{"title":"A Data Warehouse Approach for Business Intelligence","authors":"G. Garani, A. Chernov, I. Savvas, M. Butakova","doi":"10.1109/WETICE.2019.00022","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00022","url":null,"abstract":"In a cloud based data warehouse (DW), business users can access and query data from multiple sources and geographically distributed places. Business analysts and decision makers are counting on DWs especially for data analysis and reporting. Temporal and spatial data are two factors that affect seriously decision-making and marketing strategies and many applications require modelling and special treatment of these kinds of data since they cannot be treated efficiently within a conventional multidimensional database. One main application domain of spatiotemporal data warehousing is telecommunication industry, which is rapidly dominated by massive volume of data. In this paper, a DW schema modelling approach is proposed which integrate in a unified manner temporal and spatial data in a general data warehousing framework. Temporal and spatial data integration becomes more important as the volume and sharing of data grows. The aim of this research work is to facilitate the understanding, querying and management of spatiotemporal data for on-line analytical processing (OLAP). The proposed new spatiotemporal DW schema extends OLAP queries for supporting spatial and temporal queries. A case study is developed and implemented for the telecommunication industry.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Sellami, Hatem Hadj Kacem, Anderson Santana de Oliveira
{"title":"Track Report of Future Internet Services and Applications (FISA’2019)","authors":"M. Sellami, Hatem Hadj Kacem, Anderson Santana de Oliveira","doi":"10.1109/WETICE.2019.00043","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00043","url":null,"abstract":"The \"Future Internet Services and Applications\" (FISA) track focuses on three complementary aspects that have to be considered while setting up future Internet services: (i) their modeling, provisioning and management, (ii) data protection, and (iii) data collection, storage and analysis. FISA is in its fifth edition and aims at offering to academic and industrial researchers as well as practitioners a platform for discussions related to the aforementioned aspects of future Internet services and applications. This report briefly presents the main topics of FISA and lists the accepted papers.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130442773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"I/O Interaction Analysis of Binary Code","authors":"Konstantin Scherer, Tobias F. Pfeffer, S. Glesner","doi":"10.1109/WETICE.2019.00056","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00056","url":null,"abstract":"The increasing use of closed-source software in everyday life leads to a need for privacy verification of binary code. Unfortunately, analyses of machine code behavior are often imprecise, do not scale, or require expert interaction. We present a novel and fast algorithm that is capable of soundly approximating I/O behavior of binary code. The key idea of our algorithm is that overall I/O behavior can be approximated by analyzing input and output operations. Since most function parameters are defined close to their use, our backward symbolic execution algorithm can quickly recover most meaningful parameters. We show the applicability and performance of our approach by analyzing the coreutils binaries.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129508378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-Time SCADA Attack Detection by Means of Formal Methods","authors":"F. Mercaldo, F. Martinelli, A. Santone","doi":"10.1109/WETICE.2019.00057","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00057","url":null,"abstract":"SCADA control systems use programmable logic controller to interface with critical machines. SCADA systems are used in critical infrastructures, for instance, to control smart grid, oil pipelines, water distribution and chemical manufacturing plants: an attacker taking control of a SCADA system could cause various damages, both to the infrastructure but also to people (for instance, adding chemical substances into a water distribution systems). In this paper we propose a method to detect attacks targeting SCADA systems. We exploit model checking, in detail we model logs from SCADA systems into a network of timed automata and, through timed temporal logic, we characterize the behaviour of a SCADA system under attack. Experiments performed on a SCADA water distribution system confirmed the effectiveness of the proposed method.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"19 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114028018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Post-Turing Computing, Hierarchical Named Networks and a New Class of Edge Computing","authors":"Rao V. Mikkilineni, G. Morana","doi":"10.1109/WETICE.2019.00024","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00024","url":null,"abstract":"Advances in our understanding of the nature of cognition in its myriad forms (Embodied, Embedded, Extended, and Enactive) displayed in all living beings (cellular organisms, animals, plants, and humans) and new theories of information, info-computation and knowledge are throwing light on how we should build software systems in the digital universe which mimic and interact with intelligent, sentient and resilient beings in the physical universe. Recent attempts to infuse cognition into computing systems to push the boundaries of Church-Turing thesis have led to new computing models that mimic biological systems in encoding knowledge structures using both algorithms executed in stored program control machines and neural networks. This paper presents a new model and implements an application as hierarchical named network composed of micro-services to create a managed process workflow by enabling dynamic configuration and reconfiguration of the micro-service network. We demonstrate the resiliency, efficiency and scaling of the named microservice network using a novel edge cloud platform by Platina Systems. The platform eliminates the need for Virtual Machine overlay and provides high performance and low-latency with L3 based 100 GbE network and SSD support with RDMA and NVMeoE. The hierarchical named microservice network using Kubernetes provisioning stack provides all the cloud features such as elasticity, auto-scaling, self-repair and live-migration without reboot. The model is derived from a recent theoretical framework for unification of different models of computation using \"Structural Machines.\" They are shown to simulate Turing machines, inductive Turing machines and also are proved to be more efficient than Turing machines. The structural machine framework with a hierarchy of controllers managing the named service connections provides dynamic reconfiguration of the service network from browsers to database to address rapid fluctuations in the demand for or the availability of resources without having to reconfigure IP address base networks.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126517452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Rekik, Abderrahim Ait Wakrime, Nasredine Cheniki, Yacine Sam
{"title":"On the Fly Reconfiguration of BPaaS Based on SaaS Services Federation and SAT Solving Techniques","authors":"M. Rekik, Abderrahim Ait Wakrime, Nasredine Cheniki, Yacine Sam","doi":"10.1109/WETICE.2019.00016","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00016","url":null,"abstract":"Business Process as a Service (BPaaS) is knowing a considerable proliferation and an exponential emergence as a new Cloud service for delivering complex and complete business applications. In order to guarantee a place in the actual harshly competitive Cloud services, BPaaS providers should offer to their clients, flexible services responding both to their functional and non-functional requirements. In this paper, we propose a Reconfigurable BPaaS based SaaS services Federation system (RBPF). The reconfiguration allows for a flexible BPaaS service responding to the changing users functional and non-functional requirements. To do so, the RBPF system follows the Boolean Satisfiability Problem (SAT) based algorithms to (i) initially configure the Business process based on SaaS services and to (ii) reconfigure minimally and on the fly the composition whenever a reconfiguration is required. The end users of the RBPF system are BPaaS as well as SaaS providers (a federation of SaaS) aiming to collaborate for the BPaaS achievement purpose.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127018762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Architecture of Anomaly Detection Module for the Security Operations Center","authors":"P. Bienias, G. Kolaczek, A. Warzyński","doi":"10.1109/WETICE.2019.00035","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00035","url":null,"abstract":"The paper presents the preliminary results of the research undertaken within RegSOC project. The goal of the project is initiate a prototype instance of the model Regional Center for Cybersecurity (RegSOC) and to facilitate to the public entities. The outcomes of this project will allow to raise levels of security protection and to present procedures, which can reduce the probability of unwanted events and methods of lowering their consequences. The project aims at developing a comprehensive cybersecurity monitoring platform which will be the software and organizational solution (management models and organizational procedures). The software part of the platform will constitute several modules specialized in various types of security level evaluation. The paper focuses on the module integrated with the RegSOC platform which will support security-related events detection by detecting anomalies. The architecture of the anomaly detection module has been introduced and the functional and non-functional requirements related to this module have been discussed. Also, the role and the way of integrating the module with the general RegSOC architecture has been demonstrate.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115220492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. Casola, Rosario Catelli, Alessandra De Benedictis
{"title":"A First Step Towards an ISO-Based Information Security Domain Ontology","authors":"V. Casola, Rosario Catelli, Alessandra De Benedictis","doi":"10.1109/WETICE.2019.00075","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00075","url":null,"abstract":"The need for Information Security Management Systems (SIEMs) has increased the effort requested to companies to improve the security level of their systems and their compliance with national and international standards. Unfortunately, the existence of several different security standards to comply with and the lack of well-defined guidelines related to documents preparation and reporting, may result into a bad security management and may cause several security issues. In this paper, we introduce a modeling approach to the definition of a SIEM that leverages a double-layered ontology: it is composed of a highlevel ontology, used to model complex relations among domains, and of a low-level, domain-specific ontology, aimed at modeling the ISO 27000 family of standards.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133492739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Barbareschi, Alessandra De Benedictis, E. Montagna, A. Mazzeo, N. Mazzocca
{"title":"PUF-Enabled Authentication-as-a-Service in Fog-IoT Systems","authors":"M. Barbareschi, Alessandra De Benedictis, E. Montagna, A. Mazzeo, N. Mazzocca","doi":"10.1109/WETICE.2019.00020","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00020","url":null,"abstract":"Fog-IoT systems enable to distribute computing, control, storage, and networking functions closer to edge devices, in order to improve efficiency and reduce latency. In order to cope with the multitude of security issues raised by the lack of centralized control and by the exposure of user sensitive data, suitable security solutions must be devised to protect data and thwart malicious attempts to compromise and take control over communication. In this paper, we propose a mutual authentication scheme relying upon the adoption of Physically Unclonable Functions (PUFs), which enables fog nodes and resource-constrained IoT devices to mutually prove their respective identities during communication, while meeting the existing low resource consumption requirements. The scheme is partially offered in an as-a-service fashion, thanks to the adoption of a cloud automation framework that facilitates its set-up on fog nodes.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129373492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wided Mathlouthi, Chahrazed Labba, Walid Gaaloul, Narjès Bellamine Ben Saoud
{"title":"SoS Paradigm Benefits SaaS Integration: Novel Approach and First Results","authors":"Wided Mathlouthi, Chahrazed Labba, Walid Gaaloul, Narjès Bellamine Ben Saoud","doi":"10.1109/WETICE.2019.00045","DOIUrl":"https://doi.org/10.1109/WETICE.2019.00045","url":null,"abstract":"To fulfill its complex business demands, an organization may require the integration of many SaaS applications. A main challenge in this regard is to select the suitable SaaS offerings that satisfy all the business requirements. Due to the diversity of QoS needs and the large number of SaaS providers, selecting the suitable set of SaaS applications to be integrated may result in QoS degradation and higher costs. In this paper, we propose to use a System-of-Systems (SoS)-based approach for the selection and integration of SaaS. We believe that the use of SoS and its dynamic properties could improve the service selection at SaaS level. To do so, we propose three Mixed Integer Programming models that optimize the global SaaS behavior by minimizing the overall delivery costs, and maximizing the global functional and QoS utilities. The implementation of the approach and the experimental results highlight the efficiency of our proposed solution.","PeriodicalId":116875,"journal":{"name":"2019 IEEE 28th International Conference on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125070771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}