The Integration of Security and Integrity Constraints in MOKUM
نویسندگان
چکیده
In this paper we will describe how constraints involving integrity and security can be speciied in the active object-oriented knowledge-base system MOKUM. Also we will indicate how they are implemented.
منابع مشابه
Interdependent Security Game Design over Constrained Linear Influence Networks
In today's highly interconnected networks, security of the entities are often interdependent. This means security decisions of the agents are not only influenced by their own costs and constraints, but also are affected by their neighbors’ decisions. Game theory provides a rich set of tools to analyze such influence networks. In the game model, players try to maximize their utilities through se...
متن کاملIBIS: Semantic Data Integration at Work
In this paper we present IBIS (Internet-Based Information System), a system for the semantic integration of heterogeneous data sources, which adopts innovative and state-of-the-art solutions to deal with all aspects of a complex data-integration environment, including query answering under integrity constraints and limitations on source access. IBIS is based on the global-as-view approach, usin...
متن کاملDetermining the factors affecting the evaluation of business intelligence systems with an emphasis on the integrity of Organizational resources
In the information age, the speed of producing and supplying valuable information is considered as one of the keys to success in the organizations and institutes.The major objective of this study was to investigate and specify the effective factors in evaluating the BI systems with an emphasis on the integrity of organizational resources. First, five factors were determined as the major factors...
متن کاملA Multi Objective Optimization Approach for Resources Procurement of Bank
Calculating total cast of bank resources procurement methods which include current -free loan deposit, saving interest-free loan deposit, regular and net short-term investment deposit, long-term investment deposit and surety bond cash deposit and presenting their optimal integration require precise scientific studies. Hence, this study is an attempt to know which methods are the best optimal in...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کامل