23,138 research outputs found
A COLLABORATIVE MODEL FOR VIRTUAL ENTERPRISE
Collaborative process characteristics have three dimensions: actors, activities and actionâs logic. The aim of this paper is to present a virtual portalâs model that helps managing consortiums. Our model based on dynamic e-collaboration and it has a modular structure, multilayer approach. Systemâs functionality of virtual enterprise is collaborative model is concern on usersâ login, based on role and access control, searching and providing distributed resources, accessibility, metadata management and improved informationâs management. Our proposal for developing solution offers a functional architecture of a virtual enterprise using dynamic e-collaboration and shared space.dynamic e-collaboration, multilayer solution, modular approach
Modular Web Queries â From Rules to Stores
Even with all the progress in Semantic technology, accessing Web
data remains a challenging issue with new Web query languages and approaches
appearing regularly. Yet most of these languages, including W3C approaches
such as XQuery and SPARQL, do little to cope with the explosion of the data
size and schemata diversity and richness on the Web. In this paper we propose
a straightforward step toward the improvement of this situation that is simple to
realize and yet effective: Advanced module systems that make partitioning of (a)
the evaluation and (b) the conceptual design of complex Web queries possible.
They provide the query programmer with a powerful, but easy to use high-level
abstraction for packaging, encapsulating, and reusing conceptually related parts
(in our case, rules) of a Web query. The proposed module system combines ease
of use thanks to a simple core concept, the partitioning of rules and their consequences
in flexible âstoresâ, with ease of deployment thanks to a reduction
semantics. We focus on extending the rule-based Semantic Web query language
Xcerpt with such a module system though the same approach can be applied to
other (rule-based) languages as well
Enabling quantitative data analysis through e-infrastructures
This paper discusses how quantitative data analysis in the social sciences can engage with and exploit an e-Infrastructure. We highlight how a number of activities which are central to quantitative data analysis, referred to as âdata managementâ, can benefit from e-infrastructure support. We conclude by discussing how these issues are relevant to the DAMES (Data Management through e-Social Science) research Node, an ongoing project that aims to develop e-Infrastructural resources for quantitative data analysis in the social sciences
Privacy-Preserving Reengineering of Model-View-Controller Application Architectures Using Linked Data
When a legacy systemâs software architecture cannot be redesigned, implementing
additional privacy requirements is often complex, unreliable and
costly to maintain. This paper presents a privacy-by-design approach to
reengineer web applications as linked data-enabled and implement access
control and privacy preservation properties. The method is based on the
knowledge of the application architecture, which for the Web of data is
commonly designed on the basis of a model-view-controller pattern. Whereas
wrapping techniques commonly used to link data of web applications duplicate
the security source code, the new approach allows for the controlled
disclosure of an applicationâs data, while preserving non-functional properties
such as privacy preservation. The solution has been implemented
and compared with existing linked data frameworks in terms of reliability,
maintainability and complexity
Increasing the Efficiency of Rule-Based Expert Systems Applied on Heterogeneous Data Sources
Nowadays, the proliferation of heterogeneous data sources provided by different
research and innovation projects and initiatives is proliferating more and more and
presents huge opportunities. These developments create an increase in the number
of different data sources, which could be involved in the process of decisionmaking
for a specific purpose, but this huge heterogeneity makes this task difficult.
Traditionally, the expert systems try to integrate all information into a main
database, but, sometimes, this information is not easily available, or its integration
with other databases is very problematic. In this case, it is essential to establish
procedures that make a metadata distributed integration for them. This process
provides a âmappingâ of available information, but it is only at logic level. Thus, on
a physical level, the data is still distributed into several resources. In this sense, this
chapter proposes a distributed rule engine extension (DREE) based on edge computing
that makes an integration of metadata provided by different heterogeneous
data sources, applying then a mathematical decomposition over the antecedent of
rules. The use of the proposed rule engine increases the efficiency and the capability
of rule-based expert systems, providing the possibility of applying these rules over
distributed and heterogeneous data sources, increasing the size of data sets that
could be involved in the decision-making process
A framework for interrogating social media images to reveal an emergent archive of war
The visual image has long been central to how war is seen, contested and legitimised, remembered and forgotten. Archives are pivotal to these ends as is their ownership and access, from state and other official repositories through to the countless photographs scattered and hidden from a collective understanding of what war looks like in individual collections and dusty attics. With the advent and rapid development of social media, however, the amateur and the professional, the illicit and the sanctioned, the personal and the official, and the past and the present, all seem to inhabit the same connected and chaotic space.However, to even begin to render intelligible the complexity, scale and volume of what war looks like in social media archives is a considerable task, given the limitations of any traditional human-based method of collection and analysis. We thus propose the production of a series of âsnapshotsâ, using computer-aided extraction and identification techniques to try to offer an experimental way in to conceiving a new imaginary of war. We were particularly interested in testing to see if twentieth century wars, obviously initially captured via pre-digital means, had become more âsettledâ over time in terms of their remediated presence today through their visual representations and connections on social media, compared with wars fought in digital media ecologies (i.e. those fought and initially represented amidst the volume and pervasiveness of social media images).To this end, we developed a framework for automatically extracting and analysing war images that appear in social media, using both the features of the images themselves, and the text and metadata associated with each image. The framework utilises a workflow comprising four core stages: (1) information retrieval, (2) data pre-processing, (3) feature extraction, and (4) machine learning. Our corpus was drawn from the social media platforms Facebook and Flickr
Attack-Surface Metrics, OSSTMM and Common Criteria Based Approach to âComposable Securityâ in Complex Systems
In recent studies on Complex Systems and Systems-of-Systems theory, a huge effort has been put to cope with behavioral problems, i.e. the possibility of controlling a desired overall or end-to-end behavior by acting on the individual elements that constitute the system itself. This problem is particularly important in the âSMARTâ environments, where the huge number of devices, their significant computational capabilities as well as their tight interconnection produce a complex architecture for which it is difficult to predict (and control) a desired behavior; furthermore, if the scenario is allowed to dynamically evolve through the modification of both topology and subsystems composition, then the control problem becomes a real challenge. In this perspective, the purpose of this paper is to cope with a specific class of control problems in complex systems, the âcomposability of security functionalitiesâ, recently introduced by the European Funded research through the pSHIELD and nSHIELD projects (ARTEMIS-JU programme). In a nutshell, the objective of this research is to define a control framework that, given a target security level for a specific application scenario, is able to i) discover the system elements, ii) quantify the security level of each element as well as its contribution to the security of the overall system, and iii) compute the control action to be applied on such elements to reach the security target. The main innovations proposed by the authors are: i) the definition of a comprehensive methodology to quantify the security of a generic system independently from the technology and the environment and ii) the integration of the derived metrics into a closed-loop scheme that allows real-time control of the system. The solution described in this work moves from the proof-of-concepts performed in the early phase of the pSHIELD research and enrich es it through an innovative metric with a sound foundation, able to potentially cope with any kind of pplication scenarios (railways, automotive, manufacturing, ...)
Ensuring Cyber-Security in Smart Railway Surveillance with SHIELD
Modern railways feature increasingly complex embedded computing systems for surveillance, that are moving towards fully wireless smart-sensors. Those systems are aimed at monitoring system status from a physical-security viewpoint, in order to detect intrusions and other environmental anomalies. However, the same systems used for physical-security surveillance are vulnerable to cyber-security threats, since they feature distributed hardware and software architectures often interconnected by âopen networksâ, like wireless channels and the Internet. In this paper, we show how the integrated approach to Security, Privacy and Dependability (SPD) in embedded systems provided by the SHIELD framework (developed within the EU funded pSHIELD and nSHIELD research projects) can be applied to railway surveillance systems in order to measure and improve their SPD level. SHIELD implements a layered architecture (node, network, middleware and overlay) and orchestrates SPD mechanisms based on ontology models, appropriate metrics and composability. The results of prototypical application to a real-world demonstrator show the effectiveness of SHIELD and justify its practical applicability in industrial settings
- âŠ