Stavros Kyriakopoulos, T. Tzouramanis, Y. Manolopoulos
{"title":"The dbMark: A benchmarking system for watermarking methods for relational databases","authors":"Stavros Kyriakopoulos, T. Tzouramanis, Y. Manolopoulos","doi":"10.1109/RCIS.2017.7956526","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956526","url":null,"abstract":"Digital technology keeps falling prey to the ease with which the unauthorized reproduction and distribution of digital objects can be achieved. Research on copyright protection of digital data must counterbalance the failures of legal measures against digital piracy. Digital watermarking tops the list of technical countermeasures and recent research has focused on proposing watermarking methods for relational data as well as on the types of attacks which aim at removing or destroying the watermark. With the database field of research in urgent need of developing tools and platforms for the benchmarking of these watermarking methods, the present work has undertaken to construct a benchmarking system for the automatic evaluation and fair comparison of watermarking schemes for relational data. The new software tool is called dbMark and its construction has taken into consideration the characteristics of a large set of parameters across a wide range of database watermarking applications. This article presents and comments upon the results of several experiments that evaluate the performance of three different watermarking methods taking into consideration several parameters and types of attacks. There are indications that the dbMark can be used effectively as the primary platform for the experimental evaluation of watermarking methods for relational data. The source code and the executable file of the dbMark are provided free-of-charge on the Web.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126966660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework managing conflicts between security and privacy requirements","authors":"Duaa Alkubaisy","doi":"10.1109/RCIS.2017.7956571","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956571","url":null,"abstract":"In order to develop efficient and effective framework for managing any conflict between security and privacy Non-Functional requirements and to reduce risk impact in software system, the goals set by the stakeholders need to be ascertained, and then the modeling language, tools, implementation and validation procedures need to be altered accordingly. Overall, this research is aimed for constructing of a framework for identifying and analyzing discrepancies between security and privacy Non-Functional requirements a in the context of system development and design.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127676567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A metamodel and code generation approach for symmetric unary associations","authors":"Cesar Gonzalez-Perez, Patricia Martín-Rodilla","doi":"10.1109/RCIS.2017.7956522","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956522","url":null,"abstract":"The concept of association appears in almost every modelling language, and plays a crucial role in defining how classes (or other kinds of types) can be related to each other, both in conceptual models and code. Often, associations are assumed to be binary (i.e. linking two types), and sometimes higher-arity associations are also considered, such as in UML. However, little attention has been paid to unary associations, which link a type back to itself. Some unary associations establish a symmetric relation on the instances of the type they are attached to, and in this paper we argue that mainstream modelling languages, especially UML, provide no support whatsoever to model this kind of associations, despite being extremely common in real life. To address this need, we propose a simple and powerful metamodel that describes symmetric unary associations, explain how this metamodel has been implemented as part of the ConML conceptual modelling language, and describe how this kind of associations can be implemented in code generation scenarios.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121246019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Semantic task specification in business process context","authors":"H. Kaindl, Ralph Hoch, R. Popp","doi":"10.1109/RCIS.2017.7956548","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956548","url":null,"abstract":"Much like semantic service specification, semantic specification of tasks in business processes is needed, e.g., for their formal verification. In addition to the specification of the pure effects of some procedural code, however, business context plays a major role for semantic task specification. Open questions are how to include the business context of a task in its semantic specification, and what the semantic specification of a task composition is. This paper clarifies the relation of service composition with corresponding task composition in different business context using semantic specification. It shows that a specific semantic service task specification may become a supertype of the corresponding semantic service specification. Hence, it provides a theoretical basis for the reusability of (Web) services in different business contexts. This paper also presents a systematic derivation of the semantic specification of sequential task composition. Based on all that, it shows recursive application for higher-level business processes.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134545318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Software CROWD-sourcing","authors":"Nitin Naik","doi":"10.1109/RCIS.2017.7956578","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956578","url":null,"abstract":"Software crowdsourcing emerged from the crowdsourcing concept and inherited most of features from it. However, it adapted its nature according to the requirements of software engineering techniques and technologies. Therefore, it is important to understand the detailed elucidation of software crowdsourcing. This paper introduces the connotation of CROWD (Community, Remoteness, Open-call, Web, Diversity) in crowdsourcing and in particular software crowdsourcing. It expounds the meaning and importance of these five CROWD components of software crowdsourcing and their contribution in making it successful.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122926661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From user goals to process-based service compositions: A flexible semantic-based approach","authors":"I. Mirbel","doi":"10.1109/RCIS.2017.7956523","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956523","url":null,"abstract":"Complex user's needs often require heterogeneous services to be combined together. In this paper, we explore a novel approach to enable flexible and dynamic composition of heterogeneous services for end users who are usually not familiar with technical process models. End-users are only required to model their goals and semantic reasoning is used for the composition itself. The possible service compositions are expressed in BPMN in order to be then processed by a BPMN engine. Since the composition is built on-the-fly, this approach avoids static linking of services and therefore is much more flexible.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach","authors":"Afef Awadid","doi":"10.1109/RCIS.2017.7956568","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956568","url":null,"abstract":"The multi-perspective Business Process Modeling (BPM) is grounded upon the idea of constructing distinct and separate models that depict different aspects of the same Business Process (BP). It promotes a comprehensive description of the latter. For an enterprise, such description is crucial for the improvement of its business processes, and hence for remaining competitive. However, none of the modeling languages is endowed with the capability to represent a BP according to all relevant perspectives. A first challenge is then how to improve this capability. At the same time, the multi-perspective BPM is always accompanied with the challenge of managing consistency among the produced models since they are complementary, and consequently share overlapping data. In line with this, this paper presents the proposal of a promising approach addressing these two challenges and based on the mapping between modeling languages.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116017161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Otto Parra Gonzalez, Sergio España, José Ignacio Panach
{"title":"Extending and validating gestUI using technical action research","authors":"Otto Parra Gonzalez, Sergio España, José Ignacio Panach","doi":"10.1109/RCIS.2017.7956558","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956558","url":null,"abstract":"gestUI is a model-driven method with tool support to define custom gestures and to include gesture-based interaction in existing user software system interfaces. So far, gestUI had been limited to the definition of the same gesture catalogue for all users of the software system. In this paper, we extend gestUI to permit individual users to define their own custom gesture catalogue and redefine some custom gestures in case of difficulty in using or remembering them. After extending gestUI, we applied technical action research from the FP7 CaaS project's Capability Design Tool with the aim of assessing its acceptance in an industrial setting. We also analysed its perceived ease-of-use and usefulness and gestUI's desirability level and user experience. The study shows that the tool can help improve the definition of custom gestures and the inclusion of gesture-based interaction in user interfaces of software systems.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128266305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-level clustering for extracting process-related information from email logs","authors":"Diana Jlailaty, Daniela Grigori, Khalid Belhajjame","doi":"10.1109/RCIS.2017.7956583","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956583","url":null,"abstract":"Emails represent a valuable source of information that can be harvested for understanding undocumented business processes of institutions. Towards this aim, a few researchers investigated the problem of extracting process oriented information from email logs to make benefit of the many available process mining techniques. In this work, we go further in this direction, by proposing a new method for mining process models from email logs that leverages unsupervised machine learning techniques. Moreover, our method allows to label emails with activity names, that can be used for activity recognition in new incoming emails. A use case illustrates the usefulness of the proposed solution.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124088092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of MUSER, a holistic security requirements analysis framework","authors":"Elias A. Seid, Kazi Robin, Tong Li, J. Mylopoulos","doi":"10.1109/RCIS.2017.7956550","DOIUrl":"https://doi.org/10.1109/RCIS.2017.7956550","url":null,"abstract":"Security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in billions of dollars in losses per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are socio-technical — a mix of people, processes, technology and infrastructure. However, such systems are designed in a piecemeal rather than a holistic fashion, leaving parts of the system vulnerable. To tackle this problem, a three-realm security requirements framework was proposed to holistically analyse security requirements in different conceptual realms, including social realm (business processes, social actors), a software realm (software applications that support the social realm) and an infrastructure realm (physical and technological infrastructure). In this paper we evaluate this security requirements analysis framework. The evaluation was performed by two graduate students using a large scale case study on a medical emergency response system.","PeriodicalId":193156,"journal":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121673016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}