90 research outputs found
A Highly Scalable IoT Architecture through Network Function Virtualization
As the number of devices for Internet of Things (IoT) is rapidly growing, existing communication infrastructures are forced to continually evolve. The next generation network infrastructure is expected to be virtualized and able to integrate different kinds of information technology resources. Network Functions Virtualization (NFV) is one of the leading concepts facilitating the operation of network services in a scalable manner. In this paper, we present an architecture involving NFV to meet the requirements of highly scalable IoT scenarios. We highlight the benefits and challenges of our approach for IoT stakeholders. Finally, the paper illustrates our vision of how the proposed architecture can be applied in the context of a state-of-the-art high-tech operating room, which we are going to realize in future work
Modeling Support for Role-Based Delegation in Process-Aware Information Systems
In the paper, an integrated approach for the modeling and enforcement of delegation policies in process-aware information systems is presented. In particular, a delegation extension for process-related role-based access control (RBAC) models is specified. The extension is generic in the sense that it can be used to extend process-aware information systems or process modeling languages with support for processrelated RBAC delegationmodels.Moreover, the detection of delegation-related conflicts is discussed and a set of pre-defined resolution strategies for each potential conflict is provided. Thereby, the design-time and runtime consistency of corresponding RBAC delegation models can be ensured. Based on a formal metamodel, UML2 modeling support for the delegation of roles, tasks, and duties is provided. A corresponding case study evaluates the practical applicability of the approach with real-world business processes. Moreover, the approach is implemented as an extension to the BusinessActivity library and runtime engine
Dynamic Allocation of Smart City Applications
Cities around the world are evaluating the potential of Internet of Things (IoT) to automate and optimize public services. Cities that implement this approach are commonly referred to as smart cities. A smart city IoT architecture needs to be layered and scalable in order to fulfill not only today's but also future needs of smart cities. Network Function Virtualization (NFV) provides the scale and flexibility necessary for smart city services by enabling the automated control, management and orchestration of network resources. In this paper we consider a scalable, layered, NFV based smart city architecture and discuss the optimal location of applications regarding cloud computing and mobile edge computing (MEC). Introducing a novel concept of dynamic application allocation we show how to fully benefit from MEC and present relevant decision criteria
Evaluating A Uml-Based Modeling Framework For Process-Related Security Properties: A Qualitative Multi-Method Study
An Experimental Study on the Design and Modeling of Security Concepts in Business Processes
Part 5: Enterprise Modelling and Information SystemsInternational audienceIn recent years, business process models are used to define security properties for the corresponding business information systems. In this context, a number of approaches emerged that integrate security properties into standard process modeling languages. Often, these security properties are depicted as text annotations or graphical extensions. However, because the symbols of process-related security properties are not standardized, different issues concerning the comprehensibility and maintenance of the respective models arise. In this paper, we present the initial results of an experimental study on the design and modeling of 11 security concepts in a business process context. In particular, we center on the semantic transparency of the visual symbols that are intended to represent the different concepts (i.e. the one-to-one correspondence between the symbol and its meaning). Our evaluation showed that various symbols exist which are well-perceived. However, further studies are necessary to dissolve a number of remaining issues
Participatory Research as a Path to Community-Informed, Gender-Fair Machine Translation
Recent years have seen a strongly increased visibility of non-binary people
in public discourse. Accordingly, considerations of gender-fair language go
beyond a binary conception of male/female. However, language technology,
especially machine translation (MT), still suffers from binary gender bias.
Proposing a solution for gender-fair MT beyond the binary from a purely
technological perspective might fall short to accommodate different target user
groups and in the worst case might lead to misgendering. To address this
challenge, we propose a method and case study building on participatory action
research to include experiential experts, i.e., queer and non-binary people,
translators, and MT experts, in the MT design process. The case study focuses
on German, where central findings are the importance of context dependency to
avoid identity invalidation and a desire for customizable MT solutions.Comment: 11 pages, 4 figure
A Catalog of Reusable Design Decisions for Developing UML- and MOF-based Domain-Specific Modeling Languages
In the process of model-driven development (MDD) of software artifacts, domain-specific modeling languages (DSMLs) are an integral part. They act as the communication vehicle for aligning the requirements of the domain expert with the needs of the software engineer. With the rise of the UML as de facto standard for modeling software systems, MOF/UML-based DSMLs are now widely used for MDD. This paper documents design decisions from ten DSML projects which are based on the MOF/UML and which we conducted over the last years. We present our experiences in the form of reusable decision templates for all decision points detected in each phase of the DSML development process. Furthermore, we report also on identified decision dependencies which may occur within a single decision or between two decisions. (author's abstract)Series: Technical Reports / Institute for Information Systems and New Medi
Entwickler Magazin Spezial "Internet of Things", April 2014 / Ran an den Knochen: Java embedded auf dem Beagle Bone
- …
