首页 > 最新文献

2009 International Conference on Information Management and Engineering最新文献

英文 中文
Security of Internet Banking Services and its Linkage with Users' Trust: A Case Study of Parsian Bank of Iran and CIMB Bank of Malaysia 互联网银行服务的安全性及其与用户信任的关联——以伊朗巴黎银行和马来西亚联昌银行为例
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.153
A. Sanayei, A. Noroozi
Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking. Also the differences between traditional and internet banking are more obvious in Malaysia. Therefore, we separately investigated the users of Parsian Bank of Iran- Isfahan Province and CIMB Bank of Malaysia-Kuala Lumpur. For the purpose of validating or disproving the research hypotheses, SPSS software and one sample t-test, two sample t-test, one way ANOVA and correlation analysis was used. Due to the nature of internet banking that occurs in the web network, not face to face, expected security is very important. Therefore, the linkage between security and trust is being investigated and the results show a positive correlation between these two variables. Statistical results show that, age and the level of education affected the attitude toward internet banking. But there is no statistical significant difference of the attitude between genders.
如今科技发展迅速,总是给我们的日常生活增添新的维度。通过这种方式,网上银行系统可以让用户尽可能快捷地管理账户余额和账户间转账等财务事务。本研究是在伊朗和马来西亚进行的,马来西亚的基本结构引起了更多的关注,以及使用这种新的银行方式。此外,传统银行和网上银行之间的差异在马来西亚更为明显。因此,我们分别调查了伊朗巴黎银行-伊斯法罕省和马来西亚联昌银行-吉隆坡的用户。为了验证或反驳研究假设,使用SPSS软件,并使用单样本t检验、两样本t检验、单因素方差分析和相关分析。由于网上银行的性质是发生在web网络中,而不是面对面的,因此预期的安全性非常重要。因此,安全与信任之间的联系正在被调查,结果显示这两个变量之间存在正相关关系。统计结果显示,年龄和受教育程度影响了人们对网上银行的态度。但性别间的态度差异无统计学意义。
{"title":"Security of Internet Banking Services and its Linkage with Users' Trust: A Case Study of Parsian Bank of Iran and CIMB Bank of Malaysia","authors":"A. Sanayei, A. Noroozi","doi":"10.1109/ICIME.2009.153","DOIUrl":"https://doi.org/10.1109/ICIME.2009.153","url":null,"abstract":"Nowadays technology is growing fast and always adds new dimensions to our daily lives. In this way, Internet banking systems allow users to manage financial affairs such as checking account balances and transferring money between accounts as fast and easy as it can be. This study is done in Iran and Malaysia, the basic structure in Malaysia causes more concern, as well as use of this new way of banking. Also the differences between traditional and internet banking are more obvious in Malaysia. Therefore, we separately investigated the users of Parsian Bank of Iran- Isfahan Province and CIMB Bank of Malaysia-Kuala Lumpur. For the purpose of validating or disproving the research hypotheses, SPSS software and one sample t-test, two sample t-test, one way ANOVA and correlation analysis was used. Due to the nature of internet banking that occurs in the web network, not face to face, expected security is very important. Therefore, the linkage between security and trust is being investigated and the results show a positive correlation between these two variables. Statistical results show that, age and the level of education affected the attitude toward internet banking. But there is no statistical significant difference of the attitude between genders.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
To Investigate the Success and Failure Factors of ERP Implementation within Malaysian Small and Medium Enterprises 探讨马来西亚中小企业实施ERP成功与失败的因素
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.66
Ali Noudoostbeni, N. Yasin, H. S. Jenatabadi
In recent years ERP, as a comprehensive new system, has been used by many Malaysian companies. It has    been successful in some and in some others it has failed. This article assesses 15 success factors and 8 failure factors in SME companies and tries to recognize the effective ones. The results show that the two most important failure factors in implementing ERP in Malaysian SMEs are 'poor planning or poor management' and 'inappropriate training methods' and the most important success factors are  'Implementing team's teamwork and composition' and ' Effective training of users'. It could be conducted that team work is a key success factor in Malaysian SMEs and also training is of vital importance. As a result, by a sound investment and effective trainings we may guarantee the success of ERP in SMEs in Malaysia, failure to do so will lead to a defeat for ERP in Malaysian setting.
近年来,ERP作为一个综合性的新系统,已经被许多马来西亚公司所采用。它在一些地方取得了成功,在另一些地方却失败了。本文对中小企业的15个成功因素和8个失败因素进行了评估,并试图找出有效因素。结果表明,马来西亚中小企业实施ERP的两个最重要的失败因素是“计划或管理不善”和“不适当的培训方法”,最重要的成功因素是“实施团队的团队合作和组成”和“有效的用户培训”。可以说,团队合作是马来西亚中小企业成功的关键因素,培训也至关重要。因此,通过合理的投资和有效的培训,我们可以保证ERP在马来西亚中小企业中的成功,否则将导致ERP在马来西亚环境中的失败。
{"title":"To Investigate the Success and Failure Factors of ERP Implementation within Malaysian Small and Medium Enterprises","authors":"Ali Noudoostbeni, N. Yasin, H. S. Jenatabadi","doi":"10.1109/ICIME.2009.66","DOIUrl":"https://doi.org/10.1109/ICIME.2009.66","url":null,"abstract":"In recent years ERP, as a comprehensive new system, has been used by many Malaysian companies. It has    been successful in some and in some others it has failed. This article assesses 15 success factors and 8 failure factors in SME companies and tries to recognize the effective ones. The results show that the two most important failure factors in implementing ERP in Malaysian SMEs are 'poor planning or poor management' and 'inappropriate training methods' and the most important success factors are  'Implementing team's teamwork and composition' and ' Effective training of users'. It could be conducted that team work is a key success factor in Malaysian SMEs and also training is of vital importance. As a result, by a sound investment and effective trainings we may guarantee the success of ERP in SMEs in Malaysia, failure to do so will lead to a defeat for ERP in Malaysian setting.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 69
Leading Through NLP 通过NLP引领
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.17
Manobia Yousaf, Hadia Chaudhry, A. Haider
This paper aims to describe a technique that can make one’s leadership qualities more effective. For this purpose the paper will mainly focus on "Neuro Linguistic Programming" Techniques and portray past great leaders as a supportive argument. Leading is the ability to influence others to follow, by developing trust and commonality. "Neuro Linguistic Programming" effectively helps in developing the perception of a person as a leader by his followers. It also acts as an effective language for thinking patterns.
本文旨在描述一种技术,可以使一个人的领导素质更有效。为此,本文将主要关注“神经语言编程”技术,并将过去的伟大领导人描绘为一个支持性的论点。领导是通过培养信任和共性来影响他人跟随的能力。“神经语言编程”有效地帮助一个人的追随者发展对他作为领导者的看法。它也是一种有效的思维模式语言。
{"title":"Leading Through NLP","authors":"Manobia Yousaf, Hadia Chaudhry, A. Haider","doi":"10.1109/ICIME.2009.17","DOIUrl":"https://doi.org/10.1109/ICIME.2009.17","url":null,"abstract":"This paper aims to describe a technique that can make one’s leadership qualities more effective. For this purpose the paper will mainly focus on \"Neuro Linguistic Programming\" Techniques and portray past great leaders as a supportive argument. Leading is the ability to influence others to follow, by developing trust and commonality. \"Neuro Linguistic Programming\" effectively helps in developing the perception of a person as a leader by his followers. It also acts as an effective language for thinking patterns.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122897671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Three Layers Design Guideline for Mobile Application 移动应用程序的三层设计指南
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.99
Nurul Zakiah binti Ayob, Ab Razak Che Hussin, H. M. Dahlan
User interface is one of the main challenges for designing mobile application. The importance of user interface is all about to retain user's loyalty which can be gained by offer user friendly interface and usability. The research focus on main issues of designing mobile application which is "how to display all the information and elements on the small screen of mobile device?". This research aims to study and understand mobile human-computer interaction and other issues associated with mobile commerce application by understanding the mobile commerce environment to propose framework for mobile application. In terms of designing for mobile application, the authors has adopt the four existing guideline. There are Shneiderman’s Golden Rules of Interface Design for Mobile, Seven Usability Guideline for Mobile Device, Human-Centred Design and W3C Mobile Web Best Practices . This paper ends with future work that based on the proposed framework.
用户界面是设计移动应用程序的主要挑战之一。用户界面的重要性在于通过提供友好的用户界面和可用性来保持用户的忠诚度。研究的重点是移动应用设计的主要问题,即“如何在移动设备的小屏幕上显示所有的信息和元素?”本研究旨在通过对移动商务环境的了解,研究和理解移动人机交互等与移动商务应用相关的问题,提出移动应用的框架。在移动应用程序设计方面,作者采用了现有的四条准则。其中包括Shneiderman的《移动设备界面设计黄金法则》、《移动设备可用性七大指南》、《以人为本的设计》和《W3C移动网络最佳实践》。本文最后提出了基于该框架的未来工作。
{"title":"Three Layers Design Guideline for Mobile Application","authors":"Nurul Zakiah binti Ayob, Ab Razak Che Hussin, H. M. Dahlan","doi":"10.1109/ICIME.2009.99","DOIUrl":"https://doi.org/10.1109/ICIME.2009.99","url":null,"abstract":"User interface is one of the main challenges for designing mobile application. The importance of user interface is all about to retain user's loyalty which can be gained by offer user friendly interface and usability. The research focus on main issues of designing mobile application which is \"how to display all the information and elements on the small screen of mobile device?\". This research aims to study and understand mobile human-computer interaction and other issues associated with mobile commerce application by understanding the mobile commerce environment to propose framework for mobile application. In terms of designing for mobile application, the authors has adopt the four existing guideline. There are Shneiderman’s Golden Rules of Interface Design for Mobile, Seven Usability Guideline for Mobile Device, Human-Centred Design and W3C Mobile Web Best Practices . This paper ends with future work that based on the proposed framework.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126958669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 65
Market Structure Transformation of Network Economic System: From Theory to Application 网络经济系统的市场结构转型:从理论到实践
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.50
Lifang Zhang, Minghong Zhang
Against the backdrop of widespread networks in the modern world, this paper aims to study the transformation of network economic system in general and its market structure in specific. It is organized in the mode of "concept introduction-model setup-empirical study". Starting from the concept of "network effects", it is then extended to a simplified model of market structure and the empirical test of global web server market. It is proved theoretically and empirically, that the natural market structure in network economic system tends to be more concentrated and monopolistic, which can hardly be explained merely by misconducts of market players as the conventional wisdom suggested.
在当今世界网络广泛传播的背景下,本文旨在研究网络经济体系的总体转型和具体的市场结构转型。本文采用“概念引入-模型建立-实证研究”的组织模式。从“网络效应”的概念出发,扩展到一个简化的市场结构模型,并对全球web服务器市场进行实证检验。理论和实证证明,网络经济系统的自然市场结构倾向于更加集中和垄断,这很难像传统观点所认为的那样,仅仅用市场主体的不当行为来解释。
{"title":"Market Structure Transformation of Network Economic System: From Theory to Application","authors":"Lifang Zhang, Minghong Zhang","doi":"10.1109/ICIME.2009.50","DOIUrl":"https://doi.org/10.1109/ICIME.2009.50","url":null,"abstract":"Against the backdrop of widespread networks in the modern world, this paper aims to study the transformation of network economic system in general and its market structure in specific. It is organized in the mode of \"concept introduction-model setup-empirical study\". Starting from the concept of \"network effects\", it is then extended to a simplified model of market structure and the empirical test of global web server market. It is proved theoretically and empirically, that the natural market structure in network economic system tends to be more concentrated and monopolistic, which can hardly be explained merely by misconducts of market players as the conventional wisdom suggested.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123884798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High Rate Video Streaming Steganography 高速率视频流隐写术
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.13
Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. A. Zaidan
Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.
隐写术是一种将私人或敏感数据或信息隐藏在看似没有什么不同寻常的东西中的想法。在本文中,我们将概述数据隐藏技术在数字视频中作为静止图像的使用。我们将描述如何在视频图像或帧上使用最低有效位插入(LSB)方法,以及如何使用人类视觉系统来增加数字视频流中嵌入的数据的大小。
{"title":"High Rate Video Streaming Steganography","authors":"Mohamed Elsadig Eltahir, Laiha Binti Mat Kiah, B. Zaidan, A. A. Zaidan","doi":"10.1109/ICIME.2009.13","DOIUrl":"https://doi.org/10.1109/ICIME.2009.13","url":null,"abstract":"Steganography is the idea of hiding private or sensitive data or information within something that appears to be nothing out of the ordinary.In this paper we will overview the use of data hiding techniques in digital video as still images. We will describe how we can use the Least Significant Bit insertion (LSB) method on video images or frames, in addition to the usage of the human vision system to increase the size of the data embedded in digital video streaming.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116139087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
A Survey on Maintaining Binary Search Tree in Optimal Shape 二叉搜索树保持最优形状的研究进展
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.128
Inayat-ur-Rehman, Sikandar Hayat Khayal
Binary Search Tree (BST) is one of the most widely used techniques for searching in non-linear data structure. If the BST is not maintained in optimal shape then the searching and insertion may need extra number of comparisons. In present literature, several BST algorithms have been proposed to maintain the BST in optimal shape. Different researchers have focused mainly on finding the total running time of BST algorithms but no one has focused on solving the mystery of "using which BST algorithm under what scenario". In this paper, we present a thorough comparison of existing techniques that ultimately enables software developers to select a particular BST technique according to the faced data management scenario.
二叉搜索树(BST)是应用最广泛的非线性数据结构搜索技术之一。如果BST没有保持在最佳形状,那么搜索和插入可能需要额外的比较次数。在目前的文献中,已经提出了几种BST算法来保持BST的最佳形状。不同的研究者主要关注于找出BST算法的总运行时间,而没有人关注于解决“在什么场景下使用哪种BST算法”的谜题。在本文中,我们对现有技术进行了全面的比较,最终使软件开发人员能够根据所面临的数据管理场景选择特定的BST技术。
{"title":"A Survey on Maintaining Binary Search Tree in Optimal Shape","authors":"Inayat-ur-Rehman, Sikandar Hayat Khayal","doi":"10.1109/ICIME.2009.128","DOIUrl":"https://doi.org/10.1109/ICIME.2009.128","url":null,"abstract":"Binary Search Tree (BST) is one of the most widely used techniques for searching in non-linear data structure. If the BST is not maintained in optimal shape then the searching and insertion may need extra number of comparisons. In present literature, several BST algorithms have been proposed to maintain the BST in optimal shape. Different researchers have focused mainly on finding the total running time of BST algorithms but no one has focused on solving the mystery of \"using which BST algorithm under what scenario\". In this paper, we present a thorough comparison of existing techniques that ultimately enables software developers to select a particular BST technique according to the faced data management scenario.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116469949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
E-government and its Situation in E-city 电子政务及其在电子城市中的现状
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.140
Maryam Honarmand
The World Wide Web and Internet have been two of the most important developments of information technology which has provided government with capability to increase electronic services. In this paper, at first we will investigate definition of e-government, steps of e-government evolution, its challenges and its situation in our country (Iran). And finally E-city and e-citizen as a vital element in e-government will be discussed.
万维网和因特网是信息技术的两个最重要的发展,为政府提供了增加电子服务的能力。本文首先探讨了电子政务的定义、电子政务发展的步骤、电子政务面临的挑战以及我国电子政务发展的现状。最后讨论了电子城市和电子公民作为电子政务的重要组成部分。
{"title":"E-government and its Situation in E-city","authors":"Maryam Honarmand","doi":"10.1109/ICIME.2009.140","DOIUrl":"https://doi.org/10.1109/ICIME.2009.140","url":null,"abstract":"The World Wide Web and Internet have been two of the most important developments of information technology which has provided government with capability to increase electronic services. In this paper, at first we will investigate definition of e-government, steps of e-government evolution, its challenges and its situation in our country (Iran). And finally E-city and e-citizen as a vital element in e-government will be discussed.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126540276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three Audit Stages for Securing Statistical Databases 统计数据库安全的三个审计阶段
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.83
A. A. Elshiekh, P. Dominic
A statistical databases (SDBs) are used mainly for statistical queries (such as sum, average, count, etc) on various populations. Users are permitted to retrieve statistical information, but information about specific individual should not be disclosed. The key representation auditing scheme is proposed to protect online and dynamic SDBs from being disclosed. The core idea is to convert the original database D into key representation database D, and each new user query q should be converted from string representation into key representation query q and stored in the Audit Query table (AQ table). We propose three audit stages to repel the attacks of the snooper to the confidentiality of the individuals. These stages enable the key representation auditor (KRA) to conveniently specify the illegal queries which could lead to disclosing the SDB. The proposed scheme that will be applied guarantees the security of SDBs and provides precise and accurate responses, besides it needs less CPU time and storage space during query processing.
统计数据库(sdb)主要用于对各种人口进行统计查询(例如sum、average、count等)。允许用户检索统计信息,但不应披露特定个人的信息。提出了密钥表示审计方案,以保护在线和动态数据库不被泄露。其核心思想是将原始数据库D转换为键表示数据库D,并且每个新的用户查询q应从字符串表示转换为键表示查询q并存储在审计查询表(AQ表)中。我们提出了三个审计阶段,以击退偷窥者对个人机密的攻击。这些阶段使得key representation auditor (KRA)能够方便地指定可能导致SDB泄露的非法查询。该方案保证了数据库的安全性,提供了精确准确的响应,并且在查询处理过程中需要更少的CPU时间和存储空间。
{"title":"Three Audit Stages for Securing Statistical Databases","authors":"A. A. Elshiekh, P. Dominic","doi":"10.1109/ICIME.2009.83","DOIUrl":"https://doi.org/10.1109/ICIME.2009.83","url":null,"abstract":"A statistical databases (SDBs) are used mainly for statistical queries (such as sum, average, count, etc) on various populations. Users are permitted to retrieve statistical information, but information about specific individual should not be disclosed. The key representation auditing scheme is proposed to protect online and dynamic SDBs from being disclosed. The core idea is to convert the original database D into key representation database D, and each new user query q should be converted from string representation into key representation query q and stored in the Audit Query table (AQ table). We propose three audit stages to repel the attacks of the snooper to the confidentiality of the individuals. These stages enable the key representation auditor (KRA) to conveniently specify the illegal queries which could lead to disclosing the SDB. The proposed scheme that will be applied guarantees the security of SDBs and provides precise and accurate responses, besides it needs less CPU time and storage space during query processing.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"R-36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126541519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Runtime Change Management Based on Object Oriented Petri Net 基于面向对象Petri网的运行时变更管理
Pub Date : 2009-04-03 DOI: 10.1109/ICIME.2009.24
Bassam Rajabi, S. Lee
Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this research, we propose a framework for change management technique based on the integration between Object Oriented (OO) diagramming technique and Petri Net (PN) modeling language to increase the representation capability for OO modeling for the dynamic changes in the runtime instances.
变更管理对于降低风险和成本以及最大化业务和信息技术中此类重大变更的收益非常重要。业务流程建模(BPM)技术在处理需求和目标在执行时不断变化的动态业务环境方面继续面临挑战。本文提出了一种基于面向对象(OO)绘图技术与Petri网(PN)建模语言相结合的变更管理技术框架,以提高面向对象建模对运行时实例中动态变更的表示能力。
{"title":"Runtime Change Management Based on Object Oriented Petri Net","authors":"Bassam Rajabi, S. Lee","doi":"10.1109/ICIME.2009.24","DOIUrl":"https://doi.org/10.1109/ICIME.2009.24","url":null,"abstract":"Change management is very important to reduce risks and costs and maximizes the benefits of such major changes in business and information technology. Business Process Modeling (BPM) technology continues to face challenges in coping with dynamic business environments where requirements and goals are constantly changing at the execution time. In this research, we propose a framework for change management technique based on the integration between Object Oriented (OO) diagramming technique and Petri Net (PN) modeling language to increase the representation capability for OO modeling for the dynamic changes in the runtime instances.","PeriodicalId":445284,"journal":{"name":"2009 International Conference on Information Management and Engineering","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132112221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2009 International Conference on Information Management and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1