Evolution of Web 2.0 applications has changed the outlook of business models and companies. Organizations need to rethink their communication, marketing and sale channels and how their employees and customers interact...
详细信息
The emergence of software-intensive systems connecting physical devices to network-based applications involves new design challenges. As an example, flexible manufacturing systems composed of multiple networked device...
详细信息
The emergence of software-intensive systems connecting physical devices to network-based applications involves new design challenges. As an example, flexible manufacturing systems composed of multiple networked devices in interaction with the physical world, are subject to imprecision and to unpredictable breakdowns. Applications and control software are therefore highly complex, and must operate in heterogeneous and rapidly changing environments. To address these issues, we describe an approach using models at runtime for efficiently monitoring and adapting the software controlling mechatronic devices. We consider a decentralized system, in which each device is represented as an agent. Each agent maintains a model integrating a representation of itself, of its environment and of the agent society, and uses this model to detect inconsistencies, to envision possible future states and to create explanations based on past states. In this paper, we focus on presenting our model and highlighting the results, benefits and challenges arising from using models at run-time with networked physical devices.
[Context and motivation] In Requirements Management, ontologies are used to reconcile gaps in the knowledge and common understanding among stakeholders during requirement elicitation, and therefore significantly impro...
详细信息
The United Nations Centre for Trade Facilitation and Electronic Business (UN/CEFACT) provides a conceptual approach, named the Core Components Technical Specification (CCTS), for creating business document models. The...
详细信息
ISBN:
(纸本)9781424498017
The United Nations Centre for Trade Facilitation and Electronic Business (UN/CEFACT) provides a conceptual approach, named the Core Components Technical Specification (CCTS), for creating business document models. These business document models are essential for defining service interfaces of service-oriented systems and are typically stored in a registry for enabling easy storage, search, and retrieval of these artifacts. However, in such a highly dynamic environment with ever-changing market demands, business partners are confronted with the need to constantly adapt their systems. This implies revising conceptual business document models as well as adapting the corresponding service interface definitions resulting in a tedious and often error-prone task when done manually. In this paper, we present a framework for dealing with these types of evolution in service-oriented systems. Having such a framework at hand, supports business partners in coping with the evolution of business document models, as well as in adapting the corresponding service interface definitions automatically. Furthermore, we present a prototypical implementation and an evaluation of the framework proposed.
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been developed, a methodology for automaticall...
详细信息
The focus on governance, risk and compliance (GRC) is steadily increasing as companies are facing increased risk and a growing number of legal, regulatory and other compliance requirements. Enterprises start to emphas...
详细信息
Huge classes with more than 800 students pose a major challenge to lecturers as well as to students, especially when a practical part is included. In order to successfully master lectures of this size, novel kinds of ...
详细信息
ISBN:
(纸本)9783642212093
Huge classes with more than 800 students pose a major challenge to lecturers as well as to students, especially when a practical part is included. In order to successfully master lectures of this size, novel kinds of teaching media provide a multitude of enhanced *** this paper, we present our experiences with the application of new media in our undergraduate course Introduction to Object-Oriented Modeling (OOM). In this course, we teach approximately 800-1000 students per year the principles and techniques of UML 2.0. New media, i.e., technologies other than the traditional blackboard presentation like a document camera, web-based self assessments, or lecture recordings, are applied to support both, students and lecturers when learning and teaching, respectively. We empirically underline the acceptance of our concept with the feedback of our students concerning the newly used technologies gained through an extensive survey.
Evolution of Web 2.0 applications has changed the outlook of business models and companies. Organizations need to rethink their communication, marketing and sale channels and how their employees and customers interact...
详细信息
Evolution of Web 2.0 applications has changed the outlook of business models and companies. Organizations need to rethink their communication, marketing and sale channels and how their employees and customers interact together internally and externally. Following this new trend, they also need to adopt their IT infrastructure and enhance their online presence and services in order to stay competitive in their businesses. Through this technological transition to Web 2.0 paradigm new security and privacy issues arise which should be taken into consideration to protect the whole Rich Internet Application (RIA) components. Web 2.0 has also introduced new possibilities for a better human computer interaction via rich internet applications such as Mashups that provide a user-driven micro-integration of web-accessible data. At the moment Mashups are mainly used for less important tasks such as customized queries and map-based visualizations; however they have the potential to be used for more fundamental, complex and sophisticated tasks in combination with business processes. In this paper, the security and privacy aspects of Mashup Architecture and some existing challenges will be discussed in more details.
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex env...
详细信息
ISBN:
(纸本)9781424462704;9780769539843
Although event recording on a computer system (also known as logging) is of utmost importance for reconstructing and detecting security relevant events, currently no adequate and sophisticated solution for complex environments, such as Grid and Cloud Computing, exist. Current LOG file formats lack of several important factors, hindering automatic evaluation needed for distributed systems to comply with laws and regulations or hindering detection of security breaches. In this paper we present a new concept utilizing XML technology to solve mentioned problems of current LOG file formats and describe the benefits of this new idea resulting in a flexible, interoperable LOG environment enabling automatic evaluation even in locally dispersed computing systems. As a result reliable, robust and consistent LOG files are produced allowing for automatic evaluation.
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In particular, life-log information requires ...
详细信息
Sharing life-log information in a social community has many advantages, both for the user and society. But sharing any type of personal information is a threat to privacy. In particular, life-log information requires higher security considerations since it may contains very sensitive information about the user such as biological information, location, communication logs, etc. In this paper, first we discuss the risks of sharing life-log information in a social community. Then we will introduce a sharing model, which can eliminate the sharing capability of a life-log information object, based on the expiration time. Furthermore, general security approaches which might decrease security related risks for life-log systems will be described.
暂无评论