Auflistung nach Schlagwort "Data modeling"
1 - 2 von 2
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragComplexities of Identity Provenance Metadata(Open Identity Summit 2021, 2021) Semančík, RadovanData provenance information is an important part of personal data protection mechanisms. However, capabilities of existing identity management systems are severely limited when it comes to maintaining and processing data provenance information. This paper describes an effort to design and implement capability to process provenance information in midPoint, an open source identity management and governance system. The solution used value metadata for the purposes of storage and processing of provenance information. Resulting prototype was fully integrated into midPoint code base. The solution dealt with all layers of provenance information processing, from data acquisition to user interface. The prototype uncovered a relation between provenance information and other metadata types, as well as potential use of provenance-enriched metadata in conjunction with data protection mechanisms.
- ZeitschriftenartikelEnabling Normalized Systems in Practice - Exploring a Modeling Approach(Business & Information Systems Engineering: Vol. 60, No. 1, 2018) De Bruyn, Peter; Mannaert, Herwig; Verelst, Jan; Huysmans, PhilipContemporary organizations are required to adapt to a changing environment in an agile way, which is often deemed very challenging. Normalized Systems (NS) theory attempts to build highly evolvable software systems by using systems theory as its theoretical underpinning. A modeling method which supports the identification of the NS elements, required for building NS sofware in practice, is currently missing. Therefore, the paper introduces an approach for creating both data models and processing models in the context of NS, as well as their integration. It is discussed how these models can be taken as the input for the actual creation of evolutionary prototypes by using an earlier developed supporting tool. The modeling approach and its suitability for feeding the tool are evaluated to discover their current strengths and weaknesses.