2017 11th International Conference on Research Challenges in Information Science (RCIS)最新文献

筛选
英文 中文
The dbMark: A benchmarking system for watermarking methods for relational databases dbMark:关系数据库水印方法的基准测试系统
Stavros Kyriakopoulos, T. Tzouramanis, Y. Manolopoulos
{"title":"The dbMark: A benchmarking system for watermarking methods for relational databases","authors":"Stavros Kyriakopoulos, T. Tzouramanis, Y. Manolopoulos","doi":"10.1109/RCIS.2017.7956526","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956526","url":null,"abstract":"Digital technology keeps falling prey to the ease with which the unauthorized reproduction and distribution of digital objects can be achieved. Research on copyright protection of digital data must counterbalance the failures of legal measures against digital piracy. Digital watermarking tops the list of technical countermeasures and recent research has focused on proposing watermarking methods for relational data as well as on the types of attacks which aim at removing or destroying the watermark. With the database field of research in urgent need of developing tools and platforms for the benchmarking of these watermarking methods, the present work has undertaken to construct a benchmarking system for the automatic evaluation and fair comparison of watermarking schemes for relational data. The new software tool is called dbMark and its construction has taken into consideration the characteristics of a large set of parameters across a wide range of database watermarking applications. This article presents and comments upon the results of several experiments that evaluate the performance of three different watermarking methods taking into consideration several parameters and types of attacks. There are indications that the dbMark can be used effectively as the primary platform for the experimental evaluation of watermarking methods for relational data. The source code and the executable file of the dbMark are provided free-of-charge on the Web.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A framework managing conflicts between security and privacy requirements 管理安全和隐私需求之间冲突的框架
Duaa Alkubaisy
{"title":"A framework managing conflicts between security and privacy requirements","authors":"Duaa Alkubaisy","doi":"10.1109/RCIS.2017.7956571","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956571","url":null,"abstract":"In order to develop efficient and effective framework for managing any conflict between security and privacy Non-Functional requirements and to reduce risk impact in software system, the goals set by the stakeholders need to be ascertained, and then the modeling language, tools, implementation and validation procedures need to be altered accordingly. Overall, this research is aimed for constructing of a framework for identifying and analyzing discrepancies between security and privacy Non-Functional requirements a in the context of system development and design.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A metamodel and code generation approach for symmetric unary associations 对称一元关联的元模型和代码生成方法
Cesar Gonzalez-Perez, Patricia Martín-Rodilla
{"title":"A metamodel and code generation approach for symmetric unary associations","authors":"Cesar Gonzalez-Perez, Patricia Martín-Rodilla","doi":"10.1109/RCIS.2017.7956522","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956522","url":null,"abstract":"The concept of association appears in almost every modelling language, and plays a crucial role in defining how classes (or other kinds of types) can be related to each other, both in conceptual models and code. Often, associations are assumed to be binary (i.e. linking two types), and sometimes higher-arity associations are also considered, such as in UML. However, little attention has been paid to unary associations, which link a type back to itself. Some unary associations establish a symmetric relation on the instances of the type they are attached to, and in this paper we argue that mainstream modelling languages, especially UML, provide no support whatsoever to model this kind of associations, despite being extremely common in real life. To address this need, we propose a simple and powerful metamodel that describes symmetric unary associations, explain how this metamodel has been implemented as part of the ConML conceptual modelling language, and describe how this kind of associations can be implemented in code generation scenarios.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic task specification in business process context 业务流程上下文中的语义任务规范
H. Kaindl, Ralph Hoch, R. Popp
{"title":"Semantic task specification in business process context","authors":"H. Kaindl, Ralph Hoch, R. Popp","doi":"10.1109/RCIS.2017.7956548","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956548","url":null,"abstract":"Much like semantic service specification, semantic specification of tasks in business processes is needed, e.g., for their formal verification. In addition to the specification of the pure effects of some procedural code, however, business context plays a major role for semantic task specification. Open questions are how to include the business context of a task in its semantic specification, and what the semantic specification of a task composition is. This paper clarifies the relation of service composition with corresponding task composition in different business context using semantic specification. It shows that a specific semantic service task specification may become a supertype of the corresponding semantic service specification. Hence, it provides a theoretical basis for the reusability of (Web) services in different business contexts. This paper also presents a systematic derivation of the semantic specification of sequential task composition. Based on all that, it shows recursive application for higher-level business processes.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Software CROWD-sourcing 软件的众包
Nitin Naik
{"title":"Software CROWD-sourcing","authors":"Nitin Naik","doi":"10.1109/RCIS.2017.7956578","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956578","url":null,"abstract":"Software crowdsourcing emerged from the crowdsourcing concept and inherited most of features from it. However, it adapted its nature according to the requirements of software engineering techniques and technologies. Therefore, it is important to understand the detailed elucidation of software crowdsourcing. This paper introduces the connotation of CROWD (Community, Remoteness, Open-call, Web, Diversity) in crowdsourcing and in particular software crowdsourcing. It expounds the meaning and importance of these five CROWD components of software crowdsourcing and their contribution in making it successful.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
From user goals to process-based service compositions: A flexible semantic-based approach 从用户目标到基于流程的服务组合:一种灵活的基于语义的方法
I. Mirbel
{"title":"From user goals to process-based service compositions: A flexible semantic-based approach","authors":"I. Mirbel","doi":"10.1109/RCIS.2017.7956523","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956523","url":null,"abstract":"Complex user's needs often require heterogeneous services to be combined together. In this paper, we explore a novel approach to enable flexible and dynamic composition of heterogeneous services for end users who are usually not familiar with technical process models. End-users are only required to model their goals and semantic reasoning is used for the composition itself. The possible service compositions are expressed in BPMN in order to be then processed by a BPMN engine. Since the composition is built on-the-fly, this approach avoids static linking of services and therefore is much more flexible.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach 支持多角度业务流程建模中的一致性:一种映射方法
Afef Awadid
{"title":"Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach","authors":"Afef Awadid","doi":"10.1109/RCIS.2017.7956568","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956568","url":null,"abstract":"The multi-perspective Business Process Modeling (BPM) is grounded upon the idea of constructing distinct and separate models that depict different aspects of the same Business Process (BP). It promotes a comprehensive description of the latter. For an enterprise, such description is crucial for the improvement of its business processes, and hence for remaining competitive. However, none of the modeling languages is endowed with the capability to represent a BP according to all relevant perspectives. A first challenge is then how to improve this capability. At the same time, the multi-perspective BPM is always accompanied with the challenge of managing consistency among the produced models since they are complementary, and consequently share overlapping data. In line with this, this paper presents the proposal of a promising approach addressing these two challenges and based on the mapping between modeling languages.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116017161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Extending and validating gestUI using technical action research 使用技术行动研究扩展和验证手势
Otto Parra Gonzalez, Sergio España, José Ignacio Panach
{"title":"Extending and validating gestUI using technical action research","authors":"Otto Parra Gonzalez, Sergio España, José Ignacio Panach","doi":"10.1109/RCIS.2017.7956558","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956558","url":null,"abstract":"gestUI is a model-driven method with tool support to define custom gestures and to include gesture-based interaction in existing user software system interfaces. So far, gestUI had been limited to the definition of the same gesture catalogue for all users of the software system. In this paper, we extend gestUI to permit individual users to define their own custom gesture catalogue and redefine some custom gestures in case of difficulty in using or remembering them. After extending gestUI, we applied technical action research from the FP7 CaaS project's Capability Design Tool with the aim of assessing its acceptance in an industrial setting. We also analysed its perceived ease-of-use and usefulness and gestUI's desirability level and user experience. The study shows that the tool can help improve the definition of custom gestures and the inclusion of gesture-based interaction in user interfaces of software systems.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-level clustering for extracting process-related information from email logs 用于从邮件日志中提取流程相关信息的多级聚类
Diana Jlailaty, Daniela Grigori, Khalid Belhajjame
{"title":"Multi-level clustering for extracting process-related information from email logs","authors":"Diana Jlailaty, Daniela Grigori, Khalid Belhajjame","doi":"10.1109/RCIS.2017.7956583","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956583","url":null,"abstract":"Emails represent a valuable source of information that can be harvested for understanding undocumented business processes of institutions. Towards this aim, a few researchers investigated the problem of extracting process oriented information from email logs to make benefit of the many available process mining techniques. In this work, we go further in this direction, by proposing a new method for mining process models from email logs that leverages unsupervised machine learning techniques. Moreover, our method allows to label emails with activity names, that can be used for activity recognition in new incoming emails. A use case illustrates the usefulness of the proposed solution.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation of MUSER, a holistic security requirements analysis framework 评估MUSER,一个整体的安全需求分析框架
Elias A. Seid, Kazi Robin, Tong Li, J. Mylopoulos
{"title":"Evaluation of MUSER, a holistic security requirements analysis framework","authors":"Elias A. Seid, Kazi Robin, Tong Li, J. Mylopoulos","doi":"10.1109/RCIS.2017.7956550","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956550","url":null,"abstract":"Security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in billions of dollars in losses per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are socio-technical — a mix of people, processes, technology and infrastructure. However, such systems are designed in a piecemeal rather than a holistic fashion, leaving parts of the system vulnerable. To tackle this problem, a three-realm security requirements framework was proposed to holistically analyse security requirements in different conceptual realms, including social realm (business processes, social actors), a software realm (software applications that support the social realm) and an infrastructure realm (physical and technological infrastructure). In this paper we evaluate this security requirements analysis framework. The evaluation was performed by two graduate students using a large scale case study on a medical emergency response system.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信