The Integration of Security and Integrity Constraints in MOKUM

نویسندگان

  • Reind P. van de Riet
  • Jack Beukering
چکیده

In this paper we will describe how constraints involving integrity and security can be speciied in the active object-oriented knowledge-base system MOKUM. Also we will indicate how they are implemented.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interdependent Security Game Design over Constrained Linear Influence Networks

In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...

متن کامل

IBIS: Semantic Data Integration at Work

In this paper we present IBIS (Internet-Based Information System), a system for the semantic integration of heterogeneous data sources, which adopts innovative and state-of-the-art solutions to deal with all aspects of a complex data-integration environment, including query answering under integrity constraints and limitations on source access. IBIS is based on the global-as-view approach, usin...

متن کامل

Determining the factors affecting the evaluation of business intelligence systems with an emphasis on the integrity of Organizational resources

In the information age, the speed of producing and supplying valuable information is considered as one of the keys to success in the organizations and institutes.The major objective of this study was to investigate and specify the effective factors in evaluating the BI systems with an emphasis on the integrity of organizational resources. First, five factors were determined as the major factors...

متن کامل

A Multi Objective Optimization Approach for Resources Procurement of Bank

Calculating total cast of bank resources procurement methods which include current -free loan deposit, saving interest-free loan deposit, regular and net short-term investment deposit, long-term investment deposit and surety bond cash deposit and presenting their optimal integration require precise scientific studies. Hence, this study is an attempt to know which methods are the best optimal in...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1994