P048 - ISTA 2004 - Information Systems Technology and its Applications
Auflistung P048 - ISTA 2004 - Information Systems Technology and its Applications nach Titel
1 - 10 von 21
Treffer pro Seite
Sortieroptionen
- KonferenzbeitragAn access control service for dynamic and hierarchical resources: Declarative model and implementation on top of XACML(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Psaila, Giuseppe; Biondi, FulvioThe increasing complexity of (distributed) information systems requires new solutions for dealing with access control problems. In particular, information systems are based on a large number of resources, with very complex structure, that must be accessed by a large variety of users. Traditional and instance based solutions are not adequate. In this paper, we propose a new approach to the problem. First of all, we define an access control model which is declarative, modular, hierarchical and instance independent, so that it is suitable for highly dynamic contexts. Then, we reports about the implementation of a Profile Service, which effectively exploits the XACML technology to simplify and shorten the development.
- KonferenzbeitragApplying web service compositions in systems management(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Karastoyanova, DimkaSystems management in any organization depends exclusively on the efforts of a system administrator. Every change in the IT infrastructure landscape requires changes in the systems configuration settings. We propose the use of enterprise registries for addressing the automation of systems configuration. Registries provide global view on the whole IT infrastructure of an enterprise, store a complete configuration data and maintain consistent record of systems state. The role of a registry in the automation of reconfiguration activities in an enterprise can either be passive - with the registry being only a data store for configuration data, or an active one. We view the active approach much more suitable for facilitating automatic system management. Active registries serve not only for data keeping but also command and perform reconfiguration directly onto the enterprise systems. To facilitate the seamless interaction between registry and all systems we propose to extend them with Web service capabilities. To define and perform all the complex sequences of tasks according to the configuration rules defined in a registry we advocate the use of Web Service compositions. We call these process-based Web services “systems management rules”. Furthermore, the development of systems management rules can be automated by using Web Service Flows templates.
- KonferenzbeitragAn approach to advanced data synchronization in complex process control systems(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Kuklenko, D.; Gamzayev, R.; Goloborodko, V.; Tkachuk, M.Nowadays for any kind of distributed and multi-level, i.e. complex information systems it is vitally important to represent its data resources in a homogenized form. This paper presents our approach to data synchronization (DS) in complex Process Control Systems (PCS) designed with respect to our real project experience in the domain of PCS for gas-production industry in Ukraine. DS is considered as a stage of more sophisticated approach to data processing called In- telligent Data Engineering (IDE). The IDE framework and some of its modeling aspects are shortly described. The algorithm used at the DS stage for transferring process data between the levels of distributed PCS in XML-format is proposed and implemented. In order to estimate a system performance in a DS publisher node the metrical-based modeling is introduced in our approach.
- KonferenzbeitragBusiness rule verbalization(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Halpin, TerryBusiness rules should first be specified at the conceptual level, using concepts and languages easily understood by the business domain experts who are best qualified to validate the rules. This paper focuses on the verbalization of static business rules (i.e. constraints and derivation rules that apply to individual states of the business), ignoring dynamic rules relating to state transitions and/or workflows. We propose desirable language criteria for rule verbalization, and orthogonal dimensions by which rule verbalizations may be classified, and illustrate these general qualities with a wide variety of business rule examples, using model fragments depicted graphically in Entity-Relationship, Object-Role Modeling and Unified Modeling Language notations.
- KonferenzbeitragCombining the best of global-as-view and local-as-view for data integration(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Xu, Li; Embley, David W.Currently, there are two main basic approaches to data integration: Globalas-View (GAV) and Local-as-View (LAV). However, both GAV and LAV have their limitations. In a GAV approach, changes in information sources or adding a new information source requires revisions of a global schema and mappings between the global schema and source schemas. In a LAV approach, automating query reformulation has exponential time complexity with respect to query and source schema definitions. To resolve these problems, we offer TIQS as an alternative point of view that is neither GAV nor LAV. The approach uses source-to-target mappings based on a predefined conceptual target schema, which is specified ontologically and independently of any of the sources. The proposed data integration system is easier to maintain than both GAV and LAV, and query reformulation reduces to rule unfolding. Compared with other data integration approaches, our approach combines the advantages of GAV and LAV, mitigates the disadvantages, and provides an alternative for flexible and scalable data integration.
- KonferenzbeitragA conceptual modeling technique based on semantically complete model, its applications(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Ovchinnikov, VladimirThe article proposes a conceptual modeling technique based on Semantically Complete model, the main property of which is that relations carry complete information about interconnection of underlying object types. The paper describes consequences of this property; the most important one is the possibility to use a model relation without its proper name. The author introduces Semantically Complete Query Language, expressions of which is formulated without relation names, describes a closure mechanism allowing to request an interconnection of indirectly related object types by means of a simple enumeration of them. The technique is applied to conceptual modeling of a metallurgical enterprise Manufacturing Execution System as an example. The article proposes use of Semantically Complete model as a unified data access interface to distributed data stored in systems of different architectures and placements, introduces a conception of Semantic Browser based on this interface. The browser permits to view and modify data, has an embedded mechanism of semantic navigation between points of view on information, and a mechanism of creation and publication of new view points by users.
- KonferenzbeitragA data transformation method based on schema mapping(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Li, You; Liu, Dongbo; Zhang, WwimingSchema mapping is an important approach to solve the problem of data integration. This paper introduces a research prototype called SDE, which is a system for managing and facilitating the complex tasks of heterogeneous data transformation and integration. We also present a data transformation method based on schema mapping techniques. By analyzing the mappings and schemas it can automatically fulfill the task of data transformation and guarantee that the target result satisfies the target structure and constraints. It allows users to view the other participants' information as an extension of its own information system, without concerning for heterogeneity.
- KonferenzbeitragEnterprise architecture modeling using agent paradigm(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Lamouchi, Olfa; Ramdane-cherif, Amar; Lévy, NicoleNew approaches to modeling and design of enterprise systems must enable enterprises to offer dramatically improved capabilities including more effective enterprise architectures, more efficient business processes, the ability to engage in new much more dynamic forms of global co-operation, and greatly improved interoperability. The focus of the work in this paper is the application of agent-oriented software development methodologies to architecture enterprise modeling as well as the management of the variability guided by a strategic cost/schedule/quality or benefit/value/risk goals. This study will be the first step of working towards enabling tool support for enterprise variability management, enterprise modeling, validating and deducting the consequences of constrains or feature interactions in enterprise organization.
- KonferenzbeitragEvidential paradigm and intelligent mathematical text processing(Information systems technology and its applications, 3rd international conference ISTA'2004, 2004) Lyaletski, Alexander; Doroshenko, Anatoly; Paskevich, Andrei; Verchinine, KonstantinThis paper presents the evidential paradigm of computer-supported mathematical assistance in "doing" mathematics and in reasoning activity. At present, the evidential paradigm is implemented in the form of System for Automated Deduction (SAD). The system is based on the methods of automated theorem proving and is intended for intelligent mathematical text processing. It proves mathematical theorems, verifies validity of self-contained mathematical texts and can be used for inference search in first-order sequent-based logic as well. For human-like representation of mathematical knowledge, SAD exploits an original formal language close to natural languages of scientific publications. Since the problem of automated text verification is of great importance for industrial applications (checking specifications, proving safety properties of network protocols, etc), the paper illustrates some principles and peculiarities of the evidential paradigm by means of exemplifying the verification of a part of a non-trivial mathematical text.
- «
- 1 (current)
- 2
- 3
- »