3,201 research outputs found

    An MDA approach for developing Secure OLAP applications: metamodels and transformations

    Get PDF
    Decision makers query enterprise information stored in Data Warehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which employ specific views or cubes from the corporate DW or Data Marts, based on multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized access. In previous work we defined a Model-Driven based approach for developing a secure DW repository by following a relational approach. Nevertheless, it is also important to define security constraints in the metadata layer that connects the DW repository with the OLAP tools; that is, over the same multidimensional structures that end users manage. This paper incorporates a proposal for developing secure OLAP applications within our previous approach: it improves a UML profile for conceptual modelling; it defines a logical metamodel for OLAP applications; and it defines and implements transformations from conceptual to logical models, as well as from logical models to secure implementation in a specific OLAP tool (SQL Server Analysis Services).This research is part of the following projects: SIGMA-CC (TIN2012-36904), GEODAS-BC (TIN2012-37493-C01) and GEODAS-BI (TIN2012-37493-C03) funded by the Ministerio de EconomĂ­a y Competitividad and Fondo Europeo de Desarrollo Regional FEDER. SERENIDAD (PEII11-037-7035) and MOTERO (PEII11- 0399-9449) funded by the ConsejerĂ­a de EducaciĂłn, Ciencia y Cultura de la Junta de Comunidades de Castilla La Mancha, and Fondo Europeo de Desarrollo Regional FEDER

    An MDA approach for developing secure OLAP applications: Metamodels and transformations

    Get PDF
    Decision makers query enterprise information stored in DataWarehouses (DW) by using tools (such as On-Line Analytical Processing (OLAP) tools) which employ specific views or cubes from the corporate DW or Data Marts, based on multidimensional modelling. Since the information managed is critical, security constraints have to be correctly established in order to avoid unauthorized access. In previous work we defined a Model-Driven based approach for developing a secure DW repository by following a relational approach. Nevertheless, it is also important to define security constraints in the metadata layer that connects the DW repository with the OLAP tools; that is, over the same multidimensional structures that end users manage. This paper incorporates a proposal for developing secure OLAP applications within our previous approach: it improves a UML profile for conceptual modelling; it defines a logical metamodel for OLAP applications; and it defines and implements transformations from conceptual to logical models, as well as from logical models to secure implementation in a specific OLAP tool (SQL Server Analysis Services). © 2015 ComSIS Consortium. All rights reserved.This research is part of the following projects: SIGMA-CC (TIN2012-36904), GEODAS-BC (TIN2012-37493-C01) and GEODAS-BI (TIN2012-37493-C03) funded by the Ministerio de Economía y Competitividad and Fondo Europeo de Desarrollo Regional FEDER

    Finite satisfiability verification in UML class diagrams: a comparative study

    Get PDF
    Unified Modeling Language class diagrams are widely used for modeling, playing a key role in the analysis and design of information systems, especially in development contexts that use modeling oriented methodologies. Therefore, it is relevant to ensure the creation and maintenance of correct class diagrams. With the use of class diagrams it is possible to specify classes, relations and restrictions, however, such diagrams are subject to modeling errors made by their authors and may degenerate into incorrect diagrams. A common cause of incorrect diagrams refers to the definition of contradictory and inconsistent constraints, leading to finite satisfiability problems. Several approaches to the verification of finite satisfiability are currently available, supported by different tools. Through this work, we proceed with the identification and comparison of the existing approaches for the verification of finite satisfiability in class diagrams, determining the effectiveness and efficiency of the proposed tools

    Challenges and opportunities of introducing Internet of Things and Artificial Intelligence applications into Supply Chain Management

    Get PDF
    The study examines the challenges and opportunities of introducing Artificial Intelligence (AI) and the Internet of Things (IoT) into the Supply Chain Management (SCM). This research focuses on the Logistic Management. The central research question is “What are the key challenges and opportunities of introducing AI and IoT applications into the Supply Chain Management?” The goal of this research is to collect the most appropriate literature to help create a conceptual framework, which involves the integration of the IoT and AI applications into contemporary supply chain management with the emphasis on the logistics management. Additionally, the role of 5G Network is closely studied in order to indicate its capabilities and the processing capacity that it can provide to the AI and IoT operations. In addition, the semi-structured online interview with the top managers from several companies was conducted in order to identify the degree of readiness of the companies for the AI and IoT applications in SCM. From the retrieved results, the major challenges of integrating the IoT into SCM are the security and privacy issues, the sensitivity of the data and high costs of the implementation at an initial stage. Moreover, the research results have shown that the IoT applications can positively affect the SCM activities, in particular, the high visibility across the SC, an effective traceability and an automated data collection. Furthermore, the predictive analysis of AI programs can help the SCM to eliminate the potential errors and failures in the processes.fi=Opinnäytetyö kokotekstinä PDF-muodossa.|en=Thesis fulltext in PDF format.|sv=Lärdomsprov tillgängligt som fulltext i PDF-format

    White Paper: Shifting the goal post - from high impact journals to high impact data

    Get PDF
    The purpose of this white paper is to provide an overview of the ongoing initiatives at center level to respond to changing public expectations and to the challenge of improving the conduct of science by making research data widely available. We also attempt to provide a framework for implementing open access for research data to maximize CGIAR’s impact on development. The remainder of this paper proceeds as follows; firstly a summary of the diversity of research data produced by the centers is given, followed by an overview of the existing infrastructure for data management for each Center. Secondly, some of the limitations and barriers faced by the centers in their process to mainstream research data publishing are addressed. The paper concludes with recommendations for how these limitations and barriers can be tackled

    An integrated framework for the next generation of Risk-Informed Performance-Based Design approach used in Fire Safety Engineering

    Get PDF
    Review of decades of worldwide experience using standards, codes and guidelines related to performance-based fire protection design for buildings has identified shortcomings in the interpretation, application and implementation of the performance-based design process, wide variation in the resulting levels of performance achieved by such designs, and several opportunities to enhance the process. While others have highlighted shortcomings in the past, as well as some ideas to enhance the process, it is proposed that a more fundamental change is needed. First, the political and technical components of the process need to be clearly delineated to facilitate better analysis and decision-making within each component. Second, the process needs to be changed from one which focuses only on fire safety systems to one which views buildings, their occupants and their contents as integrated systems. In doing so, the activities associated with the normal operation of a building and how they might be impacted by the occurrence of a fire event become clearer, as do mitigation options which account for the behaviors and activities associated with normal use. To support these changes, a new framework for a risk-informed performance-based process for fire protection design is proposed: one which is better integrated than current processes, that treats a fire event as a disruptive event of a larger and more complex building-occupant system, and that provides more specific guidance for engineering analysis with the aim to achieve more complete and consistent analysis. This Ph.D. Dissertation outlines the challenges with the existing approaches, presents the building-occupant system paradigm, illustrates how viewing fire (or any other hazard) as a disruptive event within an holistic building-occupant system can benefit the overall performance of this system over its lifespan, and outlines a framework for a risk-informed performance-based process for fire protection design. Case studies are used to illustrate shortcomings in the existing processes and how the proposed process will address these. This Dissertation also includes a plan of action needed to establish guidelines to conduct each of the technical steps of the process and briefly introduces the future work about how this plan could be practically facilitated via a web-platform as a collaborative environment
    • …
    corecore