Search results

1 – 10 of over 16000
Open Access
Article
Publication date: 4 December 2017

Daniel Conte de Leon, Antonius Q. Stalick, Ananth A. Jillepalli, Michael A. Haney and Frederick T. Sheldon

The purpose of this article is to clarify current and widespread misconceptions about the properties of blockchain technologies and to describe challenges and avenues for correct

23206

Abstract

Purpose

The purpose of this article is to clarify current and widespread misconceptions about the properties of blockchain technologies and to describe challenges and avenues for correct and trustworthy design and implementation of distributed ledger system (DLS) or Technology (DLT).

Design/methodology/approach

The authors contrast the properties of a blockchain with desired, however emergent, properties of a DLS, which is a complex and distributed system. They point out and justify, with facts and analysis, current misconceptions about the blockchain and DLSs. They describe challenges that these systems will need to address and possible solution avenues for achieving trustworthiness.

Findings

Many of the statements that have appeared on the internet, news and academic articles, such as immutable ledger and exact copies, may be misleading. These are desired emergent properties of a complex system, not assured properties. It is well-known within the distributed systems and critical software community that it is extremely hard to prove that a complex system correctly and completely implements emergent properties. Further research and development for trustworthy DLS design and implementation is needed, both practical and theoretical.

Research limitations/implications

This is the first known published attempt at describing current misconceptions about blockchain technologies. Further collaborative work, discussions, potential solutions, evaluations, resulting publications and verified reference implementations are needed to ensure DLTs are safe, secure, and trustworthy.

Practical implications

Interdisciplinary teams with members from academia, business and industry, and from disciplines such as business, entrepreneurship, theoretical and practical computer science, cybersecurity, finance, mathematics and statistics, must be formed. Such teams must collaborate with the objective of developing strategies and techniques for ensuring the correctness and security of future DLSs in which our society may become dependent.

Originality value

The value and originality of this article is twofold: the disproving, through fact collection and systematic analysis, of current misconceptions about the properties of the blockchain and DLSs, and the discussion of challenges to achieving adequate trustworthiness along with the proposal of general avenues for possible solutions.

Details

Asia Pacific Journal of Innovation and Entrepreneurship, vol. 11 no. 3
Type: Research Article
ISSN: 2071-1395

Keywords

Open Access
Article
Publication date: 6 September 2021

Gerd Hübscher, Verena Geist, Dagmar Auer, Nicole Hübscher and Josef Küng

Knowledge- and communication-intensive domains still long for a better support of creativity that considers legal requirements, compliance rules and administrative tasks as well…

876

Abstract

Purpose

Knowledge- and communication-intensive domains still long for a better support of creativity that considers legal requirements, compliance rules and administrative tasks as well, because current systems focus either on knowledge representation or business process management. The purpose of this paper is to discuss our model of integrated knowledge and business process representation and its presentation to users.

Design/methodology/approach

The authors follow a design science approach in the environment of patent prosecution, which is characterized by a highly standardized, legally prescribed process and individual knowledge study. Thus, the research is based on knowledge study, BPM, graph-based knowledge representation and user interface design. The authors iteratively designed and built a model and a prototype. To evaluate the approach, the authors used analytical proof of concept, real-world test scenarios and case studies in real-world settings, where the authors conducted observations and open interviews.

Findings

The authors designed a model and implemented a prototype for evolving and storing static and dynamic aspects of knowledge. The proposed solution leverages the flexibility of a graph-based model to enable open and not only continuously developing user-centered processes but also pre-defined ones. The authors further propose a user interface concept which supports users to benefit from the richness of the model but provides sufficient guidance.

Originality/value

The balanced integration of the data and task perspectives distinguishes the model significantly from other approaches such as BPM or knowledge graphs. The authors further provide a sophisticated user interface design, which allows the users to effectively and efficiently use the graph-based knowledge representation in their daily study.

Details

International Journal of Web Information Systems, vol. 17 no. 6
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 20 August 2021

Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…

2169

Abstract

Purpose

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.

Design/methodology/approach

We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.

Findings

We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.

Research limitations/implications

Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.

Originality/value

In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 15 August 2022

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore…

6667

Abstract

Purpose

Authorization and access control have been a topic of research for several decades. However, existing definitions are inconsistent and even contradicting each other. Furthermore, there are numerous access control models and even more have recently evolved to conform with the challenging requirements of resource protection. That makes it hard to classify the models and decide for an appropriate one satisfying security needs. Therefore, this study aims to guide through the plenty of access control models in the current state of the art besides this opaque accumulation of terms meaning and how they are related.

Design/methodology/approach

This study follows the systematic literature review approach to investigate current research regarding access control models and illustrate the findings of the conducted review. To provide a detailed understanding of the topic, this study identified the need for an additional study on the terms related to the domain of authorization and access control.

Findings

The authors’ research results in this paper are the distinction between authorization and access control with respect to definition, strategies, and models in addition to the classification schema. This study provides a comprehensive overview of existing models and an analysis according to the proposed five classes of access control models.

Originality/value

Based on the authors’ definitions of authorization and access control along with their related terms, i.e. authorization strategy, model and policy as well as access control model and mechanism, this study gives an overview of authorization strategies and propose a classification of access control models providing examples for each category. In contrast to other comparative studies, this study discusses more access control models, including the conventional state-of-the-art models and novel ones. This study also summarizes each of the literature works after selecting the relevant ones focusing on the database system domain or providing a survey, a classification or evaluation criteria of access control models. Additionally, the introduced categories of models are analyzed with respect to various criteria that are partly selected from the standard access control system evaluation metrics by the National Institute of Standards and Technology.

Details

International Journal of Web Information Systems, vol. 18 no. 2/3
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 9 October 2023

Aya Khaled Youssef Sayed Mohamed, Dagmar Auer, Daniel Hofer and Josef Küng

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are…

1001

Abstract

Purpose

Data protection requirements heavily increased due to the rising awareness of data security, legal requirements and technological developments. Today, NoSQL databases are increasingly used in security-critical domains. Current survey works on databases and data security only consider authorization and access control in a very general way and do not regard most of today’s sophisticated requirements. Accordingly, the purpose of this paper is to discuss authorization and access control for relational and NoSQL database models in detail with respect to requirements and current state of the art.

Design/methodology/approach

This paper follows a systematic literature review approach to study authorization and access control for different database models. Starting with a research on survey works on authorization and access control in databases, the study continues with the identification and definition of advanced authorization and access control requirements, which are generally applicable to any database model. This paper then discusses and compares current database models based on these requirements.

Findings

As no survey works consider requirements for authorization and access control in different database models so far, the authors define their requirements. Furthermore, the authors discuss the current state of the art for the relational, key-value, column-oriented, document-based and graph database models in comparison to the defined requirements.

Originality/value

This paper focuses on authorization and access control for various database models, not concrete products. This paper identifies today’s sophisticated – yet general – requirements from the literature and compares them with research results and access control features of current products for the relational and NoSQL database models.

Details

International Journal of Web Information Systems, vol. 20 no. 1
Type: Research Article
ISSN: 1744-0084

Keywords

Article
Publication date: 1 April 2004

Georgios I. Zekos

Investigates the differences in protocols between arbitral tribunals and courts, with particular emphasis on US, Greek and English law. Gives examples of each country and its way…

9504

Abstract

Investigates the differences in protocols between arbitral tribunals and courts, with particular emphasis on US, Greek and English law. Gives examples of each country and its way of using the law in specific circumstances, and shows the variations therein. Sums up that arbitration is much the better way to gok as it avoids delays and expenses, plus the vexation/frustration of normal litigation. Concludes that the US and Greek constitutions and common law tradition in England appear to allow involved parties to choose their own judge, who can thus be an arbitrator. Discusses e‐commerce and speculates on this for the future.

Details

Managerial Law, vol. 46 no. 2/3
Type: Research Article
ISSN: 0309-0558

Keywords

Article
Publication date: 1 January 1975

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis…

Abstract

Knight's Industrial Law Reports goes into a new style and format as Managerial Law This issue of KILR is restyled Managerial Law and it now appears on a continuous updating basis rather than as a monthly routine affair.

Details

Managerial Law, vol. 18 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 May 1997

Anghel N. Rugina

The equation of unified knowledge says that S = f (A,P) which means that the practical solution to a given problem is a function of the existing, empirical, actual realities and

3011

Abstract

The equation of unified knowledge says that S = f (A,P) which means that the practical solution to a given problem is a function of the existing, empirical, actual realities and the future, potential, best possible conditions of general stable equilibrium which both pure and practical reason, exhaustive in the Kantian sense, show as being within the realm of potential realities beyond any doubt. The first classical revolution in economic thinking, included in factor “P” of the equation, conceived the economic and financial problems in terms of a model of ideal conditions of stable equilibrium but neglected the full consideration of the existing, actual conditions. That is the main reason why, in the end, it failed. The second modern revolution, included in factor “A” of the equation, conceived the economic and financial problems in terms of the existing, actual conditions, usually in disequilibrium or unstable equilibrium (in case of stagnation) and neglected the sense of right direction expressed in factor “P” or the realization of general, stable equilibrium. That is the main reason why the modern revolution failed in the past and is failing in front of our eyes in the present. The equation of unified knowledge, perceived as a sui generis synthesis between classical and modern thinking has been applied rigorously and systematically in writing the enclosed American‐British economic, monetary, financial and social stabilization plans. In the final analysis, a new economic philosophy, based on a synthesis between classical and modern thinking, called here the new economics of unified knowledge, is applied to solve the malaise of the twentieth century which resulted from a confusion between thinking in terms of stable equilibrium on the one hand and disequilibrium or unstable equilibrium on the other.

Details

International Journal of Social Economics, vol. 24 no. 5
Type: Research Article
ISSN: 0306-8293

Keywords

Article
Publication date: 1 January 1976

The Howard Shuttering Contractors case throws considerable light on the importance which the tribunals attach to warnings before dismissing an employee. In this case the tribunal…

Abstract

The Howard Shuttering Contractors case throws considerable light on the importance which the tribunals attach to warnings before dismissing an employee. In this case the tribunal took great pains to interpret the intention of the parties to the different site agreements, and it came to the conclusion that the agreed procedure was not followed. One other matter, which must be particularly noted by employers, is that where a final warning is required, this final warning must be “a warning”, and not the actual dismissal. So that where, for example, three warnings are to be given, the third must be a “warning”. It is after the employee has misconducted himself thereafter that the employer may dismiss.

Details

Managerial Law, vol. 19 no. 1
Type: Research Article
ISSN: 0309-0558

Article
Publication date: 1 March 1947

F/Lt. S. Cooper

BEFORE commencing an inspection obtain the pilot's report on the previous flight. In the course of the following inspections, as with all inspections, components which are found…

Abstract

BEFORE commencing an inspection obtain the pilot's report on the previous flight. In the course of the following inspections, as with all inspections, components which are found to be damaged or defective must be repaired, if possible, or replaced. However, before repairing a component, the relevant repair instructions must be consulted. Unless otherwise stated, these inspections are carried out every 40 hours.

Details

Aircraft Engineering and Aerospace Technology, vol. 19 no. 3
Type: Research Article
ISSN: 0002-2667

1 – 10 of over 16000