10,859 Hits in 7.0 sec

Information leak detection in business process models: Theory, application, and tool support

Rafael Accorsi, Andreas Lehmann, Niels Lohmann
2015 Information Systems  
Such a feature allows for the use of state-of-the-art tool support to model-check business process models and detect leaks.  ...  Building on the concept of placebased non-interference and declassification, the core contribution of this paper is the application of Petri net reachability to detect places in which information leaks  ...  The authors cordially thank Dirk Fahland and Harro Wimmel for their valuable feedback and the anonymous reviewers of the paper at the Conference Business Process Management 2012 for their constructive  ... 
doi:10.1016/ fatcat:ev25aru23zeltpr6gb52pkq63i

A Model for Traitor Detection with Appraising Approach

Sai PrasadKashi, N. Chandra Sekhar Reddy, G. Prabhakar Reddy
2014 International Journal of Computer Applications  
In case of a leak, nothing can be done by the data distributor. Only possibility is forcing companies to reissue cards, notify customers and mitigate loss of goodwill from negative publicity.  ...  Loss of large volumes of shielded information has become regular headline event.  ...  Many businesses have in their control delicate data about their organization, employees and customers [1] . Main goal of this paper is to detect the traitor who leaked the data.  ... 
doi:10.5120/16192-5432 fatcat:prxzwm5verekdbtiwzl4vyditm

A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention

Alese Boniface Kayode, Alowolodu Olufunso Dayo, Adekunle Adewale Uthman
2021 Communications and Network  
Model for Mobile Agent-Based Information Leakage Prevention.  ...  The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings.  ...  This lightweight system effectively prevents the inadvertent data leaks and produces overhead of 4% for the protected systems and applications.  ... 
doi:10.4236/cn.2021.132006 fatcat:gj7xumrvfzgq7k5wqrhr5jygau

A Log File Digital Forensic Model [chapter]

Himal Lalla, Stephen Flowerday, Tendai Sanyamahwe, Paul Tarwireyi
2012 IFIP Advances in Information and Communication Technology  
The proposed model specifies the steps that forensic investigators can follow with regard to the extraction and examination of digital evidence from log files for use in legal proceedings.  ...  A thorough examination of log files is needed to reveal the hidden actions of criminals in computer networks.  ...  A standardized model facilitates a proof of the legitimacy of the theory [9] . The model must be supported by the evidence and should be based on the applicable laws and regulations [13] .  ... 
doi:10.1007/978-3-642-33962-2_17 fatcat:ptwwjopzibe3hc46yt5knnndiq

Leak Localization in Water Networks: A Model-Based Methodology Using Pressure Sensors Applied to a Real Network in Barcelona [Applications of Control]

2014 IEEE Control Systems  
In [3], a method has been proposed to identify leaks using blind spots based on previously leak detection researches that use the analysis of acoustic and vibrations signals [4] , and models of buried  ...  More recently, a method to locate leaks using Support Vector Machines (SVM) has been developed in [6] . The  ...  section has been integrated in a web-based tool, making it possible to easily deploy the developed models in any Business Unit.  ... 
doi:10.1109/mcs.2014.2320336 fatcat:vrfyt5j2yfcxncjvsw5b5rmzn4

Digital Transformation: Developing Business Model toward Smart Farms' platform

Rania E. Ibrahim, Amr Elramly, Hoda M Hassan
2021 North atlantic university union: International Journal of Circuits, Systems and Signal Processing  
The paper also fills a major gap in industry as well as in academia by providing the first Bluetooth Low Energy computer aided design tool that will facilitate testing, designing, deploying, managing and  ...  The data sharing Geoportal is built for all national projects and government authorities, however, in this paper we focus on the Agriculture authorities and farming businesses where the challenge is how  ...  ACKNOWLEDGMENT Authors gratefully acknowledge Qoudra Company for sharing information related to Qoudra's BLE MANET project funded by ITAC.  ... 
doi:10.46300/9106.2020.14.134 fatcat:ewwfcyjrxzedjhzolo5rry2xzu

Hybrid Models and Biological Model Reduction with PyDSTool

Robert Clewley, Andreas Prlic
2012 PLoS Computational Biology  
The example demonstrates how the software provides novel tools that support the inference and validation of mechanistic hypotheses and the inclusion of data constraints in both quantitative and qualitative  ...  The biophysical application is broadly relevant to models in the biosciences.  ...  All solvers support arbitrary-precision event detection with a simple Event class, which is crucial for defining hybrid systems and is missing from many application-specific simulators.  ... 
doi:10.1371/journal.pcbi.1002628 pmid:22912566 pmcid:PMC3415397 fatcat:4ovuzfhj4zh4xpsebgn4nihe5y

Developing taxonomy and model for security centric supply chain management

Xiangyang Li, Charu Chandra, Jiun Yan Shiau
2009 International Journal of Manufacturing Technology and Management (IJMTM)  
We utilize dependency modeling as the bridging facility and probabilistic modeling as the inference engine in our solution to deal with complexity and uncertainty dominant in SecSCM.  ...  In addition we explore the proposition within essential application of healthcare supply chain security management.  ...  The knowledge of specific applications, such as risk management or disruption detection, will guide auditing and employ the extracted information features in terms of special algorithms and models.  ... 
doi:10.1504/ijmtm.2009.023785 fatcat:e2zha5rtdzdntbyvktjzf24uqu

Modelling auditory attention

Emine Merve Kaya, Mounya Elhilali
2017 Philosophical Transactions of the Royal Society of London. Biological Sciences  
A key component in parsing acoustic scenes is the role of attention, which mediates perception and behaviour by focusing both sensory and cognitive resources on pertinent information in the stimulus space  ...  (e.g. a loud explosion) or by a task at hand (e.g. listen to announcements in a busy airport).  ...  This view parallels selection theories in vision, which present frameworks for funnelling only relevant information to the processing pipeline, either at an early or later stage, acting as an informational  ... 
doi:10.1098/rstb.2016.0101 pmid:28044012 pmcid:PMC5206269 fatcat:sbf7ntvqt5htvgerjuuu5lrusy

Actantial Narrative Schema in Emergency Response Process Modeling for Aircraft Fires

Xingna Luo, Qingsong Zhang, Yijia Jin
2019 Journal of Advanced Transportation  
In this study, the actantial model was used to analyze the semantic structure of emergency actions in the Petri net emergency process model, and the actantial-timed Petri net (A-TPN) hybrid model was proposed  ...  Process-related elements include status elements and narrative elements, which are equivalent to the places and transitions in the Petri net model.  ...  This work is supported by the National Key Research and Development Program of China (Grant no. 2016YFC0802601) and Fundamental Research Funds for the Central Universities (Grant no. 3122018D043).  ... 
doi:10.1155/2019/6143027 fatcat:nb3zqsqc55et5lj7nmpcrrs64e

Application of RFID Technology and Ontology Model in Designing Smart Home System

Hongsheng XU, Ruiling ZHANG
2013 Sensors & Transducers  
The paper proposes application of RFID technology and ontology model in designing smart home system. RFID system is composed of two parts: the read / write unit and electronic transceiver.  ...  This paper uses RFID embedded platforms and other types of home sensor ontology model to design a smart home control system.  ...  Acknowledgements This paper is supported by the National Natural Science Funds of China (61272015), and also is supported by the science and technology research major project of Henan province Education  ... 
doaj:562bcac576d941ae80ac687cd86d131f fatcat:wkyajypzqfc3lieus2hnuypkb4

Research on network information security model and system construction

Haijun Wang, X. Liu, J. Wang, N. Li
2016 SHS Web of Conferences  
On the basis of the NIST security model, this paper describes three security control schemes in safety management model and the relationship between the security service and security mechanism in the network  ...  This paper reviews for the internationally accepted basic model and characteristics of network information security, and analyses the characteristics of network information security and their relationship  ...  ACKNOWLEDGEMENT This work was supported by grants from Shandong Social Science Planning and Management Office (13BGLJ11).  ... 
doi:10.1051/shsconf/20162502010 fatcat:yyv7nn5bk5e4vlrmljhhs4zpoa

Toward Better Understanding of the Community Land Model within the Earth System Modeling Framework

Dali Wang, Joseph Schuchart, Tomislav Janjusic, Frank Winkler, Yang Xu, Christos Kartsaklis
2014 Procedia Computer Science  
Along with the deeper understanding of biogeophysical and biogeochemical processes, the software complexity of those earth system models becomes a barrier for further rapid model improvements and validation  ...  One key factor in the improved understanding of earth system science is the development and improvement of high fidelity models.  ...  business information systems.  ... 
doi:10.1016/j.procs.2014.05.137 fatcat:of65poxvsfbjpiwdexjeoekuea

Transfer Function Modelling: A Literature Survey

Stanley Okiy, Chidozie Chukwuemeka Nwobi-Okoye, Anthony Clement Igboanugo
2015 Research Journal of Applied Sciences Engineering and Technology  
Finally, the future directions of research in transfer function modelling which include but not limited to: leak detection and failure prediction, improved modelling software tools, performance evaluation  ...  Similarly, the discrete transfer function models are applied mostly in forecasting and have wide application in econometrics and the social sciences and to a little extent in the physical and life sciences  ...  Even pipeline leaks could be detected by discrete transfer function modelling. These should be the subject of future investigation.  ... 
doi:10.19026/rjaset.11.2234 fatcat:gs6qw5bfnndbzoh2jn3wcqat44

Modeling Information System Availability by using Bayesian Belief Network Approach

Semir Ibrahimovic, Nijaz Bajgoric
2016 Interdisciplinary Description of Complex Systems  
This is particularly important for organizations and industries where information systems support real-time operations and mission-critical applications that need to be available on 24  7  365 basis.  ...  (in article "Availability of enterprise IT systemsan expert-based Bayesian model".  ...  BBN are graphic models that combine graph theory and probability theory.  ... 
doi:10.7906/indecs.14.2.2 fatcat:wypwkp6nqvhwfia6gxgjmz6wd4
« Previous Showing results 1 — 15 out of 10,859 results