29,033 research outputs found

    Open semantic service networks

    Get PDF
    Online service marketplaces will soon be part of the economy to scale the provision of specialized multi-party services through automation and standardization. Current research, such as the *-USDL service description language family, is already deïŹning the basic building blocks to model the next generation of business services. Nonetheless, the developments being made do not target to interconnect services via service relationships. Without the concept of relationship, marketplaces will be seen as mere functional silos containing service descriptions. Yet, in real economies, all services are related and connected. Therefore, to address this gap we introduce the concept of open semantic service network (OSSN), concerned with the establishment of rich relationships between services. These networks will provide valuable knowledge on the global service economy, which can be exploited for many socio-economic and scientiïŹc purposes such as service network analysis, management, and control

    Overview of methodologies for building ontologies

    Get PDF
    A few research groups are now proposing a series of steps and methodologies for developing ontologies. However, mainly due to the fact that Ontological Engineering is still a relatively immature discipline, each work group employs its own methodology. Our goal is to present the most representative methodologies used in ontology development and to perform an analysis of such methodologies against the same framework of reference. So, the goal of this paper is not to provide new insights about methodologies, but to put it all in one place and help people to select which methodology to use

    Directed Security Policies: A Stateful Network Implementation

    Full text link
    Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this policy is often implemented in the network, for example by firewalls, such that A can establish a connection to B and all packets belonging to established connections are allowed. This stateful implementation is usually required for the network's functionality, but it introduces the backflow from B to A, which might contradict the security policy. We derive compliance criteria for a policy and its stateful implementation. In particular, we provide a criterion to verify the lack of side effects in linear time. Algorithms to automatically construct a stateful implementation of security policy rules are presented, which narrows the gap between formalization and real-world implementation. The solution scales to large networks, which is confirmed by a large real-world case study. Its correctness is guaranteed by the Isabelle/HOL theorem prover.Comment: In Proceedings ESSS 2014, arXiv:1405.055

    A Framework for Semi-automated Web Service Composition in Semantic Web

    Full text link
    Number of web services available on Internet and its usage are increasing very fast. In many cases, one service is not enough to complete the business requirement; composition of web services is carried out. Autonomous composition of web services to achieve new functionality is generating considerable attention in semantic web domain. Development time and effort for new applications can be reduced with service composition. Various approaches to carry out automated composition of web services are discussed in literature. Web service composition using ontologies is one of the effective approaches. In this paper we demonstrate how the ontology based composition can be made faster for each customer. We propose a framework to provide precomposed web services to fulfil user requirements. We detail how ontology merging can be used for composition which expedites the whole process. We discuss how framework provides customer specific ontology merging and repository. We also elaborate on how merging of ontologies is carried out.Comment: 6 pages, 9 figures; CUBE 2013 International Conferenc

    Security, Privacy and Safety Risk Assessment for Virtual Reality Learning Environment Applications

    Full text link
    Social Virtual Reality based Learning Environments (VRLEs) such as vSocial render instructional content in a three-dimensional immersive computer experience for training youth with learning impediments. There are limited prior works that explored attack vulnerability in VR technology, and hence there is a need for systematic frameworks to quantify risks corresponding to security, privacy, and safety (SPS) threats. The SPS threats can adversely impact the educational user experience and hinder delivery of VRLE content. In this paper, we propose a novel risk assessment framework that utilizes attack trees to calculate a risk score for varied VRLE threats with rate and duration of threats as inputs. We compare the impact of a well-constructed attack tree with an adhoc attack tree to study the trade-offs between overheads in managing attack trees, and the cost of risk mitigation when vulnerabilities are identified. We use a vSocial VRLE testbed in a case study to showcase the effectiveness of our framework and demonstrate how a suitable attack tree formalism can result in a more safer, privacy-preserving and secure VRLE system.Comment: Tp appear in the CCNC 2019 Conferenc

    The integration of new technologies : the stakes of knowledge

    Get PDF
    In order to remain competitive in an increasingly competitive international context, French companies are forced to follow one or more of various possible routes: relocating some of the activities, optimizing the design and / or production process, or innovate technologically. When they choose to develop new technologies, it is advisable to seek outside expertise in different areas. Thus they must exchange and create knowledge in partnership with other companies. But in order to control and integrate this future technology, we support that the acquisition and the capitalization of the technical training, during the process of innovation, are of primary importance. This article demonstrates that the construction of this knowledge base can be achieved only by formalizing close and rigorous collaboration. To do this, we propose a model of the collaborative process, meant for the leaders of innovative projects to support design.Cifr

    Formalization of the partnering structure for networked businesses

    Get PDF
    Rapidly changing market demands and increasing competitive pressure cause many businesses implement changes to the way they conduct business. One of these changes is the decision to collaborate with other businesses, forming what we call a 'networked business'. Networked businesses are formed by different organizations working together to reach a common goal. For the participating organizations in a networked business to be able to promptly react to their customers' needs, they must set up as cornerstone a well-defined collaborative partnering structure. In this report we discuss the partnering structure of networked businesses and present a framework for its formalization. Using a case study, we illustrate that existing approaches for value modeling, roles specification, and responsibilities definition can be used successfully if employed in a unifying way to address this structure concept

    Public-Private Co-operation for Gas Provision in Poor Neighbourhoods of Buenos Aires: Impact on Housing Improvements and Health

    Get PDF
    This study examines the programme Redes Solidarias, a public-private initiative that connected to natural pipelined gas 4,000 households in the Great Buenos Aires Area during 2005. The main features of the institutional framework are described and the main results of an impact estimation analysis are reported. The mechanism of selection of neighbourhoods for the connection represents a ‘natural experiment’, which allows the estimation of the causal effects of the programme on several indicators, including housing improvements, health and happiness related variables. We perform this analysis using data from two surveys we collected on the neighbourhoods in 2006 and 2007. The programme was found to generate improvements on dwelling walls, and the 
infrastructure provision, gas, impact evaluation
    • 

    corecore