Data Privacy Validation and Verification in E-Health
|
|
- Myles Hopkins
- 5 years ago
- Views:
Transcription
1 Data Privacy Validation and Verification in E-Health Flora Amato 1, Francesco Moscato 2, Vincenzo Moscato 3, and Antonio Picariello 4 1 DIETI, University of Naples Federico II, Italy, flora.amato@unina.it 2 DiSciPol, University of Campania Luigi Vanvitelli, Italy, francesco.moscato@unicampania.it 3 DIETI, University of Naples Federico II, Italy, vmoscato@unina.it 4 DIETI, University of Naples Federico II, Italy, picus@unina.it Abstract. The few last years experienced the growth of new technologies able to remotely monitor health state of persons. This includes both (even complex) Medical devices and all kind of wearable device. Thus, the problem of assuring data privacy is more and more important in E- Health systems. Privacy requirements in Medical domains are not only defined by service providers or users, but Legal rules regulate the whole management and storage processes of health records. This is a discussion paper on the use of Model Driven techniques for E-Health systems for formal verification of privacy requirements. The whole approach is based on MetaMORP(h)OSY modeling profile in order to explicitly consider privacy requirements for data. This work discusses about a novel model transformation algorithm for the application of Model Checking techniques to privacy verification. Keywords: Privacy Model Driven Engineering E-Health. 1 Introduction The last few years saw Internet of Things (IoT), Smart Devices, Edge and Cloud computing as one of the main research topic in Computer Science and Engineering. In particular E-health is now an hot topic thanks to IoT and Smart devices applications used in health domain. E-Health allows for an increase of efficiency in health care, decreasing costs, sharing diagnostics and information about therapeutic interventions. It also improves quality and reduces delay of medical actions enabling fast second opinion requests and supporting for remote suggestions and training from specialists. E-Health inherits all problems both from Medical and Computer Science domains. In particular Data Privacy is an hard problem to deal with for it unfortunately adds legal requirements (and hence the Legal domain) to the others. The main problems with these new technologies is that they trigger several privacy issues because of the large amount of sensitive data on patients health condition.
2 2 F.Amato et al. In this scenario it is really difficult to verify if a computer system respects data privacy requirements because of the heterogeneity of elements to consider. This work discusses on how Model Driven Engineering (MDE)[30] enables formal, automatic verification of E-Health composite processes with regards to Data Privacy properties. In particular, we exploit MetaMORP(h)OSY framework in order to provide formal modeling profiles and methodologies in order to define models of E-Health Systems and to analyse privacy requirements with formal methods. Model Driven Engineering extends the scope of OMG s Model Driven Architecture (MDA)[31], MDE is wider in scope than MDA. It combines design, automatic generation of system components and requirements verification during all its life-cycle. MDE focuses on creating running components of a system by their abstract (and formal) representation, leaving verification and (some) implementation issues to automatic translators. Requirements on abstract models are easier to analyse and formal verification can be exploited as well during design phase. In order to reduce the introduction of implementation errors, MDE methodologies try to implement automatically components from design models. In this way, introduction of errors that may lead to unsatisfying requirement can be reduced producing systems correct by construction. In this paper we will use MetaMORP(h)OSY MDE framework, that is based on a Multi-Agent modeling paradigm. As we will describe in the following, this paradigm suites well the complexity of E-Health systems. Multi-Agent Systems[34] Models are promising formalisms for the analysis of complex services, where several actors executes actions pro-actively. E-Health systems have this properties for their nature of distributed and heterogeneous systems. It defines actors and system components by using a meta-formalism that extends Unified Modeling Language (UML). The main model is then analysed by means of formal models that are obtained from the UML model with model transformation algorithms. MetaMORP(h)OSY framework was introduced in [2]. In this paper we discuss results of[3]. We show how MetaMORP(h)OSY modeling profile is able to explicitly consider privacy requirements for data. A novel algorithm is described for implementing a horizontal model transformation [23] for the application of Model Checking techniques to privacy verification. 2 Data Privacy: Modelling and Verification In order to specialize MetaMORP(h)OSY methodology to manage verification of data privacy on E-Health systems, we must extend its modeling profiles. A sketch of this profile is reported in Fig.1. On the other hands, this new modelling profile specializes some beliefs too. Known Electronic Health Records (HealthRecord) and eventually their encrypted versions (EnCryptedHR) refers to some Patients and are stored onto DataSubProcessors. Patients may hide some records (HiddenRecord )to any agent able to read his data and can grant authorization (AccessGrant ) to ac-
3 Data Privacy Validation and Verification in E-Health 3 Fig. 1. E-Health Modelling Profile cess to data to any other agent. In particular, access to encrypted data must be coupled with the keys to manage encryption (EncryptKey and DecryptKey). As introduced in section 1, this work manages the verification of privacy requirements as a reachability problem. This also because MetaMORP(h)OSY includes some Observers for Analysis of timed reachability of Agents Goals. Anyway the basic Observer profile has been specialized as show in Fig.2. This new Observer, in fact, explicitly considers the Health records and the authorization granted to access records. Obviously, MetaMORP(h)OSY profile can be extended to manage different properties and architectures related to distributed data problems. For example, E-Health data management may lead to the use of public and private clouds, multi-provider clouds, etc. Requirements for multi-storage architectures can be easily integrated in the model. In particular, the application of Meta- MORP(h)OSY methodology to the case of multi-storage services from multiple parties, which leads to a composite cloud service, is deeply discussed in [24]. Finally, the main MetaMORP(h)OSY profile was defined for description of real-time system and it includes many elements to define time constraints and
4 4 F.Amato et al. Fig. 2. E-Health Observer Profile timed behaviours of agents. Some Observers (both at design and run time) exists that are able to check temporal behaviours of the systems. Previous works ([25, 28, 5]) describes them. Notice that we can use this part of the profile to model time-variant data-policies and storage behaviours, but this is out of the scope of this work. 3 Case Studies In this section we want to show how it is possible to use MetaMORP(h)OSY methodology and the modeling profile described in the previous section in order to define a protocol for managing and storing E-Health records. For Simplicity s sake, we will consider several simplifying assumptions. We consider the communication networks secure; we model data controllers, processors and subprocessors as a unique agent. The problem to solve is the storage of sensitive data (the health record) on a third-party storage server (eventually a cloud storage). Data outputted from the device is encrypted every time. The physician (thedoctor) can access to thepatient s record only if it is authorized by the patient, but thedoctor cannot own the decription key of thepatient. In addition, in order to manage emergencies, an encrypted version of the record has to be stored on the DataProvider too. In order to produce a MetaMORP(h)OSY model of these agents, we must define an Agent Diagram describing the structural view of the agents. The Agent Diagrams declare the structure, the plans, the goals and the beliefs of each agents. In the following we will omit the inner properties of each element in the diagrams for brevity.
5 Data Privacy Validation and Verification in E-Health 5 Fig. 3. thepatient s Agent Diagram Fig.3 depicts the Agent Diagram for thepatient. In order to describe each plan behavior, we must define proper Activity Diagrams that are compliant with the previously exposed modesling profile. Finally, Sequence diagrams constitute a mean to orchestrate agents execution in use cases. They simply declares events that agents assert during their execution. It is possible to verify CTL formulas by means of the Observer. For example: thedoctor.emergencyaccess.initialactivity EGtheDoctor.Read Goal Is true if in the case of Emergency, in any case the Read Goal is reachable and hence the doctor can, in any case, read the record in case of emergency. 4 Conclusions In this paper we have extet the MetaMORP(h)OSY modelling profile in order to explicitly consider privacy requirements for data. A novel algorithm is described
6 6 F.Amato et al. Fig. 4. Save Plan for implementing a horizontal model transformation for the application of Model Checking techniques to privacy verification and to express privacy in terms of a stete reachability problem following an MDE approach. As future works we are considering the introduction of further model transformation algorithms to support more complicated data privacy requirements and models. For example, the approach reported in [20] uses models based on Bayesan Models. Since MetaMORP(h)OSY already embeds Bayesan Observers, we will try to enhance our modelling and verification techniques to include more and more privacy models. References 1. Abdulla, P., Deneux, J., Stalmarck, G., Agren, H., Akerlund, O.: Designing safe, reliable systems using scade. In: Margaria, T., Steffen, B. (eds.) Leveraging Applications of Formal Methods, Lecture Notes in Computer Science, vol. 4313, pp Springer Berlin Heidelberg (2006) 2. Amato, F., Mazzocca, N., Moscato, F.: Model driven design and evaluation of security level in orchestrated cloud services. Journal of Network and Computer Applications 106, (2018) 3. Amato, F., Moscato, F.: A model driven approach to data privacy verification in e-health systems. Trans. Data Privacy 8(3), (2015) 4. Antón, A.I., Earp, J.B., Reese, A.: Analyzing website privacy requirements using a privacy goal taxonomy. In: Requirements Engineering, Proceedings. IEEE Joint International Conference on. pp IEEE (2002) 5. Aversa, R., Di Martino, B., Moscato, F.: Critical systems verification in metamorp (h) osy. In: Computer Safety, Reliability, and Security, pp Springer (2014) 6. Bauer, B.: Uml class diagrams revisited in the context of agent-based systems. In: Agent-Oriented Software Engineering II, pp Springer (2002) 7. Bauer, B., Mller, J.P., Odell, J.: Agent uml: A formalism for specifying multiagent software systems. Int. Journal of Software Engineering and Knowledge Engineering 11, (2000)
7 Data Privacy Validation and Verification in E-Health 7 8. Behrmann, G., David, A., Larsen, K.G., Pettersson, P., Yi, W.: Developing uppaal over 15 years. Software: Practice and Experience 41(2), (2011) 9. Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: An agent-oriented software development methodology. Autonomous Agents and Multi- Agent Systems 8(3), (2004) 10. Commission, E.: Article 29 Working Party. data-protection/article-29/index_en.htm (2013), [Online; Last update: 06/08/2013] 11. Ding, Y., Klein, K.: Model-driven application-level encryption for the privacy of e- health data. In: Availability, Reliability, and Security, ARES 10 International Conference on. pp (Feb 2010) Dolin, R.H., Alschuler, L., Boyer, S., Beebe, C., Behlen, F.M., Biron, P.V., Shvo, A.S.: Hl7 clinical document architecture, release 2. Journal of the American Medical Informatics Association 13(1), (2006) 13. Farines, J., De Queiroz, M., da Rocha, V., Carpes, A., Vernadat, F., Cregut, X.: A model-driven engineering approach to formal verification of plc programs. In: Emerging Technologies Factory Automation (ETFA), 2011 IEEE 16th Conference on. pp. 1 8 (Sept 2011) Fernndez-Caballero, A., Gascuea, J.: Developing multi-agent systems through integrating prometheus, ingenias and icaro-t. In: Filipe, J., Fred, A., Sharp, B. (eds.) Agents and Artificial Intelligence, Communications in Computer and Information Science, vol. 67, pp Springer Berlin Heidelberg (2010) 15. Fredriksen, R., Kristiansen, M., Gran, B.A., Stølen, K., Opperud, T.A., Dimitrakos, T.: The coras framework for a model-based risk management process. In: Computer Safety, Reliability and Security, pp Springer (2002) 16. Fuxman, A., Pistore, M., Mylopoulos, J., Traverso, P.: Model checking early requirements specifications in tropos. In: Requirements Engineering, Proceedings. Fifth IEEE International Symposium on. pp IEEE (2001) 17. Gascuea, J.M., Navarro, E., Fernndez-Caballero, A.: Model-driven engineering techniques for the development of multi-agent systems. Engineering Applications of Artificial Intelligence 25(1), (2012). http: // 18. Hafer, T., Thomas, W.: Computation tree logic ctl* and path quantifiers in the monadic theory of the binary tree. In: Automata, Languages and Programming, pp Springer (1987) 19. Kalra, D.: Electronic health record standards (2006) 20. Liu, J., Xiong, L., Luo, J.: Semantic security: Privacy definitions revisited. Transactions on Data Privacy 6(3), (2013) 21. Lodderstedt, T., Basin, D., Doser, J.: Secureuml: A uml-based modeling language for model-driven security. In: UML 2002The Unified Modeling Language, pp Springer (2002) 22. Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the italian data protection legislation. Computer Standards & Interfaces 27(5), (2005) 23. Mens, T., Gorp, P.V.: A taxonomy of model transformation. Electronic Notes in Theoretical Computer Science 152(0), (2006). science/article/pii/s , proceedings of the International Workshop on Graph and Model Transformation (GraMoT 2005), Graph and Model Transformation 2005
8 8 F.Amato et al. 24. Moscato, F.: Model driven engineering and verification of composite cloud services in metamorp(h)osy. In: Intelligent Networking and Collaborative Systems (INCoS), 2014 International Conference on. pp (Sept 2014) Moscato, F., Venticinque, S., Aversa, R., Di Martino, B.: Formal modeling and verification of real-time multi-agent systems: The remm framework. Studies in Computational Intelligence 162, (2008) 26. Moscato, F., Aversa, R., Martino, B.D., Fortis, T.F., Munteanu, V.I.: An analysis of mosaic ontology for cloud resources annotation. In: IEEE Proc. of FedCSIS 2011 Conference. pp (2011) 27. Moscato, F., Martino, B.D., Aversa, R.: Enabling model driven engineering of cloud services by using mosaic ontology. Scalable Computing: Practice and Experience 13(1) (2012) 28. Moscato, F., Venticinque, S., Aversa, R., Di Martino, B.: Formal modeling and verification of real-time multi-agent systems: The remm framework. In: Badica, C., Mangioni, G., Carchiolo, V., Burdescu, D. (eds.) Intelligent Distributed Computing, Systems and Applications, Studies in Computational Intelligence, vol. 162, pp Springer Berlin / Heidelberg (2008) 29. Moscato, F., Vittorini, V., Amato, F., Mazzeo, A., Mazzocca, N.: Solution workflows for model-based analysis of complex systems. IEEE T. Automation Science and Engineering 9(1), (2012) 30. Schmidt, D.C.: Model-driven engineering. COMPUTER-IEEE COMPUTER SOCIETY- 39(2), 25 (2006) 31. Soley, R., et al.: Model driven architecture. OMG white paper 308, 308 (2000) 32. Toval, A., Olmos, A., Piattini, M.: Legal requirements reuse: a critical success factor for requirements quality and personal data protection. In: Requirements Engineering, Proceedings. IEEE Joint International Conference on. pp IEEE (2002) 33. Trencansky, I., Cervenka, R.: Agent modeling language (aml): A comprehensive approach to modeling mas. Whitestein Series in Software Agent Technologies and Autonomic Computing 29, (2005) 34. Wooldridge, M.: Agent-based software engineering. In: IEE Proceedings on Software Engineering. pp (1997)
An Ontology for Modelling Security: The Tropos Approach
An Ontology for Modelling Security: The Tropos Approach Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 University of Sheffield, Computer Science Department, UK {haris, g.manson}@dcs.shef.ac.uk
More informationAOSE Agent-Oriented Software Engineering: A Review and Application Example TNE 2009/2010. António Castro
AOSE Agent-Oriented Software Engineering: A Review and Application Example TNE 2009/2010 António Castro NIAD&R Distributed Artificial Intelligence and Robotics Group 1 Contents Part 1: Software Engineering
More informationMULTI-AGENT BASED SOFTWARE ENGINEERING MODELS: A REVIEW
MULTI-AGENT BASED SOFTWARE ENGINEERING MODELS: A REVIEW 1 Okoye, C. I, 2 John-Otumu Adetokunbo M, and 3 Ojieabu Clement E. 1,2 Department of Computer Science, Ebonyi State University, Abakaliki, Nigeria
More informationOn the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning
On the use of the Goal-Oriented Paradigm for System Design and Law Compliance Reasoning Mirko Morandini 1, Luca Sabatucci 1, Alberto Siena 1, John Mylopoulos 2, Loris Penserini 1, Anna Perini 1, and Angelo
More informationST Tool. A CASE tool for security aware software requirements analysis
ST Tool A CASE tool for security aware software requirements analysis Paolo Giorgini Fabio Massacci John Mylopoulos Nicola Zannone Departement of Information and Communication Technology University of
More informationUsing Agent-Based Methodologies in Healthcare Information Systems
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 18, No 2 Sofia 2018 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2018-0033 Using Agent-Based Methodologies
More informationA Modeling Method to Develop Goal Oriented Adaptive Agents in Modeling and Simulation for Smart Grids
A Modeling Method to Develop Goal Oriented Adaptive Agents in Modeling and Simulation for Smart Grids Hyo-Cheol Lee, Hee-Soo Kim and Seok-Won Lee Knowledge-intensive Software Engineering (NiSE) Lab. Ajou
More informationMethodology for Agent-Oriented Software
ب.ظ 03:55 1 of 7 2006/10/27 Next: About this document... Methodology for Agent-Oriented Software Design Principal Investigator dr. Frank S. de Boer (frankb@cs.uu.nl) Summary The main research goal of this
More informationComponent Based Mechatronics Modelling Methodology
Component Based Mechatronics Modelling Methodology R.Sell, M.Tamre Department of Mechatronics, Tallinn Technical University, Tallinn, Estonia ABSTRACT There is long history of developing modelling systems
More informationSchool of Computing, National University of Singapore 3 Science Drive 2, Singapore ABSTRACT
NUROP CONGRESS PAPER AGENT BASED SOFTWARE ENGINEERING METHODOLOGIES WONG KENG ONN 1 AND BIMLESH WADHWA 2 School of Computing, National University of Singapore 3 Science Drive 2, Singapore 117543 ABSTRACT
More informationDistributed Robotics: Building an environment for digital cooperation. Artificial Intelligence series
Distributed Robotics: Building an environment for digital cooperation Artificial Intelligence series Distributed Robotics March 2018 02 From programmable machines to intelligent agents Robots, from the
More informationAdvances and Perspectives in Health Information Standards
Advances and Perspectives in Health Information Standards HL7 Brazil June 14, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied
More informationStructural Analysis of Agent Oriented Methodologies
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 6 (2014), pp. 613-618 International Research Publications House http://www. irphouse.com Structural Analysis
More informationModel-Driven Engineering of Embedded Real-Time Systems
Model-Driven Engineering of Embedded Real-Time Systems Federico Ciccozzi 1 Mälardalen University, Mälardalen Real-Time Research Center federico.ciccozzi@mdh.se 1 Introduction 1.1 Research Topic Model-Based
More informationDemonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools
Demonstration of DeGeL: A Clinical-Guidelines Library and Automated Guideline-Support Tools Avner Hatsek, Ohad Young, Erez Shalom, Yuval Shahar Medical Informatics Research Center Department of Information
More informationRobot Ontology Standards
Robot Ontology Standards Tamas Haidegger*, P. Galambos Óbuda University, Antal Bejczy Center for Intelligent Robotics Austrian Center for Medical Innovation and Technology (ACMIT) Introduction Óbuda University
More informationCo-evolution of agent-oriented conceptual models and CASO agent programs
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Co-evolution of agent-oriented conceptual models and CASO agent programs
More informationPervasive Services Engineering for SOAs
Pervasive Services Engineering for SOAs Dhaminda Abeywickrama (supervised by Sita Ramakrishnan) Clayton School of Information Technology, Monash University, Australia dhaminda.abeywickrama@infotech.monash.edu.au
More informationA game-based model for human-robots interaction
A game-based model for human-robots interaction Aniello Murano and Loredana Sorrentino Dipartimento di Ingegneria Elettrica e Tecnologie dell Informazione Università degli Studi di Napoli Federico II,
More informationarxiv: v1 [cs.ai] 20 Feb 2015
Automated Reasoning for Robot Ethics Ulrich Furbach 1, Claudia Schon 1 and Frieder Stolzenburg 2 1 Universität Koblenz-Landau, {uli,schon}@uni-koblenz.de 2 Harz University of Applied Sciences, fstolzenburg@hs-harz.de
More informationTowards an MDA-based development methodology 1
Towards an MDA-based development methodology 1 Anastasius Gavras 1, Mariano Belaunde 2, Luís Ferreira Pires 3, João Paulo A. Almeida 3 1 Eurescom GmbH, 2 France Télécom R&D, 3 University of Twente 1 gavras@eurescom.de,
More informationA User Interface Level Context Model for Ambient Assisted Living
not for distribution, only for internal use A User Interface Level Context Model for Ambient Assisted Living Manfred Wojciechowski 1, Jinhua Xiong 2 1 Fraunhofer Institute for Software- und Systems Engineering,
More informationA User-Friendly Interface for Rules Composition in Intelligent Environments
A User-Friendly Interface for Rules Composition in Intelligent Environments Dario Bonino, Fulvio Corno, Luigi De Russis Abstract In the domain of rule-based automation and intelligence most efforts concentrate
More informationAgent-Oriented Approach to Develop Context-Aware Applications: A Case Study on Communities of Practice
Agent-Oriented Approach to Develop Context-Aware Applications: A Case Study on Communities of Practice Luiz Olavo Bonino da Silva Santos 1, Renata Silva Souza Guizzardi 2, and Marten van Sinderen 2 1 University
More informationThe role of testing in verification and certification Kerstin Eder
The role of testing in verification and certification Kerstin Eder Design Automation and Verification, Microelectronics [and Trustworthy Systems Laboratory] Verification and Validation for Safety in Robots,
More informationIMPLEMENTING MULTIPLE ROBOT ARCHITECTURES USING MOBILE AGENTS
IMPLEMENTING MULTIPLE ROBOT ARCHITECTURES USING MOBILE AGENTS L. M. Cragg and H. Hu Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ E-mail: {lmcrag, hhu}@essex.ac.uk
More informationThe PASSI and Agile PASSI MAS meta-models
The PASSI and Agile PASSI MAS meta-models Antonio Chella 1, 2, Massimo Cossentino 2, Luca Sabatucci 1, and Valeria Seidita 1 1 Dipartimento di Ingegneria Informatica (DINFO) University of Palermo Viale
More informationGOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS
GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS 1 A. SOUJANYA, 2 SIDDHARTHA GHOSH 1 M.Tech Student, Department of CSE, Keshav Memorial Institute of Technology(KMIT), Narayanaguda, Himayathnagar,
More informationNegotiation Process Modelling in Virtual Environment for Enterprise Management
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2006 Proceedings Americas Conference on Information Systems (AMCIS) December 2006 Negotiation Process Modelling in Virtual Environment
More informationREAL-TIME SYSTEMS SAFETY CONTROL CONSIDERING HUMAN MACHINE INTERFACE
REAL-TIME SYSTEMS SAFETY CONTROL CONSIDERING HUMAN MACHINE INTERFACE José Machado and Eurico Seabra Mechanical Engineering Department, University of Minho, Campus of Azurém, 4800-058 Guimarães, Portugal
More informationExtending Telecom Service Design Activities for Early Verification
Extending Telecom Service Design Activities for Early Verification Iyas Alloush 1,2 Supervisor of the thesis: A/Prof.Siegfried Rouvrais 1,3 Director of the thesis: Prof. Yvon Kermarrec 1,2 1: Telecom Bretagne,
More informationA CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS DESIGN
Proceedings of the Annual Symposium of the Institute of Solid Mechanics and Session of the Commission of Acoustics, SISOM 2015 Bucharest 21-22 May A CYBER PHYSICAL SYSTEMS APPROACH FOR ROBOTIC SYSTEMS
More informationACTIVE, A PLATFORM FOR BUILDING INTELLIGENT OPERATING ROOMS
ACTIVE, A PLATFORM FOR BUILDING INTELLIGENT OPERATING ROOMS D. GUZZONI 1, C. BAUR 1, A. CHEYER 2 1 VRAI Group EPFL 1015 Lausanne Switzerland 2 AIC SRI International Menlo Park, CA USA Today computers are
More informationAdopting Standards For a Changing Health Environment
Adopting Standards For a Changing Health Environment November 16, 2018 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7, FIAHSI Director, Duke Center for Health Informatics Director, Applied Informatics
More informationDefining Process Performance Indicators by Using Templates and Patterns
Defining Process Performance Indicators by Using Templates and Patterns Adela del Río Ortega, Manuel Resinas, Amador Durán, and Antonio Ruiz Cortés Universidad de Sevilla, Spain {adeladelrio,resinas,amador,aruiz}@us.es
More informationA Conceptual Modeling Method to Use Agents in Systems Analysis
A Conceptual Modeling Method to Use Agents in Systems Analysis Kafui Monu 1 1 University of British Columbia, Sauder School of Business, 2053 Main Mall, Vancouver BC, Canada {Kafui Monu kafui.monu@sauder.ubc.ca}
More informationMeta-models, Environment and Layers: Agent-Oriented Engineering of Complex Systems
Meta-models, Environment and Layers: Agent-Oriented Engineering of Complex Systems Ambra Molesini ambra.molesini@unibo.it DEIS Alma Mater Studiorum Università di Bologna Bologna, 07/04/2008 Ambra Molesini
More informationSENG609.22: Agent-Based Software Engineering Assignment. Agent-Oriented Engineering Survey
SENG609.22: Agent-Based Software Engineering Assignment Agent-Oriented Engineering Survey By: Allen Chi Date:20 th December 2002 Course Instructor: Dr. Behrouz H. Far 1 0. Abstract Agent-Oriented Software
More informationCommunication: A Specific High-level View and Modeling Approach
Communication: A Specific High-level View and Modeling Approach Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at
More informationWhat s RRI / WG1? - toward horizontal dynamic manufacturing -
What s RRI / WG1? - toward horizontal dynamic manufacturing - 22 th, Mar. 2017 Robot Revolution Initiative (RRI) Deputy Secretary-general (Industrial IoT Specialist) Yutaka Manchu 2017 Copyright Robot
More informationPhD Student: Antonio Ken Iannillo
PhD in Information Technology and Electrical Engineering PhD Student: XXX Cycle Training and Research Activities Report First Year Tutor: Domenico Cotroneo 1. Information This report is on the training
More informationExploring Computing Environment Possibilities for Risk Oriented Testing
ISSN: 0974-6471, Vol. 10, No. (3) 2017, Pg. 674-682 Oriental Journal of Computer Science and Technology Journal Website: www.computerscijournal.org Exploring Computing Environment Possibilities for Risk
More informationSoftware Agent Reusability Mechanism at Application Level
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
More informationCatholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands
INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce
More informationOntology-based Context Aware for Ubiquitous Home Care for Elderly People
Ontology-based Aware for Ubiquitous Home Care for Elderly People Kurnianingsih 1, 2, Lukito Edi Nugroho 1, Widyawan 1, Lutfan Lazuardi 3, Khamla Non-alinsavath 1 1 Dept. of Electrical Engineering and Information
More informationAOSE Technical Forum Group
AOSE Technical Forum Group AL3-TF1 Report 30 June- 2 July 2004, Rome 1 Introduction The AOSE TFG activity in Rome was divided in two different sessions, both of them scheduled for Friday, (2nd July): the
More informationFORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS
FORMAL MODELING AND VERIFICATION OF MULTI-AGENTS SYSTEM USING WELL- FORMED NETS Meriem Taibi 1 and Malika Ioualalen 1 1 LSI - USTHB - BP 32, El-Alia, Bab-Ezzouar, 16111 - Alger, Algerie taibi,ioualalen@lsi-usthb.dz
More informationHuman-Computer Interaction based on Discourse Modeling
Human-Computer Interaction based on Discourse Modeling Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at
More informationDevelopment of an Intelligent Agent based Manufacturing System
Development of an Intelligent Agent based Manufacturing System Hong-Seok Park 1 and Ngoc-Hien Tran 2 1 School of Mechanical and Automotive Engineering, University of Ulsan, Ulsan 680-749, South Korea 2
More informationKeeping up with the times Tensions between workflow, status quo, and technology
Keeping up with the times Tensions between workflow, status quo, and technology OMG Healthcare and Business Process Modeling Workshop 20 March, 2017 W. Ed Hammond. Ph.D., FACMI, FAIMBE, FIMIA, FHL7 Director,
More informationMSc(CompSc) List of courses offered in
Office of the MSc Programme in Computer Science Department of Computer Science The University of Hong Kong Pokfulam Road, Hong Kong. Tel: (+852) 3917 1828 Fax: (+852) 2547 4442 Email: msccs@cs.hku.hk (The
More information38050 Povo (Trento), Italy Tel.: Fax: e mail: url:
CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: 39 0461 314312 Fax: 39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it COORDINATION SPECIFICATION IN MULTI AGENT
More informationAGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS
AGENTS AND AGREEMENT TECHNOLOGIES: THE NEXT GENERATION OF DISTRIBUTED SYSTEMS Vicent J. Botti Navarro Grupo de Tecnología Informática- Inteligencia Artificial Departamento de Sistemas Informáticos y Computación
More informationSPQR RoboCup 2016 Standard Platform League Qualification Report
SPQR RoboCup 2016 Standard Platform League Qualification Report V. Suriani, F. Riccio, L. Iocchi, D. Nardi Dipartimento di Ingegneria Informatica, Automatica e Gestionale Antonio Ruberti Sapienza Università
More informationMulti-Agent Planning
25 PRICAI 2000 Workshop on Teams with Adjustable Autonomy PRICAI 2000 Workshop on Teams with Adjustable Autonomy Position Paper Designing an architecture for adjustably autonomous robot teams David Kortenkamp
More informationJournal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS
List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE
More informationIncreasing Reliability in the Development of Intelligent Environments
Increasing Reliability in the Development of Intelligent Environments Juan Carlos AUGUSTO a;1 a University of Ulster and Computer Science Research Institute, UK Abstract. Little is reported in the literature
More informationA Model-Driven Approach to Systems-of-Systems Engineering
A Model-Driven Approach to Systems-of-Systems Engineering The Australian National University September 2008 Outline 1 An application domain 2 Advantages of MDE Limitations of MDE 3 One sentence An application
More informationAutomatic Generation of Web Interfaces from Discourse Models
Automatic Generation of Web Interfaces from Discourse Models Institut für Computertechnik ICT Institute of Computer Technology Hermann Kaindl Vienna University of Technology, ICT Austria kaindl@ict.tuwien.ac.at
More informationVerification and Validation for Safety in Robots Kerstin Eder
Verification and Validation for Safety in Robots Kerstin Eder Design Automation and Verification Trustworthy Systems Laboratory Verification and Validation for Safety in Robots, Bristol Robotics Laboratory
More informationIntelligent Agents. Introduction to Planning. Ute Schmid. Cognitive Systems, Applied Computer Science, Bamberg University. last change: 23.
Intelligent Agents Introduction to Planning Ute Schmid Cognitive Systems, Applied Computer Science, Bamberg University last change: 23. April 2012 U. Schmid (CogSys) Intelligent Agents last change: 23.
More informationImproved Model Generation of AMS Circuits for Formal Verification
Improved Generation of AMS Circuits for Formal Verification Dhanashree Kulkarni, Satish Batchu, Chris Myers University of Utah Abstract Recently, formal verification has had success in rigorously checking
More informationDetecticon: A Prototype Inquiry Dialog System
Detecticon: A Prototype Inquiry Dialog System Takuya Hiraoka and Shota Motoura and Kunihiko Sadamasa Abstract A prototype inquiry dialog system, dubbed Detecticon, demonstrates its ability to handle inquiry
More informationKnowledge Management for Command and Control
Knowledge Management for Command and Control Dr. Marion G. Ceruti, Dwight R. Wilcox and Brenda J. Powers Space and Naval Warfare Systems Center, San Diego, CA 9 th International Command and Control Research
More informationCARMA: Complete Autonomous Responsible Management Agent (System)
University of Technology, Sydney Faculty of Engineering and Information Technology CARMA: Complete Autonomous Responsible Management Agent (System) Submitted by: Haydn Mearns BE (Soft.) 2012 Principal
More informationA Logic for Social Influence through Communication
A Logic for Social Influence through Communication Zoé Christoff Institute for Logic, Language and Computation, University of Amsterdam zoe.christoff@gmail.com Abstract. We propose a two dimensional social
More informationA Conceptual Modeling Method to Use Agents in Systems Analysis
A Conceptual Modeling Method to Use Agents in Systems Analysis Kafui Monu University of British Columbia, Sauder School of Business, 2053 Main Mall, Vancouver BC, Canada {Kafui Monu kafui.monu@sauder.ubc.ca}
More informationExtending Gaia with Agent Design and Iterative Development
Extending Gaia with Agent Design and Iterative Development Jorge Gonzalez-Palacios 1 and Michael Luck 2 1 University of Southampton jlgp02r@ecs.soton.ac.uk 2 King s College London michael.luck@kcl.ac.uk
More informationPrinciples of Compositional Multi-Agent System Development
Principles of Compositional Multi-Agent System Development Frances M.T. Brazier, Catholijn M. Jonker, Jan Treur 1 (in: Proc. of the IFIP 98 Conference IT&KNOWS 98, J. Cuena (ed.), Chapman and Hall, 1998)
More informationOntologies, Knowledge Representation, Artificial Intelligence Hype or Prerequisites for Interoperability?
1 Ontologies, Knowledge Representation, Artificial Intelligence Hype or Prerequisites for Interoperability? B. Blobel ehealth Competence Center, University Hospital Regensburg, Regensburg, Germany Abstract
More informationVisualizing Sensor Data: Towards an Experiment and Validation Platform
Visualizing Sensor Data: Towards an Experiment and Validation Platform Claudia C. Gutiérrez Rodriguez and Anne-Marie Déry-Pinna I3S CNRS - University of Nice - Sophia Antipolis 930 route des colles BP
More informationIssues and Challenges in Coupling Tropos with User-Centred Design
Issues and Challenges in Coupling Tropos with User-Centred Design L. Sabatucci, C. Leonardi, A. Susi, and M. Zancanaro Fondazione Bruno Kessler - IRST CIT sabatucci,cleonardi,susi,zancana@fbk.eu Abstract.
More informationTowards Verification of a Service Orchestration Language. Tan Tian Huat
Towards Verification of a Service Orchestration Language Tan Tian Huat 1 Outline Background of Orc Motivation of Verifying Orc Overview of Orc Language Verification using PAT Future Works 2 Outline Background
More informationMobile Tourist Guide Services with Software Agents
Mobile Tourist Guide Services with Software Agents Juan Pavón 1, Juan M. Corchado 2, Jorge J. Gómez-Sanz 1 and Luis F. Castillo Ossa 2 1 Dep. Sistemas Informáticos y Programación Universidad Complutense
More informationGlobal Journal on Technology
Global Journal on Technology Vol 5 (2014) 73-77 Selected Paper of 4 th World Conference on Information Technology (WCIT-2013) Issues in Internet of Things for Wellness Human-care System Jae Sung Choi*,
More informationPrivacy, Technology and Economics in the 5G Environment
Privacy, Technology and Economics in the 5G Environment S A M A N T K H A J U R I A A S S I S T P R O F E S S O R, C M I K N U D E R I K S K O U B Y P R O F E S S O R, D I R E C T O R C M I S K O U B Y
More informationSéminaire Supélec/SCEE
Séminaire Supélec/SCEE Models driven co-design methodology for SDR systems LECOMTE Stéphane Directeur de thèse PALICOT Jacques Co-directeur LERAY Pierre Encadrant industriel GUILLOUARD Samuel Outline Context
More informationIntroduction to adoption of lean canvas in software test architecture design
Introduction to adoption of lean canvas in software test architecture design Padmaraj Nidagundi 1, Margarita Lukjanska 2 1 Riga Technical University, Kaļķu iela 1, Riga, Latvia. 2 Politecnico di Milano,
More informationThe AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
AMADEOS Architecture for Multi-criticality Agile Dependable Evolutionary Open System-of-Systems FP7-ICT-2013.3.4 - Grant Agreement n 610535 The AMADEOS SysML Profile for Cyber-physical Systems-of-Systems
More informationRealising the Flanders Research Information Space
Realising the Flanders Research Information Space Peter Spyns & Geert Van Grootel published in Meersman R., Dillon T., Herrero P. et al., (Eds.): (eds.), Proceedings of the OTM 2011 Workshops, LNCS 7046,
More informationAgent Oriented Software Engineering
Agent Oriented Software Engineering Multiagent Systems LS Sistemi Multiagente LS Ambra Molesini ambra.molesini@unibo.it Alma Mater Studiorum Universitá di Bologna Academic Year 2006/2007 Ambra Molesini
More informationR3ST for Requirements Recovery of Legacy Runtime Code
R3ST for Requirements Recovery of Legacy Runtime Code Eko K. Budiardjo, Elviawaty M. Zamzami, and Wahyudianto, Member, IACSIT Abstract In reality, we often find that proven and workable software, exist
More informationThe HL7 RIM in the Design and Implementation of an Information System for Clinical Investigations on Medical Devices
The HL7 RIM in the Design and Implementation of an Information System for Clinical Investigations on Medical Devices Daniela Luzi, Mariangela Contenti, Fabrizio Pecoraro To cite this version: Daniela Luzi,
More informationModeling Supervisory Control of Autonomous Mobile Robots using Graph Theory, Automata and Z Notation
Modeling Supervisory Control of Autonomous Mobile Robots using Graph Theory, Automata and Z Notation Javed Iqbal 1, Sher Afzal Khan 2, Nazir Ahmad Zafar 3 and Farooq Ahmad 1 1 Faculty of Information Technology,
More informationAGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS. Nuno Sousa Eugénio Oliveira
AGENT PLATFORM FOR ROBOT CONTROL IN REAL-TIME DYNAMIC ENVIRONMENTS Nuno Sousa Eugénio Oliveira Faculdade de Egenharia da Universidade do Porto, Portugal Abstract: This paper describes a platform that enables
More informationDeveloping and Distributing a CubeSat Model-Based Systems Engineering (MBSE) Reference Model
Developing and Distributing a CubeSat Model-Based Systems Engineering (MBSE) Reference Model Dave Kaslow International Council on Systems Engineering (INCOSE) Space Systems Working Group (SSWG) INCOSE
More informationA Unified Model for Physical and Social Environments
A Unified Model for Physical and Social Environments José-Antonio Báez-Barranco, Tiberiu Stratulat, and Jacques Ferber LIRMM 161 rue Ada, 34392 Montpellier Cedex 5, France {baez,stratulat,ferber}@lirmm.fr
More informationIntroduction to Systems Engineering
p. 1/2 ENES 489P Hands-On Systems Engineering Projects Introduction to Systems Engineering Mark Austin E-mail: austin@isr.umd.edu Institute for Systems Research, University of Maryland, College Park Career
More informationMaster of Science in Computer Engineering, February Thesis: Process Based Matchmaking of Services
Akın Günay, Ph.D. Contact Information Education Address: School of Computing and Communications, Lancaster University Lancaster LA1 4WA, United Kingdom E-mail: a.gunay@lancaster.ac.uk Phone: +44 7746 184969
More informationAgent Oriented Software Engineering
Agent Oriented Software Engineering Ambra Molesini 1 Massimo Cossentino 2 1 Alma Mater Studiorum Università di Bologna (Italy) ambra.molesini@unibo.it 2 Italian National Research Council - ICAR Institute
More informationA FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING
A FRAMEWORK FOR PERFORMING V&V WITHIN REUSE-BASED SOFTWARE ENGINEERING Edward A. Addy eaddy@wvu.edu NASA/WVU Software Research Laboratory ABSTRACT Verification and validation (V&V) is performed during
More informationUsing Reactive Deliberation for Real-Time Control of Soccer-Playing Robots
Using Reactive Deliberation for Real-Time Control of Soccer-Playing Robots Yu Zhang and Alan K. Mackworth Department of Computer Science, University of British Columbia, Vancouver B.C. V6T 1Z4, Canada,
More informationTowards filling the gap between AOSE methodologies and infrastructures: requirements and meta-model
Towards filling the gap between AOSE methodologies and infrastructures: requirements and meta-model Fabiano Dalpiaz, Ambra Molesini, Mariachiara Puviani and Valeria Seidita Dipartimento di Ingegneria e
More informationSOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS
SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS Sami Syrjälä and Seppo Kuikka Institute of Automation and Control Department of Automation Tampere University of Technology Korkeakoulunkatu
More information15: Ethics in Machine Learning, plus Artificial General Intelligence and some old Science Fiction
15: Ethics in Machine Learning, plus Artificial General Intelligence and some old Science Fiction Machine Learning and Real-world Data Ann Copestake and Simone Teufel Computer Laboratory University of
More informationTowards the definition of a Science Base for Enterprise Interoperability: A European Perspective
Towards the definition of a Science Base for Enterprise Interoperability: A European Perspective Keith Popplewell Future Manufacturing Applied Research Centre, Coventry University Coventry, CV1 5FB, United
More informationDesign Science Research Methods. Prof. Dr. Roel Wieringa University of Twente, The Netherlands
Design Science Research Methods Prof. Dr. Roel Wieringa University of Twente, The Netherlands www.cs.utwente.nl/~roelw UFPE 26 sept 2016 R.J. Wieringa 1 Research methodology accross the disciplines Do
More informationSeparation of Concerns in Software Engineering Education
Separation of Concerns in Software Engineering Education Naji Habra Institut d Informatique University of Namur Rue Grandgagnage, 21 B-5000 Namur +32 81 72 4995 nha@info.fundp.ac.be ABSTRACT Separation
More informationIndustry 4.0: the new challenge for the Italian textile machinery industry
Industry 4.0: the new challenge for the Italian textile machinery industry Executive Summary June 2017 by Contacts: Economics & Press Office Ph: +39 02 4693611 email: economics-press@acimit.it ACIMIT has
More informationModel-Based Systems Engineering Methodologies. J. Bermejo Autonomous Systems Laboratory (ASLab)
Model-Based Systems Engineering Methodologies J. Bermejo Autonomous Systems Laboratory (ASLab) Contents Introduction Methodologies IBM Rational Telelogic Harmony SE (Harmony SE) IBM Rational Unified Process
More information