On the Application of the Semantic Web Rule Language in the Definition of Policies for System Security Management

Author(s):  
Félix J. García Clemente ◽  
Gregorio Martínez Pérez ◽  
Juan A. Botía Blaya ◽  
Antonio F. Gómez Skarmeta
Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


2004 ◽  
Vol 1 (2) ◽  
pp. 127-151 ◽  
Author(s):  
Dragan Gasevic

This paper gives the Petri net ontology as the most important element in providing Petri net support for the Semantic Web. Available Petri net formal descriptions are: metamodels, UML profiles, ontologies and syntax. Metamodels are useful, but their main purpose is for Petri net tools. Although the current Petri-net community effort Petri Net Markup Language (PNML) is XML-based, it lacks a precise definition of semantics. Existing Petri net ontologies are partial solutions specialized for a specific problem. In order to show current Petri net model sharing features we use P3 tool that uses PNML/XSLT-based approach for model sharing. This paper suggests developing the Petri net ontology to represent semantics appropriately. This Petri net ontology is described using UML, Resource Description Framework (Schema) RDF(S) and the Web Ontology Language-OWL.


Author(s):  
Олександр Михайлович Петрук ◽  
Станіслав Ігорович Василішин

The aggravation of the crisis phenomena in the national economy and its further recovery are related to the management of the mechanisms to strengthen economic security, which should be based on the improved methodology of accounting and analytical support as the main source of the relevant and reliable information as to the risks of the business environment. The purpose of the research is to establish the institutional factors of accounting and analytical support of economic security management and justify their possible impact. The authors’ definition of economic security has been given and its place in the system of accounting and analytical support has been characterized. The spheres of the institutional influence on accounting and analytical support of economic security management and their manifestations have been determined. It has been assumed that the most fundamental factor that forms the foundation of economic security management on the basis of accounting and analytical support is the effectiveness and vector orientation of the system of strategic management of the enterprise, as the result of which the multidimensionality of accounting and analytical support in the process of strategic management has been characterized. Possible groups of factors that form economic security and the system of its accounting and analytical support have been considered. It has been established that accounting as a source to achieve trust, understanding and manageability of the economic environment and information support of the management processes embodies the features of an independent institution of socio-economic development. The decomposition of the institutional factor influence of accounting and analytical support of economic security management at the macro, meso and micro levels has been substantiated, which allows predicting the vector of changes and form a theoretical foundation for the development of the theory, methodology and organization of accounting and analytical support during the development of the measures to strengthen economic security of the enterprises.


Author(s):  
Souad Bouaicha ◽  
Zizette Boufaida

Although OWL (Web Ontology Language) and SWRL (Semantic Web Rule Language) add considerable expressiveness to the Semantic Web, they do have expressive limitations. For some reasoning problems, it is necessary to modify existing knowledge in an ontology. This kind of problem cannot be fully resolved by OWL and SWRL, as they only support monotonic inference. In this paper, the authors propose SWRLx (Extended Semantic Web Rule Language) as an extension to the SWRL rules. The set of rules obtained with SWRLx are posted to the Jess engine using rewrite meta-rules. The reason for this combination is that it allows the inference of new knowledge and storing it in the knowledge base. The authors propose a formalism for SWRLx along with its implementation through an adaptation of different object-oriented techniques. The Jess rule engine is used to transform these techniques to the Jess model. The authors include a demonstration that demonstrates the importance of this kind of reasoning. In order to verify their proposal, they use a case study inherent to interpretation of a preventive medical check-up.


Author(s):  
Luís Enrique Sánchez ◽  
Antonio Santos-Olmo ◽  
Eduardo Fernandez-Medina ◽  
Mario Piattini

The information society is increasingly more dependent upon Information Security Management Systems (ISMSs), and the availability of these systems has become crucial to the evolution of Small and Medium-size Enterprises (SMEs). However, this type of companies requires ISMSs which have been adapted to their specific characteristics, and these systems must be optimized from the point of view of the resources necessary to deploy and maintain them. Over the last 10 years, the authors have obtained considerable experience in the establishment of ISMSs, and during this time, they have observed that the structure and characteristics of SMEs as regards security management are frequently very similar (since they can all be grouped by business size and sector), thus signifying that it is possible to construct patterns for ISMSs that can be reused and refined. In this chapter, the authors present the strategy that they have designed to manage and reuse security information in information system security management. This strategy is framed within a methodology designed for integral security management and its information systems maturity, denominated as “Methodology for Security Management and Maturity in Small and Medium-size Enterprises (MSM2-SME),” and it is defined in a reusable model called “Reusable Pattern for Security Management (RPSM),” which systematically defines, manages, and reuses the aforementioned methodology through a sub-process denominated as “Generation of Security Management Patterns (GSMP).” This model is currently being applied in real cases, and is thus constantly improving.


Author(s):  
Dimitrios Tektonidis ◽  
Albert Bokma

Integrating enterprise system has become an issue of sharing information rather than transforming information due to the increasing complexity and the heterogeneity of the applications. The transition from application centric to integration centric enterprise application integration (EAI) requires methods and technologies that will enable and facilitate the definition of shared information. The use of ontologies Semantic Web and technologies can improve the existing EAI methods by providing a framework capable to define shared information. Ontologies based Enterprise application integration (ONAR) framework utilizes Semantic Web technologies to define shared information among heterogeneous systems. The present paper presents the utilization of ontologies for the formation of ONAR framework and its application for service oriented application integration (SOAI)


Author(s):  
Albin Zuccato

Organizations are required by legal provision to include information system security into their day- today management activities. To do this effectively and efficiently, it is necessary that information security management integrates into the overall system life cycle. Here I will present a system life cycle and suggest which aspects of security should be covered at which life cycle stage of the system. Based on this, I will present a process framework that due to its iterativity and detailedness accommodates the needs for life cycle oriented security management.


Sign in / Sign up

Export Citation Format

Share Document