[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2816839.2816919acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciipConference Proceedingsconference-collections
research-article

An agent based approach for security integration in Business Rules Management System

Published: 23 November 2015 Publication History

Abstract

The roots of business rules come from the Artificial Intelligence community, where they have been successfully applied as a way of representing knowledge. In the knowledge-based systems, the knowledge and reasoning of a human expert can be captured and stored in a form of complex networks of rules. Therefore, the manipulation of the business expert's knowledge generates an imperious need for information security and associated technologies. The notion of cryptography has emerged as a basic concept in the business rules modeling.
In this paper, we propose to handle the security aspect by using an encryption algorithm. To do so, we simulate some encryption algorithms such us DES, Blowfish, RC4, AES and RSA.
One of our objectives is to provide an original approach for security integration in Business Rules Management System design which should serve all objectives of all parties in the enterprise (Business analysts, Experts, Risk manager, etc). We propose to integrate an agent-based approach in the framework. This solution is utilizing a security agent (SA) with domain ontology. This agent applies an encryption/decryption algorithm to allow confidentiality, authenticity and integrity of the most important business rules.
We performed some experiments to find the better encryption algorithm which provides improvement in terms of response time, space memory and security.

References

[1]
V. Legendre, G. Petitjean and T. Lepatre, Gestion des règles «métier », Génie logiciel, No. 9 2, 43--52, 2010.
[2]
A. Chniti, P. Albert and J. Charlet, Gestion de la cohérence des règles métier éditées à partir d'ontologies OWL, dans le proceding IC2011.
[3]
O. Lopez-Ortega and I.l Villar-Medina, A multi-agent system to construct production orders by employing an expert system and a neural network, dans le journal Expert Systems with Applications, numéro 36, année 2009, pages 2937--2946.
[4]
M. Bajec and M. Krisper, A methodology and tool support for managing business rules in organizations, dans le journal Information Systems, numéro 30, année 2005, pages 423--443.
[5]
A. Chniti, P. Albert and J. Charlet, Gestion des dépendances et des interactions entre On-tologies et Règles Métier, thése de dotorat soutenue à l'Université Pierre et Marie Curie - Paris VI, année 2013.
[6]
N. Sad houari and N. Taghezout, A Combined Use Between Rules, Ontology and Agents in BRMS Design: Application to SME in Algeria, International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015), 7-8 January 2015, Dubai, ISBN 978-93-84422-05-9.
[7]
http://searchsoftwarequality.techtarget.com/definition/cryptography
[8]
Rolland Balzon Philippe, Principaux algorithmes de cryptage, Department of Computer Science, SEPRO Robotique, ZI les ajoncs, 85000 La roche sur Yon, France, 2002.
[9]
Vivien Bernet-Rollande and Simon Lallemand, Rapport de TX Étude d'une attaque contre l'algorithme RC4, 2010.
[10]
CHAPITRE 4 A. E. S. (Advanced Encryption Standard), http://math.univ-lyon1.fr/~roblot/masterpro.html
[11]
Alice Lan and Benoit Vandevelde, Panorama des algorithmes de Cryptographie, 2011.
[12]
Business Process Modeling, White Paper, ECP - Center of Excellence in Enterprise Architecture, 2008, www.ceisar.org

Cited By

View all
  • (2020)Implementation of RC4 Cryptography Algorithm for Data File SecurityJournal of Physics: Conference Series10.1088/1742-6596/1569/2/0220801569(022080)Online publication date: 24-Jul-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
IPAC '15: Proceedings of the International Conference on Intelligent Information Processing, Security and Advanced Communication
November 2015
495 pages
ISBN:9781450334587
DOI:10.1145/2816839
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 November 2015

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Business Rules Management System (BRMS)
  2. Business rules (BR)
  3. Encryption algorithms
  4. Ontologies
  5. Security agent

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

IPAC '15

Acceptance Rates

Overall Acceptance Rate 87 of 367 submissions, 24%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Implementation of RC4 Cryptography Algorithm for Data File SecurityJournal of Physics: Conference Series10.1088/1742-6596/1569/2/0220801569(022080)Online publication date: 24-Jul-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media