation. A delegator (a user or role that originally owns a set of permissions) authorizes a chosen person or role (the delegatee) to temporarily perform the workflow activities.. During the delegation, the delegator remains the authority to remove the delegation. There are two types of delegations possible in the RBAC Acting and By-Direction WFMS model: Acting A delegator (role/user) assigns all delegator s permissions to a specific delegatee (role/user). By-Direction A delegator (role/user) assigns a delegator s permission to a delegatee (role/user) for a specific workflow process. These Acting and By-Direction assignments are made before the workflow process instances are generated. During execution, the RBAC WFMS finds the delegatees and routes the workflow process instances to them. 3.1 Acting Assignments Acting assignment is a temporary assignment to an Actingdelegatee from the unavailable Acting-delegator. The Actingdelegatee temporarily takes over all the workflow process instances assignments from the unavailable Acting-delegator. As soon as an Acting assignment is initiated, all workflow process instances that are currently in the Acting-delegator s account are routed to the Acting-delegatee. In addition, any future workflow process instances generated during this Acting assignment period will also be routed to the Acting-delegatee. These temporarily redirected workflow process instances are known as Actinginstances. The RBAC WFMS tracks every workflow process Acting-instance and its history. When the Acting assignment is removed, all Acting-instances revert to the state they were in before the Acting assignment occurred Requirements for Acting Assignment Authorized users who have privileges to initiate Acting assignments are the Acting-delegators or workflow administrators. There is only one Acting assignment for one Acting-delegator. If the Acting-delegators are not available to authorize the Acting assignment, a workflow administrator should be able to initiate the Acting assignment for them. An Acting-delegator is permitted to assign only one Acting assignment. If they want to initiate another acting assignment, they have to remove the current Acting assignment first, and then reassign the Acting assignment. An Acting-delegatee can be defined as either a single user or a unique role. An Acting-delegatee must be different than the Acting-delegator. Furthermore, the Acting assignment permits a recursive relationship to enhance flexibility. As a result, a delegator can also be a delegatee for other acting assignments. Table 3 lists four different Acting assignments. Since recursive relationships are permitted, the final Acting-delegatee for User001 is User005 instead of User002. The RBAC WFMS routes all User001 workflow process instances to User005 instead of User002. Actually, in this example, all Acting-delegators (User001, User003, User002 and User004) have Acting assignments that point to the same final Acting-delegatee: User005. Therefore, all workflow processes instances for these Acting-delegators are eventually routed to User005. Table 3. Recursive Acting Assignments Example A Acting ID Acting-Delegators Acting-Delegatees 1 User001 User002 2 User003 User004 3 User002 User003 4 User004 User005 Example B (shown in Table 4) computes the same result as Example A: all Acting assignments are delegated to User005. SB2-T1-3

4 However, there are differences between these two examples. The key difference is that the Acting assignment in Example A indirectly delegates all the workflow process instances to User005. Example B directly assigns all the workflow process instances to User005. Each Acting assignment is an individual event, and can be removed at any time. If the Acting ID 2 assignment is removed from both examples A and B at the same time, then the resulting routing paths are different. In example A, both User001 and User002 are routed to User003 instead of User005; only User004 remains unchanged. In example B, all Acting-delegatees remain the same. Table 4. Recursive Acting Assignments Example B Acting ID Acting-Delegators Acting-Delegatees 1 User001 User005 2 User003 User005 3 User002 User005 4 User004 User By-Direction Assignments By-Direction assignments are similar to Acting assignments. The major distinction is that a By-Direction assignment only affects one specific workflow process type, whereas an Acting assignment affects all workflow process types associated with the delegator. Each By-Direction assignment must have a process type associated with it Requirements for By-Direction Assignment The authorized users who have the privileges to initiate By- Direction assignments are the By-Direction-delegators or workflow administrators. To initiate the By-Direction assignment, the By-Direction-delegator is required to select a workflow process type. In addition, the By-Direction-delegator must belong to the routing chain of the selected workflow process type. The By-Direction-delegator is permitted to assign only one By-Direction assignment for a workflow process type. Similar to the Acting requirements, a By-Direction-delegatee can also be defined as either a single user or a unique role. The By- Direction-delegatee must be different than the By-Directiondelegator within the same workflow process type. Furthermore, the By-Direction assignment permits a recursive relationship to enhance flexibility. As a result, a delegator can also be a delegatee from other By-Direction assignments for the identical workflow process type. Table 5 shows a recursive relationship from User003 (By-Direction ID 2) to User005 (By- Direction ID 4) for the Process Type ID BBX3. The RBAC WFMS routes all User003 s workflow process instances that are related to BBX3 to User005. Table 5. By-Direction Assignments Example By-Direction ID Process Type ID By-Direction Delegators By-Direction Delegatees 1 A001 User001 User002 2 BBX3 User003 User CC User002 User003 4 BBX3 User004 User005 5 BBX4 User002 User Combination of Acting and By-Direction Acting assignment is best if the delegator wants all workflow process types under his/her account temporarily transferred to another user/role. By-Direction assignment is best if only a few workflow process types need to be temporarily handled by someone else. Combining Acting and By-Direction assignments means that all temporarily redirected assignments can be accomplished under any circumstance Requirements for Acting and By-Direction Assignments By-Direction assignment always has a higher priority than Acting assignment. This means that if there is a By-Direction assignment and an Acting assignment for the same workflow process instance, the WFMS always accepts the By-Direction assignment and ignores the Acting assignment. When combining Acting and By-Direction assignments, two requirements from Sections and must be modified to avoid a circular relationship (endless loop): An Acting-delegatee must be different than the Actingdelegators and the By-Direction-delegators. The By-Direction-delegatee must be different than the By-Direction-delegators within the same workflow process type and the Acting-delegators. Figure 4 shows an example of Acting and By-Direction assignments. In this example, there are two By-Direction assignments (B1 and B2) and four Acting assignments (A1, A2, A3 and A4). B2 and A2 have the same delegator but different delegatees. So, when employees from department 021, division 011 start the RC_WPT_1 workflow process instances, the RBAC WFMS will find A2 and route the workflow process instances to the supervisor of department 021, division 012. If the same group of employees starts the RC_WPT_2 workflow process instances, the RBAC WFMS will use B2 instead of A2 and route the workflow process instances to the manager of department 021. Figure 4 Examples of Acting and By-Direction Assignments SB2-T1-4

5 3.4 Integrate with the RBAC WFMS Engine So far, we have presented the Acting and By-Direction redirect method and defined the Acting and By-Direction assignments. It is also necessary for the RBAC WFMS engine to recognize the Acting and By-Direction assignments and use them. In general, the RBAC WFMS engine routing process is described in following steps. 1. Submitter (end user) starts workflow process instance; 2. WFMS finds next_user based on the routing chain; 3. WFMS routes the process instance to next_user; 4. For parallel order, repeat steps 2 and 3 until the end of the routing chain is reached, then wait for all users responses. If all responses or a timeout is received, go to step 8. For sequential order, go to step 5; 5. Wait for user response; 6. If response is in the subset of {Accepted, Approved}, then go to step 7; 7. Check to see whether this is the last user in the routing chain. If yes, go to step 8; else go to step 2; 8. End the workflow process instance. The Acting and By-Direction functions can be inserted between steps 2 and 3 to find the actual routing path. Figure 5 shows the high-level Acting and By-Direction function. Figure 5. Acting and By-Direction Function As shown in step 2, the RBAC WFMS uses the routing chain to find the next user. This step is a required step for any existing RBAC WFMS. As soon as the next user is found, the Acting and By-Direction function is activated. The Acting and By-Direction function checks if a By-Direction assignment exists. If yes, it finds the By-Direction delegatee, replaces the next user with the By-Direction delegatee and continues with step 3. However, if no By-Direction assignment exists, it checks if there is an Acting assignment for the next user. If yes, it replaces the next user with the Acting-delegatee; else, the next user remains the same as it was in step 2. Using this technique, the RBAC WFMS engine always checks for Acting and By-Direction before it routes to the next user. Whether Acting and By-Direction assignments exist or not, the RBAC WFMS engine structure never changes. 4. COMPARING THE ACTING AND BY- DIRECTION METHOD TO THE EXISTING METHOD The scope of this paper includes proving that the Acting and By- Direction method is a faster way to temporarily redirect the RBAC workflow process. To determine if it is faster, the number of operations (OPs) used by the current redirect method (current) is compared to the Acting and By-Direction redirect method (new). We assume the following are valid: node Na within the routing chain of a workflow process type is temporarily unavailable for a period of time t. During t, node Nb will be temporarily substituted for Na. Within t, there are n workflow process instances (WFPIs) being generated and routed to Nb. Then the following is valid: new: since within t means from t_start until t_end, therefore 1 OP to generate Acting and By-Direction assignment at t_start + 1 OP to remove Acting and By-Direction assignment at t_end Total = 2 OPs from t_start to t_end current: Thus, the current workflow redirect method requires at lease n operations (OPs) to redirect n workflow process instances (WFPI). (from Section 2) Result: new: n WFPIs require 2 OPs to redirect n WFPIs from Na to Nb within t current: n WFPIs require n OPs to redirect n WFPIs from Na to Nb within t 5. RELATED WORK Many research projects [7, 8, 9, 10] are also focused on increasing the flexibility of the workflow management system. Combi and Pozzi [3] propose a workflow system that manages temporal aspects via a temporal database system, composed of a temporal layer on top of a relational DBMS. The adoption of a temporal database system will increase efficiency by allowing some additional features, such as the management of process model evolution and the selection of executing agents via a workload balance over time. Performance issues related to routing design are addressed in [6], which establishes a new routing control algorithm, Adaptive Routing Control (ARC), to find the efficient and flexible path of workflow. 6. CONCLUSION Using the result from Section 4, we can conclude that Acting and By-Direction is n/2 times faster than the current workflow redirect method when n>2. There is no way to determine the exact number of workflow process instances (n) that will be affected by the delegator before runtime. The worse case is that no workflow process instance is affected by the delegator. In that case, the Acting and By-Direction redirect method wastes two extra operations. That is a fairly small number compared to everyday flow of work between individuals. SB2-T1-5

6 In the near future, our interests are to make the Acting and By- Direction redirect method an independent, add-on workflow component. The focus will be the compatibility with the existing popular workflow management systems. It will increase the flexibility of all workflow management systems. Acting and By- Direction can be used in combination with the existing workflow redirect method. 7. REFERENCES [1] Deng, S.G., Yu, Z., Wu, Z.H., and Huang, L.C., Database theory, technology and applications (DTTA): Enhancement of workflow flexibility by composing activities at run-time, Proceedings of the 2004 ACM symposium on Applied computing, Mar [2] Botha, R.A., Eloff, J.H.P., Designing role hierarchies for access control in workflow systems, Computer Software and Applications Conference, PP , Oct [3] Combi, C., Pozzi, G., Database theory, technology and applications (DTTA): Architectures for a temporal workflow management system, Proceedings of the 2004 ACM symposium on Applied Computing, Mar [4] Dridi, F., Muschall, B., and Pernul, G., Administration of BBAC System, 2004 Big Island, Hawaii p. Proceedings of the 37th Annual Hawaii International Conference on System Sciences (HICSS'04) - Track 7, 70187b, Jan [5] Chaari, S., Biennier, F., Ben Amar, C., and Favrel, J., An authorization and access control model for workflow, First International Symposium on Control, Communications and Signal Processing, PP , [6] Yang, S.J., Design issues and performance improvements in routing strategy on the internet workflow, International Journal of Network Management, Vol. 13 Issue 5, Sept [7] Iwaihara, M., Jiang, H., and Kambayashi, Y., Organizational engineering (OE): An integrated model of workflows, e-contracts and solution implementation, Proceedings of the 2004 ACM symposium on Applied computing, Mar [8] Wainer, J., Bezerra, F., and Barthelmess, P., Coordination models, languages and applications (CM): Tucupi: a flexible workflow system based on overridable constraints, Proceedings of the 2004 ACM symposium on Applied computing, Mar [9] Zirpins, C., Lamersdorf, W., and Baier, T., Service composition: Flexible coordination of service interaction patterns, Proceedings of the 2nd international conference on Service oriented computing, Nov [10] Chinn, S., and Madey, G., Temporal representation and reasoning for workflow in engineering design change review Engineering Management, IEEE Transactions on Engineering Management, Volume: 47, Issue: 4, PP: , Nov SB2-T1-6

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

Managing Approvals in Expenses. Understanding Approvals

Managing Approvals in Expenses. Understanding Approvals Managing Approvals in Expenses Managers are often the approvers for expense transactions. The major concerns of a manager would typically include policy compliance and fiscal responsibility. Managers may

More information

CS 565 Business Process & Workflow Management Systems

CS 565 Business Process & Workflow Management Systems CS 565 Business Process & Workflow Management Systems Professor & Researcher Department of Computer Science, University of Crete & ICS-FORTH E-mail: dp@csd.uoc.gr, kritikos@ics.forth.gr Office: K.307,

More information

Click one of the links below to navigate to the corresponding section: General. Employee Related Questions Manager Related Questions

Click one of the links below to navigate to the corresponding section: General. Employee Related Questions Manager Related Questions Click one of the links below to navigate to the corresponding section: General General Employee Related Questions Manager Related Questions What is the process for completing and submitting absence requests

More information

Approvals Management Engine R12 (AME) Demystified

Approvals Management Engine R12 (AME) Demystified Approvals Management Engine R12 (AME) Demystified By Sujay Kamath Prisio Technologies Introduction In today s world, many organizations are in need of implementing proper controls in place for faster transaction

More information

Distributed Dynamic Load Balancing for Iterative-Stencil Applications

Distributed Dynamic Load Balancing for Iterative-Stencil Applications Distributed Dynamic Load Balancing for Iterative-Stencil Applications G. Dethier 1, P. Marchot 2 and P.A. de Marneffe 1 1 EECS Department, University of Liege, Belgium 2 Chemical Engineering Department,

More information

Process Automation in Semiconductor Manufacturing: Issues and Solutions

Process Automation in Semiconductor Manufacturing: Issues and Solutions Process Automation in Semiconductor Manufacturing: Issues and Solutions Nauman Chaudhry, James Moyne, and Elke A. Rundensteiner Department of Electrical Engineering and Computer Science University of Michigan,

More information

Component visualization methods for large legacy software in C/C++

Component visualization methods for large legacy software in C/C++ Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University mcserep@caesar.elte.hu

More information

Workflow Management Standards & Interoperability

Workflow Management Standards & Interoperability Management Standards & Interoperability Management Coalition and Keith D Swenson Fujitsu OSSI kswenson@ossi.com Introduction Management (WfM) is evolving quickly and expolited increasingly by businesses

More information

Dependability in Web Services

Dependability in Web Services Dependability in Web Services Christian Mikalsen chrismi@ifi.uio.no INF5360, Spring 2008 1 Agenda Introduction to Web Services. Extensible Web Services Architecture for Notification in Large- Scale Systems.

More information

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02)

So today we shall continue our discussion on the search engines and web crawlers. (Refer Slide Time: 01:02) Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #39 Search Engines and Web Crawler :: Part 2 So today we

More information

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book.

1.. This UI allows the performance of the business process, for instance, on an ecommerce system buy a book. * ** Today s organization increasingly prompted to integrate their business processes and to automate the largest portion possible of them. A common term used to reflect the automation of these processes

More information

Task Placement in a Cloud with Case-based Reasoning

Task Placement in a Cloud with Case-based Reasoning Task Placement in a Cloud with Case-based Reasoning Eric Schulte-Zurhausen and Mirjam Minor Institute of Informatik, Goethe University, Robert-Mayer-Str.10, Frankfurt am Main, Germany {eschulte, minor}@informatik.uni-frankfurt.de

More information

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING

AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING AN ADAPTIVE DISTRIBUTED LOAD BALANCING TECHNIQUE FOR CLOUD COMPUTING Gurpreet Singh M.Phil Research Scholar, Computer Science Dept. Punjabi University, Patiala gurpreet.msa@gmail.com Abstract: Cloud Computing

More information

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud

Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Implementation of Role Based Access Control on Encrypted Data in Hybrid Cloud Gajanan Ganorkar, Prof. A.B. Deshmukh, Prof M.D.Tambhakhe Information Technology Email:g.ganorkar7691@gmail.com Contact: 8600200142

More information

Business Process Management with @enterprise

Business Process Management with @enterprise Business Process Management with @enterprise March 2014 Groiss Informatics GmbH 1 Introduction Process orientation enables modern organizations to focus on the valueadding core processes and increase

More information

Personalized e-learning a Goal Oriented Approach

Personalized e-learning a Goal Oriented Approach Proceedings of the 7th WSEAS International Conference on Distance Learning and Web Engineering, Beijing, China, September 15-17, 2007 304 Personalized e-learning a Goal Oriented Approach ZHIQI SHEN 1,

More information

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS

MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS MODEL DRIVEN DEVELOPMENT OF BUSINESS PROCESS MONITORING AND CONTROL SYSTEMS Tao Yu Department of Computer Science, University of California at Irvine, USA Email: tyu1@uci.edu Jun-Jang Jeng IBM T.J. Watson

More information

Attack graph analysis using parallel algorithm

Attack graph analysis using parallel algorithm Attack graph analysis using parallel algorithm Dr. Jamali Mohammad (m.jamali@yahoo.com) Ashraf Vahid, MA student of computer software, Shabestar Azad University (vahid.ashraf@yahoo.com) Ashraf Vida, MA

More information

16.1 MAPREDUCE. For personal use only, not for distribution. 333

16.1 MAPREDUCE. For personal use only, not for distribution. 333 For personal use only, not for distribution. 333 16.1 MAPREDUCE Initially designed by the Google labs and used internally by Google, the MAPREDUCE distributed programming model is now promoted by several

More information

SigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014

SigMo Platform based approach for automation of workflows in large scale IT-Landscape. Tarmo Ploom 2/21/2014 SigMo Platform based approach for automation of workflows in large scale IT-Landscape 2/21/2014 Agenda Starting situation Problem Solution variants Friction of project based approach Platform approach

More information

Microsoft Dynamics GP Release. Workflow Administrator s Guide

Microsoft Dynamics GP Release. Workflow Administrator s Guide Microsoft Dynamics GP Release Workflow Administrator s Guide December 10, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?

Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,

More information

Load Balancing on a Grid Using Data Characteristics

Load Balancing on a Grid Using Data Characteristics Load Balancing on a Grid Using Data Characteristics Jonathan White and Dale R. Thompson Computer Science and Computer Engineering Department University of Arkansas Fayetteville, AR 72701, USA {jlw09, drt}@uark.edu

More information

The Virtual Assistant for Applicant in Choosing of the Specialty. Alibek Barlybayev, Dauren Kabenov, Altynbek Sharipbay

The Virtual Assistant for Applicant in Choosing of the Specialty. Alibek Barlybayev, Dauren Kabenov, Altynbek Sharipbay The Virtual Assistant for Applicant in Choosing of the Specialty Alibek Barlybayev, Dauren Kabenov, Altynbek Sharipbay Department of Theoretical Computer Science, Eurasian National University, Astana,

More information

SUGGEST AN INTELLIGENT FRAMEWORK FOR BUILDING BUSINESS PROCESS MANAGEMENT

SUGGEST AN INTELLIGENT FRAMEWORK FOR BUILDING BUSINESS PROCESS MANAGEMENT SUGGEST AN INTELLIGENT FRAMEWORK FOR BUILDING BUSINESS PROCESS MANAGEMENT Almutairi Raed, Dr. Djamal Ziani Department of Information Systems College of Computers and Information Sciences King Saud University,

More information

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova

COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova COMPUTER AUTOMATION OF BUSINESS PROCESSES T. Stoilov, K. Stoilova Computer automation of business processes: The paper presents the Workflow management system as an established technology for automation

More information

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences

CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences CONFIOUS * : Managing the Electronic Submission and Reviewing Process of Scientific Conferences Manos Papagelis 1, 2, Dimitris Plexousakis 1, 2 and Panagiotis N. Nikolaou 2 1 Institute of Computer Science,

More information

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling

High-Mix Low-Volume Flow Shop Manufacturing System Scheduling Proceedings of the 14th IAC Symposium on Information Control Problems in Manufacturing, May 23-25, 2012 High-Mix Low-Volume low Shop Manufacturing System Scheduling Juraj Svancara, Zdenka Kralova Institute

More information

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA

SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA SEMANTIC WEB BASED INFERENCE MODEL FOR LARGE SCALE ONTOLOGIES FROM BIG DATA J.RAVI RAJESH PG Scholar Rajalakshmi engineering college Thandalam, Chennai. ravirajesh.j.2013.mecse@rajalakshmi.edu.in Mrs.

More information

Journal of Information Technology Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION ABSTRACT

Journal of Information Technology Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION ABSTRACT Journal of Information Technology Management ISSN #1042-1319 A Publication of the Association of Management SIGNS OF IT SOLUTIONS FAILURE: REASONS AND A PROPOSED SOLUTION MAJED ABUSAFIYA NEW MEXICO TECH

More information

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments

Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Analysis of Issues with Load Balancing Algorithms in Hosted (Cloud) Environments Branko Radojević *, Mario Žagar ** * Croatian Academic and Research Network (CARNet), Zagreb, Croatia ** Faculty of Electrical

More information

A Business Process Driven Approach for Generating Software Modules

A Business Process Driven Approach for Generating Software Modules A Business Process Driven Approach for Generating Software Modules Xulin Zhao, Ying Zou Dept. of Electrical and Computer Engineering, Queen s University, Kingston, ON, Canada SUMMARY Business processes

More information

TRANSMAT Trusted Operations for Untrusted Database Applications

TRANSMAT Trusted Operations for Untrusted Database Applications TRANSMAT Trusted Operations for Untrusted Database s Dan Thomsen Secure Computing Corporation 2675 Long Lake Road Roseville, MN 55113, USA email: thomsen@sctc.com Abstract This paper presents a technique

More information

Role-based access control. RBAC: Motivations

Role-based access control. RBAC: Motivations Role-based access control 1 RBAC: Motivations Complexity of security administration For large number of subjects and objects, the number of authorizations can become extremely large For dynamic user population,

More information

IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS

IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS IDENTIFYING PATTERNS OF WORKFLOW DESIGN RELYING ON ORGANIZATIONAL STRUCTURE ASPECTS Lucinéia Heloisa Thom, Cirano Iochpe Instituto de Informática, Universidade Federal do Rio Grande do Sul, Av.Bento Conçalves,

More information

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE

Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Enhanced concept of the TeamCom SCE for automated generated services based on JSLEE Thomas Eichelmann 1, 2, Woldemar Fuhrmann 3, Ulrich Trick 1, Bogdan Ghita 2 1 Research Group for Telecommunication Networks,

More information

Service Level Agreements based on Business Process Modeling

Service Level Agreements based on Business Process Modeling Service Level Agreements based on Business Process Modeling Holger Schmidt Munich Network Management Team University of Munich, Dept. of CS Oettingenstr. 67, 80538 Munich, Germany Email: schmidt@informatik.uni-muenchen.de

More information

SIMS 255 Foundations of Software Design. Complexity and NP-completeness

SIMS 255 Foundations of Software Design. Complexity and NP-completeness SIMS 255 Foundations of Software Design Complexity and NP-completeness Matt Welsh November 29, 2001 mdw@cs.berkeley.edu 1 Outline Complexity of algorithms Space and time complexity ``Big O'' notation Complexity

More information

Contents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product.

Contents. Note: Feature commands and/or functionality may vary dependent on the telephone equipment you choose to use with this product. Contents Address Book 4 Anonymous Call Rejection 5 Call Block 5 Call Forward 6-7 Call Hold 7 Call Log 8 Call Return 8 Call Waiting 9 Caller ID 10 Outbound Caller ID Block 10 Outbound Caller ID Deactivation

More information

How To Balance A Single Failure With A Single Power Of Two (Sus)

How To Balance A Single Failure With A Single Power Of Two (Sus) Ranking Service Units for Providing and Protecting Highly Available Services with Load Balancing A. Kanso, F. Khendek, A. Hamou-Lhadj Electrical and Computer Engineering Department Concordia University

More information

The Role of Computers in Synchronous Collaborative Design

The Role of Computers in Synchronous Collaborative Design The Role of Computers in Synchronous Collaborative Design Wassim M. Jabi, The University of Michigan Theodore W. Hall, Chinese University of Hong Kong Abstract In this paper we discuss the role of computers

More information

Cassandra A Decentralized, Structured Storage System

Cassandra A Decentralized, Structured Storage System Cassandra A Decentralized, Structured Storage System Avinash Lakshman and Prashant Malik Facebook Published: April 2010, Volume 44, Issue 2 Communications of the ACM http://dl.acm.org/citation.cfm?id=1773922

More information

Business-Driven Software Engineering Lecture 3 Foundations of Processes

Business-Driven Software Engineering Lecture 3 Foundations of Processes Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster jku@zurich.ibm.com Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary

More information

Development of Content Management System with Animated Graph

Development of Content Management System with Animated Graph Development of Content Management System with Animated Graph Saipunidzam Mahamad, Mohammad Noor Ibrahim, Rozana Kasbon, and Chap Samol Abstract Animated graph gives some good impressions in presenting

More information

Role Based Encryption with Efficient Access Control in Cloud Storage

Role Based Encryption with Efficient Access Control in Cloud Storage Role Based Encryption with Efficient Access Control in Cloud Storage G. V. Bandewar 1, R. H. Borhade 2 1 Department of Information Technology, Sinhgad Technical Education Society s SKNCOE, Pune, India

More information

On the Security of Delegation in Access Control Systems

On the Security of Delegation in Access Control Systems On the Security of Delegation in Access Control Systems Qihua Wang, Ninghui Li, and Hong Chen Department of Computer Science, Purdue University {wangq, ninghui, chen131}@cs.purdue.edu Abstract. Delegation

More information

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD

IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Journal homepage: www.mjret.in ISSN:2348-6953 IMPROVING BUSINESS PROCESS MODELING USING RECOMMENDATION METHOD Deepak Ramchandara Lad 1, Soumitra S. Das 2 Computer Dept. 12 Dr. D. Y. Patil School of Engineering,(Affiliated

More information

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage

A Brief Analysis on Architecture and Reliability of Cloud Based Data Storage Volume 2, No.4, July August 2013 International Journal of Information Systems and Computer Sciences ISSN 2319 7595 Tejaswini S L Jayanthy et al., Available International Online Journal at http://warse.org/pdfs/ijiscs03242013.pdf

More information

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar

Complexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples

More information

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR

REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR REQUIREMENTS FOR THE WORKFLOW-BASED SUPPORT OF RELEASE MANAGEMENT PROCESSES IN THE AUTOMOTIVE SECTOR Ulrich Bestfleisch, Joachim Herbst DaimlerChrysler AG Research and Technology Data and Process Management

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows

Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents

More information

A logical approach to role-based access control in a distributed environment

A logical approach to role-based access control in a distributed environment A logical approach to role-based access control in a distributed environment Université Paul Sabatier, IRIT COPS - February 2008 Motivation Express access control policies in distributed systems. Take

More information

Issues in Information Systems Volume 15, Issue I, pp. 52-60, 2014

Issues in Information Systems Volume 15, Issue I, pp. 52-60, 2014 ORGANIZATIONALLY AGNOSTIC BUSINESS MODELING: HOW TO MAKE BUSINESS ARCHITECTURE ADAPTABLE TO ORGANIZATIONAL CHANGE Carlos E. Martinez, The MITRE Corporation, cmartinez@mitre.org Sheila A. Cane, The MITRE

More information

Fleet Size and Mix Optimization for Paratransit Services

Fleet Size and Mix Optimization for Paratransit Services Fleet Size and Mix Optimization for Paratransit Services Liping Fu and Gary Ishkhanov Most paratransit agencies use a mix of different types of vehicles ranging from small sedans to large converted vans

More information

Process Modeling and Process Improvement. Process Modeling

Process Modeling and Process Improvement. Process Modeling Process Modeling and Process Improvement Process Modeling Business processes are complex, and require people with various skills and abilities to work in a cooperative fashion Processes will not be efficient

More information

Automated QoS Support for Multimedia Disk Access

Automated QoS Support for Multimedia Disk Access Automated QoS Support for Multimedia Disk Access Joel C. Wu, Scott Banachowski, and Scott A. Brandt Computer Science Department, University of California, Santa Cruz ABSTRACT This paper describes the AutoQoS

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015

www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle PwC Partner March 2015 www.pwc.com Understanding ERP Architectures, Security and Risk Brandon Sprankle Partner Agenda 1. Introduction 2. Overview of ERP security architecture 3. Key ERP security models 4. Building and executing

More information

Supporting Software Development Process Using Evolution Analysis : a Brief Survey

Supporting Software Development Process Using Evolution Analysis : a Brief Survey Supporting Software Development Process Using Evolution Analysis : a Brief Survey Samaneh Bayat Department of Computing Science, University of Alberta, Edmonton, Canada samaneh@ualberta.ca Abstract During

More information

DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC

DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC DEVELOPMENT OF A WORKFLOW APPLICATION FOR VEHICLE FLEET MANAGEMENT: A CASE STUDY OF GUINNESS NIGERIA PLC 1,* John B. Oladosu, 2 Oludare Opaleye & 3 Olusayo D. Fenwa Computer Science and Engineering Department,

More information

Process Modeling using BPMN 2.0

Process Modeling using BPMN 2.0 Process Modeling using BPMN 2.0 This chapter provides a brief overview of Business Process Modeling Notation (BPMN) concepts with particular emphasis on the BPMN 2.0 additions. In addition, it describes

More information

Workflow Access Control from a Business Perspective

Workflow Access Control from a Business Perspective Workflow Access Control from a Business Perspective Dulce Domingos, António Rito-Silva 2, Pedro Veiga Informatics Department, University of Lisbon, Faculty of Sciences {dulce, pmv}@di.fc.ul.pt 2 INESC-ID

More information

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW

CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW CONCEPTUAL MODEL OF MULTI-AGENT BUSINESS COLLABORATION BASED ON CLOUD WORKFLOW 1 XINQIN GAO, 2 MINGSHUN YANG, 3 YONG LIU, 4 XIAOLI HOU School of Mechanical and Precision Instrument Engineering, Xi'an University

More information

A Test Case Generator for the Validation of High-Level Petri Nets

A Test Case Generator for the Validation of High-Level Petri Nets A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten

More information

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective

BIS 3106: Business Process Management. Lecture Two: Modelling the Control-flow Perspective BIS 3106: Business Process Management Lecture Two: Modelling the Control-flow Perspective Makerere University School of Computing and Informatics Technology Department of Computer Science SEM I 2015/2016

More information

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration Int. J. of Computers, Communications & Control, ISSN 1841-9836, E-ISSN 1841-9844 Vol. V (2010), No. 5, pp. 862-870 A Novel QoS Framework Based on Admission Control and Self-Adaptive Bandwidth Reconfiguration

More information

Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design

Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design Integrating Databases, Objects and the World-Wide Web for Collaboration in Architectural Design Wassim Jabi, Assistant Professor Department of Architecture University at Buffalo, State University of New

More information

each college c i C has a capacity q i - the maximum number of students it will admit

each college c i C has a capacity q i - the maximum number of students it will admit n colleges in a set C, m applicants in a set A, where m is much larger than n. each college c i C has a capacity q i - the maximum number of students it will admit each college c i has a strict order i

More information

A Multi-Agent Approach to a Distributed Schedule Management System

A Multi-Agent Approach to a Distributed Schedule Management System UDC 001.81: 681.3 A Multi-Agent Approach to a Distributed Schedule Management System VYuji Wada VMasatoshi Shiouchi VYuji Takada (Manuscript received June 11,1997) More and more people are engaging in

More information

Lecture 7: Concurrency control. Rasmus Pagh

Lecture 7: Concurrency control. Rasmus Pagh Lecture 7: Concurrency control Rasmus Pagh 1 Today s lecture Concurrency control basics Conflicts and serializability Locking Isolation levels in SQL Optimistic concurrency control Transaction tuning Transaction

More information

Different Approaches using Change Impact Analysis of UML Based Design for Software Development

Different Approaches using Change Impact Analysis of UML Based Design for Software Development Different Approaches using Change Impact Analysis of UML Based Design for Software Development Ali Tariq Bhatti 1, Muhammad Murad Haider 2, Zill-e-Subhan 2 1 North Carolina A&T State University, Greensboro

More information

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing. UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet

More information

An Overview of Distributed Databases

An Overview of Distributed Databases International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 207-214 International Research Publications House http://www. irphouse.com /ijict.htm An Overview

More information

SARA: A tool for service levels aware contracts

SARA: A tool for service levels aware contracts SARA: A tool for service levels aware contracts Mario Alessandro Bochicchio, Antonella Longo, Sara Giacovelli Department of Engineering for Innovation University of Salento Lecce, Italy mario.bochicchio@unisalento.it,

More information

Please let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help.

Please let us know if you need anything. Our customer service number is 1-866-311-5900. We re always happy to help. Dear Valued Customer, We are proud to welcome you to the EvenLink s Crystal Clear Digital Phone service. Our network reliability, customer support and value pricing are a great combination. We appreciate

More information

Microsoft Dynamics GP 2010

Microsoft Dynamics GP 2010 Microsoft Dynamics GP 2010 Workflow Administrator s Guide March 30, 2010 Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and

More information

Large Scale Order Processing through Navigation Plan Concept

Large Scale Order Processing through Navigation Plan Concept Large Scale Order Processing through Navigation Plan Concept João Eduardo Ferreira 1, Osvaldo K. Takai 1, Kelly R. Braghetto 1, and Calton Pu 2 1 Department of Computer Science, University of São Paulo

More information

Reduce Medical Loss Ratio by Straight-Through-Processing with Oracle Health Insurance Components ORACLE WHITE PAPER JULY 2015

Reduce Medical Loss Ratio by Straight-Through-Processing with Oracle Health Insurance Components ORACLE WHITE PAPER JULY 2015 Reduce Medical Loss Ratio by Straight-Through-Processing with Oracle Health Insurance Components ORACLE WHITE PAPER JULY 2015 Table of Contents Introduction 1 Business Agility 2 Risk-Based Intervention

More information

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems Na Zhao 1, Min Chen 2, Shu-Ching Chen 1, Mei-Ling Shyu 3 1 Distributed Multimedia Information System Laboratory

More information

Phase Balancing of Distribution Systems Using a Heuristic Search Approach

Phase Balancing of Distribution Systems Using a Heuristic Search Approach Phase Balancing of Distribution Systems Using a Heuristic Search Approach Lin, Chia-Hung*, Kang, Meei-Song**, Chuang, Hui-Jen**, and Ho, Chin-Ying** *National Kaohsiung University of Applied Sciences **Kao

More information

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE

IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,

More information

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY

GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY GIS DRIVEN URBAN TRAFFIC ANALYSIS BASED ON ONTOLOGY Tazin Malgundkar 1,Madhuri Rao 2 and Dr. S.S. Mantha 3 1 Student, Computer Engineering, Thadomal Shahani Engineering College, Bandra, Mumbai, India.

More information

Parallel Performance Monitoring Service for Dynamically Composed Media Web Services

Parallel Performance Monitoring Service for Dynamically Composed Media Web Services Journal of Computer Science 5 (7): 487-492, 2009 ISSN 1549-3636 2009 Science Publications Parallel Performance Monitoring Service for Dynamically Composed Media Web Services 1 G. Maria Kalavathy and 2

More information

Integrating Multi-Modal Messages across Heterogeneous Networks.

Integrating Multi-Modal Messages across Heterogeneous Networks. Integrating Multi-Modal Messages across Heterogeneous Networks. Ramiro Liscano, Roger Impey, Qinxin Yu * and Suhayya Abu-Hakima Institute for Information Technology, National Research Council Canada, Montreal

More information

Introduction. Insert comments and tracked changes in the document

Introduction. Insert comments and tracked changes in the document SharePoint 2010 Introduction Approval Workflow Approve Reject Request a change Reassign the task Cancel or delete the task Changing the document during an approval workflow will cancel the workflow Collect

More information

A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability. Availability and Serviceability System

A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability. Availability and Serviceability System 1 A Software and Hardware Architecture for a Modular, Portable, Extensible Reliability Availability and Serviceability System James H. Laros III, Sandia National Laboratories (USA) [1] Abstract This paper

More information

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL

CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL CHAPTER 2 MODELLING FOR DISTRIBUTED NETWORK SYSTEMS: THE CLIENT- SERVER MODEL This chapter is to introduce the client-server model and its role in the development of distributed network systems. The chapter

More information

A Software Architecture for a Photonic Network Planning Tool

A Software Architecture for a Photonic Network Planning Tool A Software Architecture for a Photonic Network Planning Tool Volker Feil, Jan Späth University of Stuttgart, Institute of Communication Networks and Computer Engineering Pfaffenwaldring 47, D-70569 Stuttgart

More information

ICS 121 Lecture Notes Spring Quarter 96

ICS 121 Lecture Notes Spring Quarter 96 Software Management Cost Estimation Managing People Management Poor managment is the downfall of many software projects Ð Delivered software was late, unreliable, cost several times the original estimates

More information

Implementing New Approach for Enhancing Performance and Throughput in a Distributed Database

Implementing New Approach for Enhancing Performance and Throughput in a Distributed Database 290 The International Arab Journal of Information Technology, Vol. 10, No. 3, May 2013 Implementing New Approach for Enhancing Performance and in a Distributed Database Khaled Maabreh 1 and Alaa Al-Hamami

More information

Modeling Workflow Patterns

Modeling Workflow Patterns Modeling Workflow Patterns Bizagi Suite Workflow Patterns 1 Table of Contents Modeling workflow patterns... 4 Implementing the patterns... 4 Basic control flow patterns... 4 WCP 1- Sequence... 4 WCP 2-

More information

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip

Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Design and Implementation of an On-Chip timing based Permutation Network for Multiprocessor system on Chip Ms Lavanya Thunuguntla 1, Saritha Sapa 2 1 Associate Professor, Department of ECE, HITAM, Telangana

More information

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:

Cost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation: CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm

More information

A Contribution to Expert Decision-based Virtual Product Development

A Contribution to Expert Decision-based Virtual Product Development A Contribution to Expert Decision-based Virtual Product Development László Horváth, Imre J. Rudas Institute of Intelligent Engineering Systems, John von Neumann Faculty of Informatics, Óbuda University,

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Bandwidth Allocation in a Network Virtualization Environment

Bandwidth Allocation in a Network Virtualization Environment Bandwidth Allocation in a Network Virtualization Environment Juan Felipe Botero jfbotero@entel.upc.edu Xavier Hesselbach xavierh@entel.upc.edu Department of Telematics Technical University of Catalonia

More information