151 research outputs found

    Multi-representation Ontology in the Context of Enterprise Information Systems

    Get PDF
    International audienceIn the last decade, ontologies as shared common vocabulary played a major role in many AI applications and informationintegration for heterogeneous, distributed systems. The problems of integrating and developing information systems anddatabases in heterogeneous, distributed environment have been translated in the technical perspectives as system’sinteroperability. Ontologies, however, are foreseen to play a key role in resolving partially the semantic conflicts anddifferences that exist among systems. Domain ontologies, however, are constructed by capturing a set of concepts and theirlinks according to various criteria such as the abstraction paradigm, the granularity scale, interest of user communities, andthe perception of the ontology developer. Thus, different applications of the same domain end up having severalrepresentations of the same real world phenomenon. Multi-representation ontology is an ontology (or ontologies) thatcharacterizes ontological concept by a variable set of properties (static and dynamic) or attributes in several contexts and/ orin several scales of granularity. This paper introduces the formalism used for defining the paradigm of multi-representationontology and shows the manifestation of this paradigm with Enterprise Information Systems

    EDOC - Rule-Based Modeling and Verification of Business Processes Using ECAPE Net.

    Get PDF
    In this paper we discuss the need to ensure that the; business processes are at the same time robust and; agile. The aim of our work is to improve the business; process management by offering a flexible modeling to; implement changes quickly and verification of a; business process by identifying errors in the process; specification. To achieve these objectives, we propose; a new model grounded on a new formalism issued from; ECA model. In this model, a business rule has an; Event/Condition/Action/Post condition/Event triggered; (ECAPE) formalism. To represent this formalism as; well as the functioning in a business process, a new; colored Petri net, called ECAPE net, is used in order; to define formally a business process and to detect; errors by taking account of the identified properties of; this ECAPE net

    A rule-based approach to model and verify flexible business processes

    Get PDF
    Efficient organisations need to ensure that their business processes are flexible so that these processes can easily accommodate changes in regulations and policies. Appropriate techniques to model and verify these processes are required. In this paper, we present a rule-based approach, which is built upon the event-condition-action model (ECA) and supported by a rule-based business process definition language (RbBPDL). In this approach, rules, which specify business processes, are represented using the event-condition-action-post- condition-event (ECAPE) model. This allows translating a process into a graph of rules that is used to check how flexible a business process is, and estimating this process\u27s cost of changes. This cost is based on a rule change cost model (R2CM) that will be presented in this paper. In addition, the ECAPE model allows the translation of a process into a coloured Petri net, called ECAPE net, in order to verify process functioning prior to any deployment. Copyright © 2011 Inderscience Enterprises Ltd.

    A rule-based modeling for the description of flexible and self-healing business processes

    Get PDF
    In this paper we discuss the importance of ensuring that business processes are label robust and agile at the same time robust and agile. To this end, we consider reviewing the way business processes are managed. For instance we consider offering a flexible way to model processes so that changes in regulations are handled through some self-healing mechanisms. These changes may raise exceptions at run-time if not properly reflected on these processes. To this end we propose a new rule based model that adopts the ECA rules and is built upon formal tools. The business logic of a process can be summarized with a set of rules that implement an organization\u27s policies. Each business rule is formalized using our ECAPE formalism (Event-Condition-Action-Post condition- post Event). This formalism allows translating a process into a graph of rules that is analyzed in terms of reliably and flexibility. © 2009 Springer

    Cross-Layer Routing Based on Semantic Web Services Discovery with Energy Evaluation and Optimization in MANET

    Get PDF
    The web services discovery process in mobile adhoc networks is considered as a very difficult challenge due to the continuous change in the topology of the network and also the lack of a fixed central directory for publishing web services. Several approaches have been proposed which are based on either keywords or identifiers representing the service to be searched or by using a specific scenario of discovery. All of those proposed solutions try to respect the constraints of ad hoc networks such as energy, bandwidth, throughput ... etc. In this paper we present our new proposed model for measuring the cost of the overall energy consumption in ad hoc networks depending on the web services discovery protocols. We also present a new optimized web services discovery protocol in MANET based on cross_layer routing techniques with the dissemination in the routing process at the same time the semantic web services information and a Discovery_Diameter parameter that we have proposed to limit the area of discovery in the network. Finally, we present simulation results of our defined approach showing a significant optimization of the energy consumption level and the average throughput

    Privacy-aware in the IoT applications: A systematic literature review

    Get PDF
    © 2017, Springer International Publishing AG. The Internet of Things (IoT) emerged as a paradigm in which smart things collaborate among them and with other physical and virtual objects using the Internet in order to perform high level tasks. These things appear in a variety of application domains, including smart grid, health care and smart spaces where several parties share data in order to tackle specific tasks. Data in such domains are rich in sensitive data and data owner-specific habits. Thus, IoT raises concerns about privacy and data protection. This paper reports on a systematic literature review of privacy preserving solutions used in Cooperative Information Systems (CIS) in the IoT field. To do so, and after retrieving scientific productions on the subject, we classify the results according to several facets. In this paper, we consider a subset of them: (i) data life cycle, (ii) privacy preserving techniques and (iii) ISO privacy principles. We combine the facets then express and analyze the results as bubble charts. We analyze the proposed solutions in terms of the techniques they deployed and the privacy principles they covered according to the ISO standard and the data privacy laws and regulations of the European Commission on the Protection of Personal Data. Finally, we identifies recommendations to involve privacy principle coverage and security requirement fulfillment in the IoT applications

    Linked USDL Extension for Describing Business Services and Users\u27 Requirements in a Cloud Context

    Get PDF
    Linked Unified Service Description Language (Linked USDL) provides a comprehensive way for describing services from operational, technical, and business perspectives. However, this description treats services as isolated components that offer functionalities only without emphasis on how they are used. This paper discusses how to extend Linked USDL in a way that permits to describe the services of a marketplace in support of automating the provisioning of service-oriented cloud-based business applications along with satisfying users\u27 requirements. The marketplace consists of business services that can be composed and specialized services that act on behalf of the infrastructure upon which these applications are deployed. A set of experiments demonstrating the use of the extended Linked USDL are also presented in the paper

    Data Privacy Based on IoT Device Behavior Control Using Blockchain

    Get PDF
    The Internet of Things (IoT) is expected to improve the individuals’ quality of life. However, ensuring security and privacy in the IoT context is a non-trivial task due to the low capability of these connected devices. Generally, the IoT device management is based on a centralized entity that validates communication and connection rights. Therefore, this centralized entity can be considered as a single point of failure. Yet, in the case of distributed approaches, it is difficult to delegate the right validation to IoT devices themselves in untrustworthy IoT environments. Fortunately, the blockchain may provide decentralization of overcoming the trust problem while designing a privacy-preserving system. To this end, we propose a novel privacy-preserving IoT device management framework based on the blockchain technology. In the proposed system, the IoT devices are controlled by several smart contracts that validate the connection rights according to the privacy permission settings predefined by the data owners and the stored record array of detected misbehavior of each IoT device. In fact, smart contracts can immediately detect the devices that have vulnerabilities and have been hacked or pose a threat to the IoT network. Therefore, the data owner’s privacy is preserved by enforcing the control over the own devices. For validation purposes, we deploy the proposed solution on a private Ethereum blockchain and give the performance evaluatio

    Studying Enterprise Information Systems Semantic Sharing Problem

    No full text
    International audienceNowadays, global environment information systems and other global technologies are creating new opportunities for organizational coordination and innovation. In essence, this originated area of research is concerned with the study of information systems as tools supporting the business processes and management of organizations. The purpose of this paper is to bring to the surface the common problems of existing enterprise information systems. Particularly, it focuses on the problem of semantics sharing, and its amplitude in terms of slowing down the effectiveness of cooperative applications. It pinpoints how some research advances (e.g. ontologies and context) can be used for resolving these problems. The work aims at showing that using an appropriate and solid theoretical foundation can provide useful outcome for research into enterprise information system. Therefore, we are arguing the design of a complete distributed systems architecture that takes into account ontologies and context to improve the interoperability and the reusability between these systems

    "A Data Warehouse Architecture Using an XML-based ETL":

    No full text
    International audienceXML enables to migrate data from relational databasesand other sources into future applications. It integratesstructured and unstructured data to present newapplication and knowledge management opportunities.By another way, data warehousing is an essentialelement of decision support, which has increasinglybecome a focus of the database industry. Meta-datacontains data dictionary and repository; it describeswarehousing process, data storage and informationdelivery. This paper defines how XML impacts andchanges the concept of the data warehouse. It describesan XML based tool for a structured, reusable and moreefficient data warehouse (DW). Otherwise, it shows theability to specify the warehousing tools with rulesdefined in the meta-data dictionary
    • …
    corecore