Filters








2,209 Hits in 4.6 sec

DATA WAREHOUSE AND MASTER DATA MANAGEMENT EVOLUTION A META-DATA-VAULT APPROACH

2014 Issues in Information Systems  
The proposed general solution will include a Data Vault (DV) model based metadata repository that will integrate the DW data and metadata with the MDM data and metadata.  ...  The paper presents a: a) brief overview and analysis of existing approaches to the data warehouse (DW) evolution problem, and b) detailed description of the research idea for the DW evolution problem (  ...  ACKNOWLEDGEMENTS This paper is based upon work supported by the University of Rijeka under project titled "Metode i modeli za dizajn i evoluciju skladišta podataka".  ... 
doi:10.48009/2_iis_2014_14-23 fatcat:7tb7dupii5bmtnwzvsl2dyzeay

An affiliated search system for an electronic commerce and software component architecture

Incheon Paik, Tongwon Han, Dongik Oh, Sangho Ha, Donggue Park
2003 Information and Software Technology  
In this affiliated business transaction model, we classify Internet sites into two groups: a cooperative sites group, and a non-cooperative sites group.  ...  The software component architecture for ECGSS also allows the effective deployment of the system on every local business site, in view of the evolving trend in information technology toward easier configuration  ...  Acknowledgements This work was supported by the Supporting Program for University Software Research Center under the Ministry of Information and Communication, Korea.  ... 
doi:10.1016/s0950-5849(03)00028-4 fatcat:skqlye2vjrg7fhl5zfirdfabmi

FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH

FABIO MASSACCI, JOHN MYLOPOULOS, NICOLA ZANNONE
2007 International journal of software engineering and knowledge engineering  
We propose a procedure for automatically extracting privacy requirements from databases supporting access control mechanisms for personal data (hereafter Hippocratic databases) and representing them in  ...  the Tropos modeling framework where tools are available for checking the correctness and consistency of privacy requirements.  ...  Actually, privacy policies focus on the correct use of data (i.e., the use of data in compliance with the fairness principle), rather than authorization decisions based on who is accessing the data and  ... 
doi:10.1142/s0218194007003239 fatcat:bbafhllbazhifixn5x2cfnuwce

Deriving Authorizations from Process Analysis in Legacy Information Systems [chapter]

Silvana Castano, Maria Grazia Fugini
1997 Information Security in Research and Business  
The model allows the security administrator to analyze process authorizations for database accesses at different granularity levels of the involved data.  ...  In this paper, we propose a three-level model for authorization analysis and an associated method to extract authorizations from legacy systems.  ...  Acknowledgments This work has been partially supported by the Italian Consortium for Informatics (CINI) and by the Italian National Research Council in the framework of "Progetto Strategico Informatica  ... 
doi:10.1007/978-0-387-35259-6_5 fatcat:utyyjg4utvcplevbbpz5hsx55u

Design and implementation of Web Services-based NGOSS technology-specific architecture

Mi-Jung Choi, Hong-Taek Ju, James W. Hong, Dong-Sik Yun
2008 Annales des télécommunications  
Our work can be used as a guideline for anyone planning to develop a Web Services-based NGOSS TSA.  ...  In this paper, we provide a design and implementation of Web Services-based TSA in accordance with the architectural principles of TNA and the performance evaluation of our proposed system.  ...  Figure 3 shows the XML Schema defining the information model of customer, product and customer order. The information of customer order references one customer, and one or more products.  ... 
doi:10.1007/s12243-008-0019-4 fatcat:fndqpjrfhfhyratspjp3xwy4ey

Semantic Web Services [chapter]

Rodney Topor, Kenneth Salem, Amarnath Gupta, Kazuo Goda, Johannes Gehrke, Nathaniel Palmer, Mohamed Sharaf, Alexandros Labrinidis, John F. Roddick, Ariel Fuxman, Renée J. Miller, Wang-Chiew Tan (+205 others)
2009 Encyclopedia of Database Systems  
• Web-exposed Databases: SQL; XQuery (XML-data DB's) -Challenge: share DB schemas via meta-data • RDF: "Resource Description Framework" W3C proposed standard -Meta-data lower-level mechanics: unordered  ...  • B2B business processes involving significant Communication with customers/suppliers/other-partners is overall a natural locus for future first impact of SWS  ...  Using: MIT Process Handbook Analysis: High-Level Requirements for SWS • Support Biz-Process Communication -E.g., B2B SCM, CRM -E.g., e-contracts, financial info, trust management. • Support SWS Tasks  ... 
doi:10.1007/978-0-387-39940-9_1321 fatcat:gfoumurukjf65hf3mp7aisjgka

Custom Security in Web Services

Balika J. Chelliah, K. Vivekanandan, P. Jeni
2016 Indian Journal of Science and Technology  
Methods: An Interceptor is created for validation which has the token based authentication procedures along with the steps for validating the data.  ...  Thus, combining all custom security as one unit of validation before hitting the business logic is the basic idea of the proposed system.  ...  Since, the REST web service does not have a predefined schema, we need to generate the schemas based on the input and try validating it via the DB index within the specified process of interceptor.  ... 
doi:10.17485/ijst/2016/v9i29/91685 fatcat:t6gh4mgg3zefxo37455wbr6qxq

Conformance Verification of Privacy Policies [chapter]

Xiang Fu
2011 Lecture Notes in Computer Science  
We propose a logic based framework for formally specifying and reasoning about the implementation of privacy protection by a web application.  ...  A verification paradigm, built upon a static control/data flow analysis, is presented to verify if a policy is satisfied. Example 2.  ...  ., the EPAL standard [26] , and the privacy policy based on semantic language DAML-S [19] . This paper uses a first order extension of computational tree logic (CTL) for modeling privacy policies.  ... 
doi:10.1007/978-3-642-19589-1_6 fatcat:t3hcaaapmnbfposbdk7cll5cda

An Agent-Based Expert System Architecture for Product Return Administration

Chen-Shu WANG
2013 IEICE transactions on information and systems  
The return recommender agent is implemented on the basis of case-based reasoning, and provides the return centre clerk with a recommendation for returned product administration.  ...  The return diagnosis agent generates different alarms for certain types of product return, based on forecasts of the return possibility.  ...  Acknowledgments The authors would like to thank the National Science Council, Taiwan, for financially supporting this research under Contract No. NSC 100-2410-H-027-002-MY3.  ... 
doi:10.1587/transinf.e96.d.73 fatcat:sauoqbrwvzbqli33biticgtguq

Secure, Dynamic and Distributed Access Control Stack for Database Applications

Oscar Pereira, Diogo Regateiro, Rui Aguiar
2015 Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering  
business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically  ...  This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.  ...  DB [20] is a programming language that enforces access control policies to data by static typing for data-centric programs.  ... 
doi:10.18293/seke2015-49 dblp:conf/seke/PereiraRA15 fatcat:wjxues2jvrhbjf6rytegucfjcq

Secure, Dynamic and Distributed Access Control Stack for Database Applications

Óscar Mortágua Pereira, Diogo Domingues Regateiro, Rui L. Aguiar
2015 International journal of software engineering and knowledge engineering  
business logic (usually deployed at the client-side), there is no other possibility than modify the business logic in advance and, finally, 3) malicious users can issue CRUD expressions systematically  ...  This paper presents a new approach to enforce access control in database applications, this way expecting to contribute positively to the state of the art in the field.  ...  DB [20] is a programming language that enforces access control policies to data by static typing for data-centric programs.  ... 
doi:10.1142/s0218194015710035 fatcat:qthcjogu2bekdl63n3omctowfq

A Multidatabase System as 4-Tiered Client-Server Distributed Heterogeneous Database System [article]

Mohammad Ghulam Ali
2009 arXiv   pre-print
The first component of this proposed system is a web based interface or Graphical User Interface, which resides on top of the Client Application Program, the second component of the system is a client  ...  schema of the multidatabase system server, which resides on top of the distributed heterogeneous local component database system servers, and the fourth component is remote heterogeneous local component  ...  data model is a virtual schema because no actual data are stored for this schema.  ... 
arXiv:0912.0579v1 fatcat:dz76xllegjfjvmo4do5b7cecgm

Learning Environment for Life Time Value Calculation of Customers in Insurance Domain [chapter]

Andrea Tettamanzi, Luca Sammartino, Mikhail Simonov, Massimo Soroldoni, Mauro Beretta
2004 Lecture Notes in Computer Science  
The profitability of a given customer can be evaluated through its Life Time Value (LTV).  ...  A critical success factor in Insurance business is its ability to use information sources and contained knowledge in the most effective way.  ...  The authors would like to thank the IKF Consortium for their support.  ... 
doi:10.1007/978-3-540-24855-2_132 fatcat:fczgzuqv6zguphe7t2fxyvmoqy

A resource-based rule engine for energy savings recommendations in educational buildings

Giovanni Cuffaro, Federica Paganelli, Georgios Mylonas
2017 2017 Global Internet of Things Summit (GIoTS)  
In this framework, we present a novel rule engine that, leveraging a resource-based graph model encoding relevant application domain knowledge, accesses IoT data for producing energy savings recommendations  ...  Raising awareness among young people on the relevance of behaviour change for achieving energy savings is widely considered as a key approach towards long-term and cost-effective energy efficiency policies  ...  The system leverages a heterogeneous sensing infrastructure and a semantic middleware on top of which two rule-based approaches for enforcing energy-saving policies are proposed, one based on production  ... 
doi:10.1109/giots.2017.8016275 dblp:conf/giots/CuffaroPM17 fatcat:dgpxcy3mq5chxpibquo4mspq4a

A Secured Web Services Based E-Commerce Model for SMME Using Digital Identity

Ashwin B.K, Kumaran K, Madhu Vishwanatham V, M Sumaithri
2010 International Journal of Advancements in Computing Technology  
This paper deals with redesigning the existing e-commerce architecture that has provided a platform for the large companies to sell their products so that it can provide a place on internet for Small Medium  ...  This new architecture of the e-commerce model helps to achieve all the above with high efficiency.  ...  More formally, it can be said as to authorize is to define an access policy for a specific user.  ... 
doi:10.4156/ijact.vol2.issue2.7 fatcat:ekkznfi6z5eq7hfs676zq3fuue
« Previous Showing results 1 — 15 out of 2,209 results