Catálogo de publicaciones - libros
Advanced Information Systems Engineering: 18th International Conference, CAiSE 2006, Luxembourg, Luxembourg, June 5-9, 2006, Proceedings
Eric Dubois ; Klaus Pohl (eds.)
En conferencia: 18º International Conference on Advanced Information Systems Engineering (CAiSE) . Luxembourg, Luxembourg . June 5, 2006 - June 9, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Software Engineering/Programming and Operating Systems; Database Management; Information Systems Applications (incl. Internet); User Interfaces and Human Computer Interaction; Information Storage and Retrieval; Computers and Society
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-34652-4
ISBN electrónico
978-3-540-34653-1
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Cobertura temática
Tabla de contenidos
doi: 10.1007/11767138_1
Trust: From Cognition to Conceptual Models and Design
Alistair Sutcliffe
Trust as a design issue for information systems has appeared in e-commerce, e-science, and a wide variety of collaborative applications. Much discussion has centred around trust in computational artefacts such as protocols, encryption and security mechanisms; however, little research has focused on exactly what trust means in human terms. In this presentation I will review the psychology literature on trust as a product of reasoning processes, and describe a cognitive model to explain and predict inter-personal and inter-organisational trust. I argue that sound design should be based on cognitive models of users, and these should inform the semantics of conceptual modelling as well as guiding the design process. I will explore the implications of the cognitive model of trust for conceptual modelling in requirements specification languages such as i*. The final part will be more speculative. After a brief review of the implementations of trust-enhancing mechanisms in collaborative and e-science systems, focusing on user interface features rather than encryption, etc. middleware, I will discuss the design challenges for future trustworthy systems. This will cover how trust can be communicated, and issues of honesty when users may not always have the best intentions.
- Keynotes | Pp. 3-17
doi: 10.1007/11767138_2
Dealing with Trust in eGov Services
Vassily Kritis
Public Organisations are generally concerned with delivery of services to taxpayers and members of a sovereign state, or with delivery and maintenance of frameworks that benefit the general public (traffic networks, protection against criminals, education, protection from foreign perpetrators, etc.). Traditionally and in most states, Public Organizations have been early adopters of Information and Communication Technologies (ICT) in their effort to increase efficiency and quality of services delivered to the public.
- Keynotes | Pp. 18-19
doi: 10.1007/11767138_3
Trusted Interaction: User Control and System Responsibilities in Interaction Design for Information Systems
Larry L. Constantine
Trust emerges from interaction. If trust in information systems is to be promoted, then attention must be directed, at least in part, to interaction design. This presentation will explore issues of trust in the interactions between users and systems from the perspective of interaction design. It will consider a variety of pragmatic aspects in interaction design that impact user trust, including, predictability, interface stability, user control, and the match between expectations and performance. It will critically examine contemporary design practices, such as adaptive interfaces, in terms of their impact on user trust.
- Keynotes | Pp. 20-30
doi: 10.1007/11767138_4
Designing Security Requirements Models Through Planning
Volha Bryl; Fabio Massacci; John Mylopoulos; Nicola Zannone
The quest for designing secure and trusted software has led to refined Software Engineering methodologies that rely on tools to support the design process. Automated reasoning mechanisms for requirements and software verification are by now a well-accepted part of the design process, and model driven architectures support the automation of the refinement process. We claim that we can further push the envelope towards the automatic exploration and selection among design alternatives and show that this is concretely possible for Secure Tropos, a requirements engineering methodology that addresses security and trust concerns. In Secure Tropos, a design consists of a network of actors (agents, positions or roles) with delegation/permission dependencies among them. Accordingly, the generation of design alternatives can be accomplished by a planner which is given as input a set of actors and goals and generates alternative multi-agent plans to fulfill all given goals. We validate our claim with a case study using a state-of-the-art planner.
- Security | Pp. 33-47
doi: 10.1007/11767138_5
Towards a Comprehensive Framework for Secure Systems Development
Haralambos Mouratidis; Jan Jürjens; Jorge Fox
Security involves technical as well as social challenges. In the development of security-critical applications, system developers must consider both the technical and the social parts. To achieve this, security issues must be considered during the whole development life-cycle of an information system. This paper presents an approach that allows developers to consider both the social and the technical dimensions of security through a structured and well defined process. In particular, the proposed approach takes the high-level concepts and modelling activities of the secure Tropos methodology and enriches them with a low level security-engineering ontology and models derived from the UMLsec approach. A real case study from the e-commerce sector is employed to demonstrate the applicability of the approach.
- Security | Pp. 48-62
doi: 10.1007/11767138_6
Role-Based Modelling of Interactions in Database Applications
Milivoje Petrovic; Michael Grossniklaus; Moira C. Norrie
Modern information systems interact with a wide variety of users ranging from people with specific roles in business processes to end-users who access information in various ways and in different environments. Therefore, an application has to adhere to a well defined security policy on one hand and be highly adaptable to context on the other. We have extended the OM data model, with its rich support for role modelling, with concepts for modelling interactions between users and applications. In this paper, we show how the resulting interaction model can be used for role-based access control, as well as for modelling interactions in context-aware applications.
- Security | Pp. 63-77
doi: 10.1007/11767138_7
Incremental Evaluation of OCL Constraints
Jordi Cabot; Ernest Teniente
Integrity checking is aimed at determining whether an operation execution violates a given integrity constraint. To perform this computation efficiently, several incremental methods have been developed. The main goal of these methods is to consider as few of the entities in an information base as possible, which is generally achieved by reasoning from the structural events that define the effect of the operations. In this paper, we propose a new method for dealing with the incremental evaluation of the OCL integrity constraints specified in UML conceptual schemas. Since our method works at a conceptual level, its results are useful in efficiently evaluating constraints regardless of the technology platform in which the conceptual schema is to be implemented.
- Conceptual Modelling | Pp. 81-95
doi: 10.1007/11767138_8
Object-Relational Representation of a Conceptual Model for Temporal Data Warehouses
E. Malinowski; E. Zimányi
Temporal Data Warehouses (TDWs) allow to manage time-varying multidimensional data by joining the research of Temporal Databases and Data Warehouses. TDWs raise different issues such as temporal aggregations, multidimensional schema versioning, etc. However, very little attention from the research community has been drawn to conceptual modeling for TDWs and its subsequent logical representation. In this paper, we present a mapping transforming our conceptual model for TDW design into the conventional ER and an object-relational models. For the latter, we show some examples using the SQL:2003 standard. We include the mapping for time-varying levels, hierarchies, and measures. We also discuss the inconveniences of a pure relational representation.
- Conceptual Modelling | Pp. 96-110
doi: 10.1007/11767138_9
Data Translation Between Taxonomies
Sérgio Luis Sardi Mergen; Carlos Alberto Heuser
The task of translating data from one schema into another is usually performed with the help of information stating how the elements between two schemas correspond. Translation mechanisms can use this information in order to identify how instances of a source schema must be translated. We claim that a uniform matching approach, where instances of a source classes are always translated into the same target classes, may not represent the reality, specially when the schemas involved describe taxonomies. In this paper we demonstrate taxonomies that support our idea, and propose the usage of a conditional matching approach to improve the accuracy of taxonomical instances translation.
- Conceptual Modelling | Pp. 111-124
doi: 10.1007/11767138_10
Managing Quality Properties in a ROLAP Environment
Adriana Marotta; Federico Piedrabuena; Alberto Abelló
In this work we propose, for an environment where multidimensional queries are made over multiple Data Marts, techniques for providing the user with quality information about the retrieved data. This meta-information behaves as an added value over the obtained information or as an additional element to take into account during the proposition of the queries. The quality properties considered are freshness, availability and accuracy. We provide a set of formulas that allow estimating or calculating the values of these properties, for the result of any multidimensional operation of a predefined basic set.
- Queries | Pp. 127-141