Today's enterprises exist in highly dynamic environment. While enterprise-architecture (EA) based models help in holistic treatment of enterprise aspects, they are static in nature and do not represent the complex...
详细信息
ISBN:
(纸本)9781479954674
Today's enterprises exist in highly dynamic environment. While enterprise-architecture (EA) based models help in holistic treatment of enterprise aspects, they are static in nature and do not represent the complex dynamic behavior of enterprise as it evolves over time. Instead of relying on guideline for simulating EA models as in other approaches, we propose a comprehensive metamodel of system dynamics and provide relation-based mapping to EA metamodel. Ongoing explorations suggest that while several challenges of simulating enterprise aspects remain unaddressed, in the least we take a step toward making simulation of EA models more structured.
Trust is an indispensable component in mobile ad-hoc networks since the devices involved in the network can be complete strangers to each other. In a situation where there is a need of a suddenly build network and exc...
详细信息
Trust is an indispensable component in mobile ad-hoc networks since the devices involved in the network can be complete strangers to each other. In a situation where there is a need of a suddenly build network and exchange of data, a trust establishment mechanism plays a vital role. In developing a trust implementing system, the traditional methods such as cryptography and centralized certificate based solutions are ill-suited due to the lack of processing power and energy in mobile devices. In this paper, we propose a trust mechanism based on the predictive theories of probability, Markov Chains and Hidden Markov Models.
Secure cloud storage solutions such as Trust Store, Sec Cloud, HPI Secure, and Twin Cloud have primarily focused on securing persistent data while storing it in public cloud services. though data sharing has been reco...
详细信息
Secure cloud storage solutions such as Trust Store, Sec Cloud, HPI Secure, and Twin Cloud have primarily focused on securing persistent data while storing it in public cloud services. though data sharing has been recognized as an important security feature, these storage solutions mostly focus on three key properties: confidentiality, integrity and availability. Modern enterprise applications demand data is able to be shared within or across organizations. the challenge is how to securely share data in public clouds without increasing data movement and computation costs. this problem has been addressed in recent times by utilizing or developing new data encryption techniques such as identity-based encryption, attribute-based encryption and proxy-re-encryption. However, these techniques suffer from scalability and flexibility problems when dealing with big data and support for dynamic access control rules. this paper presents a novel architecture and corresponding protocols to provide secure sharing of documents on public cloud services: Cloud Docs. this system uses AES for data encryption to achieve scalability and supports identity based access control rules using private-public key pairs to provide flexibility.
Mining based on opinions can extract useful information from users' comments. After doing cluster and analysis on the information, users can get a detailed understanding of the commodity, then determine to buy the...
详细信息
ISBN:
(纸本)9781467382717
Mining based on opinions can extract useful information from users' comments. After doing cluster and analysis on the information, users can get a detailed understanding of the commodity, then determine to buy the commodity or not. In this paper, firstly, we extract evaluation objects and evaluation words, then cluster the evaluation objects. Next based on SO-PMI algorithm, judge the polarity of evaluation words and determine their polarity intensity values, then use K-means clustering algorithm to cluster the evaluation words. Last, for every kind of target evaluation object, make a count on the proportion of each kind evaluation word, and show the result to users in an intuitive way. this paper uses noun phrase pattern to match comments to extract evaluation objects and put forward the thematic words extraction algorithm. On judging the evaluation words' polarity, this paper establishes an emotional seed dictionary for each target object. the method of establishing dictionary for every attribute can eliminate the influence that less-correlation evaluation words have on the polarity judgment.
enterprise Architecture Management relies on information from different management levels, functional areas and for example in case of holdings or mergers from different organizations. this results in a variety of too...
详细信息
ISBN:
(纸本)9781479954674
enterprise Architecture Management relies on information from different management levels, functional areas and for example in case of holdings or mergers from different organizations. this results in a variety of tools, models, and model schemata that cover EAM aspects. At the same time, there is a desire for interchangeability and reuse of EA models. Here, model transformation is a promising approach. However, the heterogeneity of EA models causes problems here. We describe heterogeneities by examples from both, language constructs and EA models. Furthermore possible solutions to problems imposed for model transformation are discussed. this is done on the example of ArchiMate and Troux Semantics
Analysis and planning of enterprise Architectures (EA) is a complex task for stakeholders. the change of one architecture element has impact on multiple other elements because of manifold relationships and interaction...
详细信息
ISBN:
(纸本)9781479954674
Analysis and planning of enterprise Architectures (EA) is a complex task for stakeholders. the change of one architecture element has impact on multiple other elements because of manifold relationships and interactions between them. the interactive cockpit approach presented in this paper supports stakeholders planning and analyzing EAs and to tackle the intrinsic complexity. this approach supplies a cockpit with multiple viewpoints to put relevant information side-by-side without losing the context combined with interaction functionality. In this paper, we develop such cockpit starting with relevant use cases, describing a potential design based on well-established foundations in EA modeling, and outline an exemplary usage scenario.
Today's enterprises exist in highly dynamic environment. Simulation could be used to reveal complex dynamic behavior of enterprise, especially for playing out dynamic what-if scenarios, in determining enterprise...
详细信息
ISBN:
(纸本)9781479954674
Today's enterprises exist in highly dynamic environment. Simulation could be used to reveal complex dynamic behavior of enterprise, especially for playing out dynamic what-if scenarios, in determining enterprise's response to a change. Instead of relying on guidelines for simulating prescriptive models of enterprise as in other approaches including our own in which we simulated intentional models of enterprise, we propose a comprehensive metamodel of system dynamics and provide relation-based mapping to intentional metamodel. Ongoing explorations suggest that while several challenges of simulating enterprise aspects for what-if analyses remain unaddressed, in the least we take a step toward making simulation of intentional models more structured.
One of the most important features of enterprise architecture modeling approaches is the set of views and viewpoints they use to convey the properties of enterprise systems - that is, their viewpoint framework. All ma...
详细信息
ISBN:
(纸本)9781479954674
One of the most important features of enterprise architecture modeling approaches is the set of views and viewpoints they use to convey the properties of enterprise systems - that is, their viewpoint framework. All mainstream approaches such as Zachman, RM-ODP, TOGAF and Archimate use the notion of independent "concerns" or dimensions to organize their views and viewpoints, but often do so in ways that are inconsistent and overly complex. In this paper we compare the viewpoint framework of one well known enterprise Architecture Modeling approach, Archimate, to the Orthographic Modeling approach which was developed to apply the idea of dimension-based view identification and selection in a pure, comprehensive form. After identifying weakness in Archimate's viewpoint framework from an orthographic modeling perspective we suggest how the former can be realized by, and adapted for, the latter.
Open Cloud computing Interface (OCCI) proposes one of the first widely accepted, community-based, open standards for managing any kinds of cloud resources. But as it is specified in natural language, OCCI is imprecise...
详细信息
Open Cloud computing Interface (OCCI) proposes one of the first widely accepted, community-based, open standards for managing any kinds of cloud resources. But as it is specified in natural language, OCCI is imprecise, ambiguous, incomplete, and needs a precise definition of its core concepts. Indeed, the OCCI Core Model has conceptual drawbacks: an imprecise semantics of its type classification system, a nonextensible data type system for OCCI attributes, a vague and limited extension concept and the absence of a configuration concept. To tackle these issues, this paper proposes a precise metamodel for OCCI. this metamodel defines rigourously the static semantics of the OCCI core concepts, of a precise type classification system, of an extensible data type system, and of both extension and configuration concepts. this metamodel is based on the Eclipse Modeling Framework (EMF), its structure is encoded with Ecore and its static semantics is rigourously defined withobject Constraint Language (OCL). As a consequence, this metamodel provides a concrete language to precisely define and exchange OCCI models. the validation of our metamodel is done on the first world-wide dataset of OCCI extensions already published in the literature, and addressing inter-cloud networking, infrastructure, platform, application, service management, cloud monitoring, and autonomic computing domains, respectively. this validation highlights simplicity, consistency, correctness, completeness, and usefulness of the proposed metamodel.
Due to increasing competitive pressure, manufacturing companies need to support flexible and scalable business processes - both on the shop floor and in their enterprise software systems. Cloud manufacturing is a rece...
详细信息
ISBN:
(纸本)9781479954704
Due to increasing competitive pressure, manufacturing companies need to support flexible and scalable business processes - both on the shop floor and in their enterprise software systems. Cloud manufacturing is a recent approach to realize real-world manufacturing processes by applying well-known basic concepts from the field of Cloud computing to this domain. To implement Cloud manufacturing, it is necessary to model, enact and monitor according manufacturing processes and virtualize the single process steps. So far, Business Process Management Systems do not explicitly support Cloud manufacturing. this paper analyzes requirements regarding process enactment for Cloud manufacturing and provides a concept for an according software framework.
暂无评论