scholarly journals Information Flow in Disaster Management Systems

Author(s):  
Achim D. Brucker ◽  
Dieter Hutter
Author(s):  
Aysu Sagun

This chapter will emphasize that efficient integration of Information and Communication Technology (ICT) in disaster management process can help mitigation of impacts of disasters on people and the environment, minimizing the failures and maximizing the collaboration. It summarizes the nature of information flow and management processes during disasters and the potential of recent ICT at three stages of disaster management. The requirements and problems faced during their deployment at different stages of disaster management process are stated. The solutions for common constraints are discussed as well as the critical factors that should be considered in efficient deployment of ICT in the disaster management process.


Author(s):  
Rahul Sharan Renu

Abstract This research proposes a framework for automating Maynard Operation Sequence Technique (MOST) studies. This is done by using data available in assembly work instructions, plant layouts and Product Data Management systems. Specifically, an investigation into the information flow requirements for the automated system is performed. One aspect of the information flow is investigated — mapping assembly work instruction to MOST activities and sequence models. A software is developed from the mapping, which acts as a demonstrator to show the usefulness of decision support during MOST analyses. The demonstrated efficacy warrants future efforts towards implementing the remaining facets of the information flow identified.


Author(s):  
Sarmad Sadik ◽  
Maruf Pasha ◽  
Arshad Ali ◽  
H. Farooq Ahmad ◽  
Hiroki Suguri

2014 ◽  
Vol 56 (6) ◽  
Author(s):  
Thomas Bauereiß ◽  
Dieter Hutter

AbstractWorkflow management plays an important role in analyzing and automating business processes. Security requirements in workflow management systems are typically mapped to (role-based) access control configurations. This paper focuses on information flow control, taking into account implicit information leaks. The presented approach operates on a specification level in which no executable program is available yet. We illustrate the modeling of a workflow management system as a composition of state-event systems, each representing one of the activities of the workflow. This facilitates distributed deployment and eases verification by splitting up the verification of the overall system into verification of the individual components. Confidentiality requirements are modeled in terms of information flow predicates using the MAKS framework and verified following existing decomposition methodologies, which are adapted for open systems with ongoing user interaction. We discuss the interaction with other security requirements, notably separation of duty.


Sign in / Sign up

Export Citation Format

Share Document