-
2013Meriam Jemel, Nadia Ben Azzouna,
A novel approach for dynamic authorisation planning in constrained workow systems
In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 388-391, ACM, 2013., 2013
Abstract
In this paper we present a specification of the most common static and dynamic workflow authorisation constraints. We propose an authorisation model that includes a planning phase, an execution phase and an adjustment phase. In addition, we focus on how the problems of role-task assignment and user-task assignment are respectively translated into CSP (Constraint Satisfaction Problem) and DyCSP (Dynamic constraint Satisfaction Problem) and solved using the explanation concept. In case of an inconsistent assignment problem, we propose to restore problem consistency based upon inconsistency explanation.
Meriam Jemel, Nadia Ben Azzouna,Towards a dynamic authorisation planning satisfying intra-instance and inter-instance constraints
In the 6th International Conference on Security of Information and Networks (SIN 2013), July 21-23 2013, Izmir, Turkey, pages 440-443, ACM, 2013., 2013
Abstract
Role-Based Access Control (RBAC) model has been developed as an alternative to traditional approaches to handle access control in workflow systems. Accordingly, authorisation constraints must be defined to enforce the legal assignment of access privileges to roles and roles to users. The authorisation planning ensures that there is at least one way to complete the workflow instance without breaching any of the authorisation constraints. Authorisation planning with considering intra-instance constraints has been discussed in the research literature. However, the inter-instance constraints also need to be considered to mitigate the security fraud. In this paper, a novel authorisation system that incorporates intra-instance and inter-instance constraints is proposed. It includes the planning phase, the execution phase, and the adjustment phase. It is in charge of generating user/role assignment plans, verifying them and eventually updating them to take into account the dynamic (intra-instance and inter-instance) constraints. Besides, grounded upon agent technology and publish-subscribe communication model, a mechanism for the consideration of dynamic constraints (intra-instance and inter-intance) to generate valid assignment plans is demonstrated.
, ,A Multi-agent Approach for Routing on Vehicular Ad-Hoc Networks,
The 4th International Conference on Ambient Systems, Networks and Technologies, 2013
Abstract
Vehicular Ad-Hoc Network is a special form of mobile ad -hoc networks (MANETs) which is a vehicle to vehicle and vehicle roadside wireless communication network. VANET is a new standard that integrates Wi-Fi, Bluetooth and other mobile connectivity protocols. The essential requirement of VANET is that it should be able to communicate in any environment irrespective of traffic densities and vehicle locations. Vehicular communications are made in fluctuating environment and should work both in urban and rural areas. Considering the large number of nodes participating in these networks and their high mobility, debates still exist about the feasibility of routing protocols. Analyzes of traditional routing protocols for MANETs demonstrated that their performance is poor in VANETs. The main problem with these protocols in VANETs environments is their route instability. Consequently, many packets are dropped and the overhead due to route repairs or failure notifications increases significantly, leading to low delivery ratios and high transmission delays. This paper introduces a multi-agent system approach to solve the problems mentioned above and improve Vehicular ad-hoc network routing.
Kalthoum Rezgui,Theoretical formulas of semantic measure: a survey
-, 2013
Abstract
In recent years, several semantic similarity and relatedness measures have been developed and applied in many domains including linguistics, biomedical informatics, GeoInformatics, and Semantic Web. This paper discusses different semantic measures which compute similarity and relatedness scores between concepts based on a knowledge representation model offered by ontologies and semantic networks. The benchmarks and approaches used for the evaluation of semantic similarity methods are also described. The aim of this paper is to give a comprehensive view of these measures which helps researchers to choose the best semantic similarity or relatedness metric for their needs.
Saoussen Bel Haj Kacem, ,RAMOLI: A generic knowledge-based systems shell for symbolic data
In : 2013 World Congress on Computer and Information Technology (WCCIT). IEEE, 2013. p. 1-6., 2013
Abstract
Non classical logics were introduced to allow handling imperfect concepts in intelligent systems. One of the principal non classical logic is multi-valued logic that has the particularity to support symbolic data. We introduced in a previous work an approximate reasoning in the multi-valued framework based on linguistic modifiers that checks approximate reasoning axiomatics. This paper describes the development of software model for the treatment of imperfection with our approach of approximate reasoning. It is a knowledge-based systems shell for symbolic data called RAMOLI. This shell provides simple and interactive Graphical User Interface to introduce knowledge and to infer with our approximate reasoning.
Wiem Hammami, Lamjed Ben SaidA DISTRIBUTED PRIVACY-PRESERVING MODEL FOR E-SERVICES
the paper propose a model for privacy protection of users in the context of e-services. A system based on our model has to respect a set of properties to preserve the user privacy, 2013
Abstract
-
2012, ,
AFAWS: An Agent based Framework for Autonomic Web Services
Multi-agent and Grid Systems, 2012
Abstract
Autonomic computing is about systems that can manage themselves. Self-management includes self-configuration, self-healing, self-optimization, etc. self-* properties. Agent technology offers key advantages for the development of autonomic computing systems as it supports autonomy, adaptability, etc. Current Web service standards and technologies do not provide a suitable architecture in which all aspects of self-management can be designed. Moreover, traditional registries are passive entities and are not able to participate, in an autonomic manner, to the Web service adaptation process. In this paper, we present an Agent-based Framework for Autonomic Web Services AFAWS. This framework is based on two agent-based systems which collaborate to enrich Web services and registries with self-* capabilities.
Wassim Ayadi, ,Pattern-driven neighborhood search for biclustering of microarray data
BMC Bioinformatics 13(S-7): S11, 2012
Abstract
Background
Biclustering aims at finding subgroups of genes that show highly correlated behaviors across a subgroup of conditions. Biclustering is a very useful tool for mining microarray data and has various practical applications. From a computational point of view, biclustering is a highly combinatorial search problem and can be solved with optimization methods.
Results
We describe a stochastic pattern-driven neighborhood search algorithm for the biclustering problem. Starting from an initial bicluster, the proposed method improves progressively the quality of the bicluster by adjusting some genes and conditions. The adjustments are based on the quality of each gene and condition with respect to the bicluster and the initial data matrix. The performance of the method was evaluated on two well-known microarray datasets (Yeast cell cycle and Saccharomyces cerevisiae), showing that it is able to obtain statistically and biologically significant biclusters. The proposed method was also compared with six reference methods from the literature.
Conclusions
The proposed method is computationally fast and can be applied to discover significant biclusters. It can also used to effectively improve the quality of existing biclusters provided by other biclustering methods.
Wassim Ayadi, ,BicFinder: a biclustering algorithm for microarray data analysis
Knowl. Inf. Syst. 30(2): 341-358, 2012
Abstract
In the context of microarray data analysis, biclustering allows the simultaneous identification of a maximum group of genes that show highly correlated expression patterns through a maximum group of experimental conditions (samples). This paper introduces a heuristic algorithm called BicFinder (The BicFinder software is available at: http://www.info.univ-angers.fr/pub/hao/BicFinder.html) for extracting biclusters from microarray data. BicFinder relies on a new evaluation function called Average Correspondence Similarity Index (ACSI) to assess the coherence of a given bicluster and utilizes a directed acyclic graph to construct its biclusters. The performance of BicFinder is evaluated on synthetic and three DNA microarray datasets. We test the biological significance using a gene annotation web-tool to show that our proposed algorithm is able to produce biologically relevant biclusters. Experimental results show that BicFinder is able to identify coherent and overlapping biclusters.
Wassim Ayadi, ,BiMine+: An efficient algorithm for discovering relevant biclusters of DNA microarray data
Knowl. Based Syst. 35: 224-234, 2012
Abstract
Biclustering is a very useful tool for analyzing microarray data. It aims to identify maximal groups of genes which are coherent with maximal groups of conditions. In this paper, we propose a biclustering algorithm, called BiMine+, which is able to detect significant biclusters from gene expression data. The proposed algorithm is based on two original features. First, BiMine+ is based on the use of a new tree structure, called Modified Bicluster Enumeration Tree (MBET), on which biclusters are represented by the profile shapes of genes. Second, BiMine+ uses a pruning rule to avoid both trivial biclusters and combinatorial explosion of the search tree. The performance of BiMine+ is assessed on both synthetic and real DNA microarray datasets. Experimental results show that BiMine+ competes favorably with several state-of-the-art biclustering algorithms and is able to extract functionally enriched and biologically relevant biclusters.


