146 research outputs found

    Control of H2S emissions using an ozone oxidation process: Preliminary results

    Get PDF
    The problem of eliminating industrial emission odors does not have a simple solution, and consequently has not been researched extensively. Therefore, an experimental research program regarding oxidation of H2S through ozone was undertaken to verify the applicable limits of the procedure and, in addition, was designed to supply a useful analytical means of rationalizing the design of reactors employed in the sector

    RALph: A Graphical Notation for Resource Assignments in Business Processes

    Get PDF
    The business process (BP) resource perspective deals with the management of human as well as non-human resources throughout the process lifecycle. Although it has received increasing attention recently, there exists no graphical notation for it up until now that is both expressive enough to cover well-known resource selection conditions and independent of the BP modelling language. In this paper, we introduce RALph, a graphical notation for the assignment of human resources to BP activities. We define its semantics by mapping this notation to a language that has been formally defined in description logics, which enables its automated analysis. Although we show how RALph can be seamlessly integrated with BPMN, it is noteworthy that the notation is independent of the BP modelling language. Altogether, RALph will foster the visual modelling of the resource perspective in BP

    Composing Trust Models towards Interoperable Trust Management

    Get PDF
    Part 2: Full PapersInternational audienceComputational trust is a central paradigm in today's Internet as our modern society is increasingly relying upon online transactions and social net- works. This is indeed leading to the introduction of various trust management systems and associated trust models, which are customized according to their target applications. However, the heterogeneity of trust models prevents exploiting the trust knowledge acquired in one context in another context although this would be beneficial for the digital, ever-connected environment. This is such an issue that this paper addresses by introducing an approach to achieve interoperability between heterogeneous trust management systems. Specifically, we define a trust meta-model that allows the rigorous specification of trust models as well as their composition. The resulting composite trust models enable heterogeneous trust management systems to interoperate transparently through mediators

    ChemBank: a small-molecule screening and cheminformatics resource database

    Get PDF
    ChemBank (http://chembank.broad.harvard.edu/) is a public, web-based informatics environment developed through a collaboration between the Chemical Biology Program and Platform at the Broad Institute of Harvard and MIT. This knowledge environment includes freely available data derived from small molecules and small-molecule screens and resources for studying these data. ChemBank is unique among small-molecule databases in its dedication to the storage of raw screening data, its rigorous definition of screening experiments in terms of statistical hypothesis testing, and its metadata-based organization of screening experiments into projects involving collections of related assays. ChemBank stores an increasingly varied set of measurements derived from cells and other biological assay systems treated with small molecules. Analysis tools are available and are continuously being developed that allow the relationships between small molecules, cell measurements, and cell states to be studied. Currently, ChemBank stores information on hundreds of thousands of small molecules and hundreds of biomedically relevant assays that have been performed at the Broad Institute by collaborators from the worldwide research community. The goal of ChemBank is to provide life scientists unfettered access to biomedically relevant data and tools heretofore available primarily in the private sector

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems

    Processos de democracia direta: sim ou não? Os argumentos clássicos à luz da teoria e da prática

    Get PDF
    Regularmente surgem controvérsias sobre os processos de democracia direta, dos quais os mecanismos mais frequentes são a iniciativa popular, o plebiscito e o referendo. Por um lado, há autores que defendem a posição de que essas instituições tornam o jogo político mais lento, caro, confuso e ilegítimo; outros defendem a posição contrária e argumentam que processos de democracia direta são fundamentais para os cidadãos e a qualidade da democracia. O presente estudo analisa esse tema em torno de sete questões, baseadas em considerações teóricas e pesquisas empíricas: 1. A questão entre o minimalismo e o maximalismo democrático; 2. A concorrência entre maioria e minoria; 3. A concorrência entre as instituições representativas e os processos de democracia direta; 4. A questão da competência dos cidadãos; 5. A questão dos efeitos colaterais dos processos de democracia direta; 6. A questão do tamanho do eleitorado; 7. A questão dos custos dos processos de democracia direta. As sete questões são analisadas a partir de uma revisão bibliográfica que considera tanto fontes nacionais como internacionais. O estudo mostra que os processos de democracia direta podem ser um complemento para as instituições representativas em um sistema democrático. O bom desempenho dos plebiscitos, referendos e iniciativas populares depende tanto da regulamentação destes como também do desempenho das outras instituições políticas e da situação socioeconômica de um país. O estudo permite ampliar e aprofundar o debate sobre processos de democracia direta no Brasil

    Semantic Representation of RTBAC: Relationship-Based Access Control Model

    No full text

    BusiROLE: A Model for Integrating Business Roles into Identity Management

    Get PDF
    Abstract. The complexity of modern organisations ’ IT landscapes has grown dramatically over the last decades. Many enterprises initiate role projects in order to reorganise their access structures based on an organisation-wide Identity Management Infrastructure (IdMI). This paper surveys role models and related literature and identifies different role properties. It shows that current role models are not feasible for their usage in IdMIs. By implementing one single type of role they fail to take business requirements and different role perceptions into account. This paper improves the current situation by developing busiROLE, a role model that integrates various types of roles, fulfilling business- as well as IT requirements, and is hence usable in IdMIs

    Managing conflict of interest in service composition

    Get PDF
    Web services can be composed of other services in a highly dynamic manner. The existing role based authorization approaches have not adequately taken component services into account when managing access control for composite services. In this paper, we propose a service oriented conceptual model as an extension of role based access control that can facilitate the administration and management of access for service consumers as well as component services in composite web services. Various types of conflict of interest are identified due to the complicated relationships among service consumers and component services. A set of authorization rules are developed to prevent the conflict of interest. This research is a step forward to addressing the challenge in authorization in the context of composite web services
    corecore