77 research outputs found

    RALph: A Graphical Notation for Resource Assignments in Business Processes

    Get PDF
    The business process (BP) resource perspective deals with the management of human as well as non-human resources throughout the process lifecycle. Although it has received increasing attention recently, there exists no graphical notation for it up until now that is both expressive enough to cover well-known resource selection conditions and independent of the BP modelling language. In this paper, we introduce RALph, a graphical notation for the assignment of human resources to BP activities. We define its semantics by mapping this notation to a language that has been formally defined in description logics, which enables its automated analysis. Although we show how RALph can be seamlessly integrated with BPMN, it is noteworthy that the notation is independent of the BP modelling language. Altogether, RALph will foster the visual modelling of the resource perspective in BP

    Composing Trust Models towards Interoperable Trust Management

    Get PDF
    Part 2: Full PapersInternational audienceComputational trust is a central paradigm in today's Internet as our modern society is increasingly relying upon online transactions and social net- works. This is indeed leading to the introduction of various trust management systems and associated trust models, which are customized according to their target applications. However, the heterogeneity of trust models prevents exploiting the trust knowledge acquired in one context in another context although this would be beneficial for the digital, ever-connected environment. This is such an issue that this paper addresses by introducing an approach to achieve interoperability between heterogeneous trust management systems. Specifically, we define a trust meta-model that allows the rigorous specification of trust models as well as their composition. The resulting composite trust models enable heterogeneous trust management systems to interoperate transparently through mediators

    ChemBank: a small-molecule screening and cheminformatics resource database

    Get PDF
    ChemBank (http://chembank.broad.harvard.edu/) is a public, web-based informatics environment developed through a collaboration between the Chemical Biology Program and Platform at the Broad Institute of Harvard and MIT. This knowledge environment includes freely available data derived from small molecules and small-molecule screens and resources for studying these data. ChemBank is unique among small-molecule databases in its dedication to the storage of raw screening data, its rigorous definition of screening experiments in terms of statistical hypothesis testing, and its metadata-based organization of screening experiments into projects involving collections of related assays. ChemBank stores an increasingly varied set of measurements derived from cells and other biological assay systems treated with small molecules. Analysis tools are available and are continuously being developed that allow the relationships between small molecules, cell measurements, and cell states to be studied. Currently, ChemBank stores information on hundreds of thousands of small molecules and hundreds of biomedically relevant assays that have been performed at the Broad Institute by collaborators from the worldwide research community. The goal of ChemBank is to provide life scientists unfettered access to biomedically relevant data and tools heretofore available primarily in the private sector

    Fog computing security: a review of current applications and security solutions

    Get PDF
    Fog computing is a new paradigm that extends the Cloud platform model by providing computing resources on the edges of a network. It can be described as a cloud-like platform having similar data, computation, storage and application services, but is fundamentally different in that it is decentralized. In addition, Fog systems are capable of processing large amounts of data locally, operate on-premise, are fully portable, and can be installed on heterogeneous hardware. These features make the Fog platform highly suitable for time and location-sensitive applications. For example, Internet of Things (IoT) devices are required to quickly process a large amount of data. This wide range of functionality driven applications intensifies many security issues regarding data, virtualization, segregation, network, malware and monitoring. This paper surveys existing literature on Fog computing applications to identify common security gaps. Similar technologies like Edge computing, Cloudlets and Micro-data centres have also been included to provide a holistic review process. The majority of Fog applications are motivated by the desire for functionality and end-user requirements, while the security aspects are often ignored or considered as an afterthought. This paper also determines the impact of those security issues and possible solutions, providing future security-relevant directions to those responsible for designing, developing, and maintaining Fog systems

    Processos de democracia direta: sim ou não? Os argumentos clássicos à luz da teoria e da prática

    Get PDF
    Regularmente surgem controvérsias sobre os processos de democracia direta, dos quais os mecanismos mais frequentes são a iniciativa popular, o plebiscito e o referendo. Por um lado, há autores que defendem a posição de que essas instituições tornam o jogo político mais lento, caro, confuso e ilegítimo; outros defendem a posição contrária e argumentam que processos de democracia direta são fundamentais para os cidadãos e a qualidade da democracia. O presente estudo analisa esse tema em torno de sete questões, baseadas em considerações teóricas e pesquisas empíricas: 1. A questão entre o minimalismo e o maximalismo democrático; 2. A concorrência entre maioria e minoria; 3. A concorrência entre as instituições representativas e os processos de democracia direta; 4. A questão da competência dos cidadãos; 5. A questão dos efeitos colaterais dos processos de democracia direta; 6. A questão do tamanho do eleitorado; 7. A questão dos custos dos processos de democracia direta. As sete questões são analisadas a partir de uma revisão bibliográfica que considera tanto fontes nacionais como internacionais. O estudo mostra que os processos de democracia direta podem ser um complemento para as instituições representativas em um sistema democrático. O bom desempenho dos plebiscitos, referendos e iniciativas populares depende tanto da regulamentação destes como também do desempenho das outras instituições políticas e da situação socioeconômica de um país. O estudo permite ampliar e aprofundar o debate sobre processos de democracia direta no Brasil

    On the definition of access control requirements for grid and cloud computing systems

    No full text
    The emergence of grid and cloud computing systems has introduced new security concepts, so it requires new access control approaches. Traditional systems engineering processes can be enriched with helper approaches that can facilitate the definition of access control requirements in such complex environments. Looking towards a holistic approach on the definition of access control requirements, we propose a four-layer conceptual categorization. In addition, an example is given so that to demonstrate the utilization of the proposed categorization in a grid scenario for defining access control requirements, and evaluate their fulfilment vis-à-vis contemporary employed access control approaches

    State based access control for open e-governance

    No full text
    corecore