首页 > 最新文献

First International Conference on Availability, Reliability and Security (ARES'06)最新文献

英文 中文
Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel 通过使用公共仓库元模型在逻辑级别表示数据仓库的安全和审计规则
E. Soler, R. Villarroel, J. Trujillo, E. Fernández-Medina, M. Piattini
Data warehouses (DWs) contained high sensitive data, and therefore, it is essential to specify security measures from the early stages of the DW design and enforce them. Access control models for transactional (relational) databases, based on tables, columns and rows, are not appropriate for DWs. Instead, security and audit rules defined for DWs must be specified based on the multidimensional (MD) modeling used to design data warehouses. So far, very few approaches represent security measures in the conceptual modeling of data warehouses form the early stages of a DW project. Moreover these security measures cannot be directly represented in the relational model for data warehouses, thereby having a semantic gap between the conceptual and logical schemas. In this paper, we present an extension of the relational model to consider security and audit measures represented in the conceptual modeling. To accomplish this, we based on the relational package of the common warehouse metamodel (CWM) and extend it to properly represent all security and audit rules defined in the conceptual modelling of data warehouses. Finally, to show the benefit of our approach, we apply our proposal to a health care case study.
数据仓库(DW)包含高度敏感的数据,因此,必须在DW设计的早期阶段指定安全措施并加以实施。基于表、列和行的事务性(关系)数据库的访问控制模型不适合dw。相反,必须根据用于设计数据仓库的多维(MD)建模来指定为数据仓库定义的安全和审计规则。到目前为止,在DW项目的早期阶段,很少有方法表示数据仓库概念建模中的安全措施。此外,这些安全措施不能直接在数据仓库的关系模型中表示,因此在概念模式和逻辑模式之间存在语义差距。在本文中,我们提出了关系模型的扩展,以考虑概念建模中表示的安全和审计措施。为了实现这一点,我们基于公共仓库元模型(CWM)的关系包,并对其进行扩展,以正确地表示数据仓库概念建模中定义的所有安全和审计规则。最后,为了展示我们的方法的好处,我们将我们的建议应用于一个医疗保健案例研究。
{"title":"Representing security and audit rules for data warehouses at the logical level by using the common warehouse metamodel","authors":"E. Soler, R. Villarroel, J. Trujillo, E. Fernández-Medina, M. Piattini","doi":"10.1109/ARES.2006.110","DOIUrl":"https://doi.org/10.1109/ARES.2006.110","url":null,"abstract":"Data warehouses (DWs) contained high sensitive data, and therefore, it is essential to specify security measures from the early stages of the DW design and enforce them. Access control models for transactional (relational) databases, based on tables, columns and rows, are not appropriate for DWs. Instead, security and audit rules defined for DWs must be specified based on the multidimensional (MD) modeling used to design data warehouses. So far, very few approaches represent security measures in the conceptual modeling of data warehouses form the early stages of a DW project. Moreover these security measures cannot be directly represented in the relational model for data warehouses, thereby having a semantic gap between the conceptual and logical schemas. In this paper, we present an extension of the relational model to consider security and audit measures represented in the conceptual modeling. To accomplish this, we based on the relational package of the common warehouse metamodel (CWM) and extend it to properly represent all security and audit rules defined in the conceptual modelling of data warehouses. Finally, to show the benefit of our approach, we apply our proposal to a health care case study.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128478661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Evaluating certification protocols in the partial database state machine 评估部分数据库状态机中的认证协议
A. Sousa, A. Correia, F. Moura, J. Pereira, R. Oliveira
Partial replication is an alluring technique to ensure the reliability of very large and geographically distributed databases while, at the same time, offering good performance. By correctly exploiting access locality most transactions become confined to a small subset of the database replicas thus reducing processing, storage access and communication overhead associated with replication. The advantages of partial replication have however to be weighted against the added complexity that is required to manage it. In fact, if the chosen replica configuration prevents the local execution of transactions or if the overhead of consistency protocols offsets the savings of locality, potential gains cannot be realized. These issues are heavily dependent on the application used for evaluation and render simplistic benchmarks useless. In this paper, we present a detailed analysis of partial database state machine (PDBSM) replication by comparing alternative partial replication protocols with full replication. This is done using a realistic scenario based on a detailed network simulator and access patterns from an industry standard database benchmark. The results obtained allow us to identify the best configuration for typical online transaction processing applications.
部分复制是一种很有吸引力的技术,它可以确保大型和地理上分布的数据库的可靠性,同时提供良好的性能。通过正确地利用访问局部性,大多数事务被限制在数据库副本的一个小子集中,从而减少了与复制相关的处理、存储访问和通信开销。但是,部分复制的优点必须与管理它所增加的复杂性相权衡。实际上,如果选择的副本配置阻止事务的本地执行,或者一致性协议的开销抵消了局部性节省的成本,则无法实现潜在的收益。这些问题严重依赖于用于评估的应用程序,并使简单的基准测试毫无用处。在本文中,我们通过比较可选的部分复制协议与完全复制协议,对部分数据库状态机(PDBSM)复制进行了详细的分析。这是使用基于详细的网络模拟器和来自行业标准数据库基准的访问模式的现实场景来完成的。获得的结果使我们能够确定典型在线事务处理应用程序的最佳配置。
{"title":"Evaluating certification protocols in the partial database state machine","authors":"A. Sousa, A. Correia, F. Moura, J. Pereira, R. Oliveira","doi":"10.1109/ARES.2006.60","DOIUrl":"https://doi.org/10.1109/ARES.2006.60","url":null,"abstract":"Partial replication is an alluring technique to ensure the reliability of very large and geographically distributed databases while, at the same time, offering good performance. By correctly exploiting access locality most transactions become confined to a small subset of the database replicas thus reducing processing, storage access and communication overhead associated with replication. The advantages of partial replication have however to be weighted against the added complexity that is required to manage it. In fact, if the chosen replica configuration prevents the local execution of transactions or if the overhead of consistency protocols offsets the savings of locality, potential gains cannot be realized. These issues are heavily dependent on the application used for evaluation and render simplistic benchmarks useless. In this paper, we present a detailed analysis of partial database state machine (PDBSM) replication by comparing alternative partial replication protocols with full replication. This is done using a realistic scenario based on a detailed network simulator and access patterns from an industry standard database benchmark. The results obtained allow us to identify the best configuration for typical online transaction processing applications.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129129187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Security analysis for IP-based Government Emergency Telephony Service 基于ip的政府紧急电话服务的安全性分析
Feng Cao, S. Malik
IP telephony has been adopted to replace the traditional circuit switch networks in various environments. Government Emergency Telephony Service (GETS) is one of the critical services currently provided in the traditional circuit switch network. GETS supports personnel from different organizations performing their critical missions including incidence response and prevention, national security, and emergency preparedness. Because of the convergent infrastructure for both voice and data, how to provide GETS over IP is one of the challenges for IP telephony to prove its flexibility and strength for large-scale critical services. In this study, we explore many aspects for providing IP-based GETS, such as availability, security, interoperability, and reliability. Based on IP multimedia subsystem (IMS) architecture, the requirements along with some analyses and recommendations are outlined to meet the strict demands for GETS in different convergent paradigms.
在各种环境中,IP电话已被用来取代传统的电路交换网络。政府紧急电话业务(GETS)是目前在传统电路交换网络中提供的关键业务之一。政府信息系统支持来自不同组织的人员执行其关键任务,包括事件响应和预防、国家安全和应急准备。由于语音和数据的融合基础设施,如何在IP上提供get是IP电话在大规模关键业务中证明其灵活性和强度的挑战之一。在本研究中,我们探讨了提供基于ip的get的许多方面,如可用性、安全性、互操作性和可靠性。本文以IP多媒体子系统(IMS)体系结构为基础,提出了满足不同融合范式下对get的严格要求的需求、分析和建议。
{"title":"Security analysis for IP-based Government Emergency Telephony Service","authors":"Feng Cao, S. Malik","doi":"10.1109/ARES.2006.124","DOIUrl":"https://doi.org/10.1109/ARES.2006.124","url":null,"abstract":"IP telephony has been adopted to replace the traditional circuit switch networks in various environments. Government Emergency Telephony Service (GETS) is one of the critical services currently provided in the traditional circuit switch network. GETS supports personnel from different organizations performing their critical missions including incidence response and prevention, national security, and emergency preparedness. Because of the convergent infrastructure for both voice and data, how to provide GETS over IP is one of the challenges for IP telephony to prove its flexibility and strength for large-scale critical services. In this study, we explore many aspects for providing IP-based GETS, such as availability, security, interoperability, and reliability. Based on IP multimedia subsystem (IMS) architecture, the requirements along with some analyses and recommendations are outlined to meet the strict demands for GETS in different convergent paradigms.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117305182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diagnosis of complex systems using ant colony decision Petri nets 基于蚁群决策Petri网的复杂系统诊断
C. Ciufudean, A. Graur, C. Filote, C. Turcu, V. Popa
Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A classic solution to solve DES's diagnosis is a stochastic Petri nets. Unfortunately, the solution of a stochastic Petri net is severely restricted by the size of its underlying Markov chain. On the other hand, it has been shown that foraging behavior of ant colonies can give rise to the shortest path, which will reduce the state explosion of stochastic Petri net. Therefore, a new model of stochastic Petri net, based on foraging behavior of real ant colonies is introduced in this paper. This model can contribute to the diagnosis, the performance analysis and design of supervisory control systems.
大型复杂系统的故障诊断是一项关键任务。本文提出了一种离散事件系统(DES)方法来解决故障诊断问题。求解DES诊断的经典方法是随机Petri网。不幸的是,随机Petri网的解受到其底层马尔可夫链大小的严重限制。另一方面,蚁群的觅食行为可以产生最短路径,这将减少随机Petri网的状态爆炸。因此,本文提出了一种基于真实蚁群觅食行为的随机Petri网模型。该模型可用于监控系统的诊断、性能分析和设计。
{"title":"Diagnosis of complex systems using ant colony decision Petri nets","authors":"C. Ciufudean, A. Graur, C. Filote, C. Turcu, V. Popa","doi":"10.1109/ARES.2006.52","DOIUrl":"https://doi.org/10.1109/ARES.2006.52","url":null,"abstract":"Failure diagnosis in large and complex systems is a critical task. A discrete event system (DES) approach to the problem of failure diagnosis is presented in this paper. A classic solution to solve DES's diagnosis is a stochastic Petri nets. Unfortunately, the solution of a stochastic Petri net is severely restricted by the size of its underlying Markov chain. On the other hand, it has been shown that foraging behavior of ant colonies can give rise to the shortest path, which will reduce the state explosion of stochastic Petri net. Therefore, a new model of stochastic Petri net, based on foraging behavior of real ant colonies is introduced in this paper. This model can contribute to the diagnosis, the performance analysis and design of supervisory control systems.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115734053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Adding security to a multiagent learning platform 为多智能体学习平台增加安全性
C. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, A. Ribeiro
This article discusses security requirements for open distributed learning environments. Security is a critical issue, especially for highly interactive applications based on heterogeneous distributed architectures. In e-learning applications, security mechanisms have as their main purpose to protect against illegal access to information, so that confidentiality and integrity can be guaranteed. While a lot of effort in the e-learning domain has been put into delivering infrastructure and providing content, security issues have hardly ever been considered. Taking this fact into account, we have implemented a multiagent platform (the PMA3), which constitutes an open distributed infrastructure that addresses security issues. PMA3 is founded on multiagent principles and FIPA standards, and has been used in the development of e-learning environments.
本文讨论开放分布式学习环境的安全需求。安全性是一个关键问题,特别是对于基于异构分布式体系结构的高度交互应用程序。在电子学习应用中,安全机制的主要目的是防止对信息的非法访问,从而保证信息的保密性和完整性。虽然在电子学习领域投入了大量精力来交付基础设施和提供内容,但安全问题几乎从未被考虑过。考虑到这一事实,我们实现了一个多代理平台(PMA3),它构成了一个解决安全问题的开放分布式基础设施。PMA3建立在多智能体原则和FIPA标准的基础上,并已用于电子学习环境的开发。
{"title":"Adding security to a multiagent learning platform","authors":"C. Webber, Maria de Fátima Webber do Prado Lima, Marcos E. Casa, A. Ribeiro","doi":"10.1109/ARES.2006.24","DOIUrl":"https://doi.org/10.1109/ARES.2006.24","url":null,"abstract":"This article discusses security requirements for open distributed learning environments. Security is a critical issue, especially for highly interactive applications based on heterogeneous distributed architectures. In e-learning applications, security mechanisms have as their main purpose to protect against illegal access to information, so that confidentiality and integrity can be guaranteed. While a lot of effort in the e-learning domain has been put into delivering infrastructure and providing content, security issues have hardly ever been considered. Taking this fact into account, we have implemented a multiagent platform (the PMA3), which constitutes an open distributed infrastructure that addresses security issues. PMA3 is founded on multiagent principles and FIPA standards, and has been used in the development of e-learning environments.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125448191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Systematic error detection for RFID reliability RFID可靠性的系统错误检测
Sozo Inoue, H. Yasuura, D. Hagiwara
In this paper, we propose an approach to increase the reliability of RFID (radio frequency identification), not relying on the performance of each devices, but relying on a mechanism of entire networked system, which manages objects and/or people in the real world with RFID tags. We identified there exist many factors to reduce the accurate identifications of RFID tags, which results in the reduction of the total-system reliability. Moreover, we show the effect of our approach in diverse parameters such as the number of misidentifications, the length of transportations, the number of RFID readers.
在本文中,我们提出了一种提高RFID(射频识别)可靠性的方法,该方法不依赖于每个设备的性能,而是依赖于整个网络系统的机制,该机制通过RFID标签管理现实世界中的对象和/或人。我们发现存在许多因素会降低RFID标签的准确识别,从而导致整个系统可靠性的降低。此外,我们还展示了我们的方法在不同参数中的效果,如错误识别的数量、运输的长度、RFID读取器的数量。
{"title":"Systematic error detection for RFID reliability","authors":"Sozo Inoue, H. Yasuura, D. Hagiwara","doi":"10.1109/ARES.2006.128","DOIUrl":"https://doi.org/10.1109/ARES.2006.128","url":null,"abstract":"In this paper, we propose an approach to increase the reliability of RFID (radio frequency identification), not relying on the performance of each devices, but relying on a mechanism of entire networked system, which manages objects and/or people in the real world with RFID tags. We identified there exist many factors to reduce the accurate identifications of RFID tags, which results in the reduction of the total-system reliability. Moreover, we show the effect of our approach in diverse parameters such as the number of misidentifications, the length of transportations, the number of RFID readers.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127186876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
An integral IT continuity framework for undisrupted business operations 一个完整的IT连续性框架,用于不间断的业务操作
R. Helms, S. V. Oorschot, J. Herweijer, M. Plas
In this paper we present an IT continuity framework which deals with business continuity issues within organizations. The approach is based on an optimal mix between five groups of continuity measures that are associated with three risk clusters. Most organizations do have some continuity measures in case their level of operation is disrupted. However, these continuity measures are often isolated from each other and do not form an integral approach. They neither do cover the entire incident field. This framework supports the uniformity that exists among known continuity measures. Because of its generic nature, IT service providers can use the framework to organize their (existing) IT continuity portfolio in order to provide an optimal continuity solution to their customers.
在本文中,我们提出了一个处理组织内业务连续性问题的IT连续性框架。该方法基于与三个风险集群相关的五组连续性措施之间的最佳组合。大多数组织确实有一些连续性措施,以防他们的操作水平中断。然而,这些连续性措施往往是相互孤立的,不能形成一个整体的方法。它们也没有覆盖整个事故现场。该框架支持存在于已知连续性措施之间的一致性。由于其通用性,IT服务提供商可以使用该框架来组织其(现有的)IT连续性投资组合,以便为其客户提供最佳的连续性解决方案。
{"title":"An integral IT continuity framework for undisrupted business operations","authors":"R. Helms, S. V. Oorschot, J. Herweijer, M. Plas","doi":"10.1109/ARES.2006.27","DOIUrl":"https://doi.org/10.1109/ARES.2006.27","url":null,"abstract":"In this paper we present an IT continuity framework which deals with business continuity issues within organizations. The approach is based on an optimal mix between five groups of continuity measures that are associated with three risk clusters. Most organizations do have some continuity measures in case their level of operation is disrupted. However, these continuity measures are often isolated from each other and do not form an integral approach. They neither do cover the entire incident field. This framework supports the uniformity that exists among known continuity measures. Because of its generic nature, IT service providers can use the framework to organize their (existing) IT continuity portfolio in order to provide an optimal continuity solution to their customers.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127518383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Representing levels of abstraction to facilitate the secure multidimensional modeling 表示抽象级别以促进安全的多维建模
R. Villarroel, E. Soler, E. Fernández-Medina, M. Piattini, J. Trujillo
In most real world data warehouses (DWs) projects, security aspects are issues that usually rely on DBMS administrators. We argue that the design of security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a multidimensional (MD) model (e.g. dimensions, facts, attributes, and so on). In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suit user security requirements. In this paper, we will present an extension of the Unified Modeling Language (UML) using a UML profile to represent multidimensional and security aspects of our conceptual modeling. Our approach proposes the use of UML packages in order to group classes together into higher level units creating different levels of abstraction, and therefore, simplifying the final model. In this way, when modeling complex and large DWs systems, the designer is not restricted to use flat UML class diagrams. Finally, we would show an example to illustrate the applicability of our proposal.
在大多数现实世界的数据仓库项目中,安全方面的问题通常依赖于DBMS管理员。我们认为,在DW项目的早期阶段,安全方面的设计应该与DW的概念建模一起考虑,并能够将用户安全信息附加到多维(MD)模型的基本结构上(例如维度、事实、属性等)。这样,我们就能够以半自动或自动的方式将这些信息生成到目标平台中,并且最终的DW将更好地满足用户的安全需求。在本文中,我们将展示统一建模语言(UML)的扩展,使用UML概要文件来表示我们概念建模的多维和安全方面。我们的方法建议使用UML包,以便将类分组到更高级别的单元中,从而创建不同的抽象级别,从而简化最终的模型。这样,当对复杂和大型的DWs系统建模时,设计人员就不局限于使用平面的UML类图。最后,我们将展示一个例子来说明我们的建议的适用性。
{"title":"Representing levels of abstraction to facilitate the secure multidimensional modeling","authors":"R. Villarroel, E. Soler, E. Fernández-Medina, M. Piattini, J. Trujillo","doi":"10.1109/ARES.2006.109","DOIUrl":"https://doi.org/10.1109/ARES.2006.109","url":null,"abstract":"In most real world data warehouses (DWs) projects, security aspects are issues that usually rely on DBMS administrators. We argue that the design of security aspects should be considered together with the conceptual modeling of DWs from the early stages of a DW project, and being able to attach user security information to the basic structures of a multidimensional (MD) model (e.g. dimensions, facts, attributes, and so on). In this way, we would be able to generate this information in a semi or automatic way into a target platform and the final DW will better suit user security requirements. In this paper, we will present an extension of the Unified Modeling Language (UML) using a UML profile to represent multidimensional and security aspects of our conceptual modeling. Our approach proposes the use of UML packages in order to group classes together into higher level units creating different levels of abstraction, and therefore, simplifying the final model. In this way, when modeling complex and large DWs systems, the designer is not restricted to use flat UML class diagrams. Finally, we would show an example to illustrate the applicability of our proposal.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123768008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Application of the digraph method in system fault diagnostics 有向图法在系统故障诊断中的应用
There is an increasing demand for highly reliable systems in the safety conscious climate of today's world. When a fault does occur there are two desirable outcomes. Firstly, detection is required to discover whether functionality at a pre-determined level can be maintained and secondly, a necessary repair strategy is sought to minimise system disruption. Traditional focus on fault diagnosis has been through a sequential testing procedure or via real time mechanisms. The limitations have incorporated the issue of combining real time diagnosis; enabling fast analysis, with multiple fault causes. These issues are typical of critical situations within current complex system architectures. The diagnostic method suggested in this paper uses the digraph procedure, which represents the propagation of inputs through a system. The procedure involves generating a model; linking nodes referring to system parameters and determining the relationship(s) which connect the nodes. Fault detection occurs by means of tracing through the diagram. The method has been applied to a water tank system during steady state operation. Diagnosis is conducted by comparing readings from sensors in the system with expected readings, given the system mode of operation. The results demonstrate the effective use of this technique for fault diagnosis of the application system.
在当今世界的安全意识气候中,对高度可靠的系统的需求日益增加。当故障确实发生时,有两种理想的结果。首先,需要检测以发现是否可以维持预定水平的功能,其次,寻求必要的修复策略以最大限度地减少系统中断。传统的故障诊断是通过顺序测试程序或实时机制进行的。这些限制包括结合实时诊断的问题;支持多种故障原因的快速分析。这些问题是当前复杂系统架构中典型的关键情况。本文提出的诊断方法使用有向图程序,它表示输入在系统中的传播。这个过程包括生成一个模型;连接节点指的是系统参数,并确定连接节点的关系。故障检测是通过图中的跟踪来实现的。该方法已应用于某水箱系统稳态运行。在给定系统运行模式的情况下,通过比较系统中传感器的读数与预期读数来进行诊断。结果表明,该技术可有效地用于应用系统的故障诊断。
{"title":"Application of the digraph method in system fault diagnostics","authors":"","doi":"10.1109/ARES.2006.31","DOIUrl":"https://doi.org/10.1109/ARES.2006.31","url":null,"abstract":"There is an increasing demand for highly reliable systems in the safety conscious climate of today's world. When a fault does occur there are two desirable outcomes. Firstly, detection is required to discover whether functionality at a pre-determined level can be maintained and secondly, a necessary repair strategy is sought to minimise system disruption. Traditional focus on fault diagnosis has been through a sequential testing procedure or via real time mechanisms. The limitations have incorporated the issue of combining real time diagnosis; enabling fast analysis, with multiple fault causes. These issues are typical of critical situations within current complex system architectures. The diagnostic method suggested in this paper uses the digraph procedure, which represents the propagation of inputs through a system. The procedure involves generating a model; linking nodes referring to system parameters and determining the relationship(s) which connect the nodes. Fault detection occurs by means of tracing through the diagram. The method has been applied to a water tank system during steady state operation. Diagnosis is conducted by comparing readings from sensors in the system with expected readings, given the system mode of operation. The results demonstrate the effective use of this technique for fault diagnosis of the application system.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121620568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce 关于b2c电子商务中隐私和灵活性的身份验证和授权基础设施的参考模型
Christian Schläger, Thomas Nowey, J. A. Montenegro
Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, grid computing, company networks, and above all eCommerce applications. Products and concepts vary in architecture, security features, target group, and usability containing different strengths and weaknesses. In addition security needs have changed in communication and business processes. Security on the Internet is no longer defined as only security measures for an eCommerce provider against an untrustworthy customer but also vice versa. Consequently, privacy, data canniness, and security are demands in this area. The authors define criteria for an eCommerce provider federation using an AAI with a maximum of privacy and flexibility. The criteria is derived concentrating on b2c eCommerce applications fulfilling the demands. In addition to best practices found, XACML policies and an attribute infrastructure are deployed. Among the evaluated AAIs are Shibboleth, Microsoft Passport, the Liberty Alliance Framework, and PERMIS.
身份验证和授权基础设施(aai)在整个互联网中获得了发展势头。已经为各种场景提出了解决方案,其中包括学术界、网格计算、公司网络以及最重要的电子商务应用程序。产品和概念在体系结构、安全特性、目标群体和可用性方面各不相同,包含不同的优缺点。此外,通信和业务流程中的安全需求也发生了变化。互联网上的安全不再仅仅定义为电子商务提供商针对不可信客户的安全措施,反之亦然。因此,隐私、数据谨慎性和安全性是这一领域的需求。作者定义了使用具有最大隐私性和灵活性的AAI的电子商务提供商联盟的标准。该标准集中于满足需求的b2c电子商务应用程序。除了找到的最佳实践之外,还部署了XACML策略和属性基础结构。被评估的人工智能包括Shibboleth、Microsoft Passport、Liberty Alliance Framework和PERMIS。
{"title":"A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce","authors":"Christian Schläger, Thomas Nowey, J. A. Montenegro","doi":"10.1109/ARES.2006.13","DOIUrl":"https://doi.org/10.1109/ARES.2006.13","url":null,"abstract":"Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, grid computing, company networks, and above all eCommerce applications. Products and concepts vary in architecture, security features, target group, and usability containing different strengths and weaknesses. In addition security needs have changed in communication and business processes. Security on the Internet is no longer defined as only security measures for an eCommerce provider against an untrustworthy customer but also vice versa. Consequently, privacy, data canniness, and security are demands in this area. The authors define criteria for an eCommerce provider federation using an AAI with a maximum of privacy and flexibility. The criteria is derived concentrating on b2c eCommerce applications fulfilling the demands. In addition to best practices found, XACML policies and an attribute infrastructure are deployed. Among the evaluated AAIs are Shibboleth, Microsoft Passport, the Liberty Alliance Framework, and PERMIS.","PeriodicalId":106780,"journal":{"name":"First International Conference on Availability, Reliability and Security (ARES'06)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130646421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
期刊
First International Conference on Availability, Reliability and Security (ARES'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1