Academic literature on the topic 'Security Service integrated logistical support system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security Service integrated logistical support system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security Service integrated logistical support system"

1

Loginov, Il'ya Valentinovich, and Vladimir Gennad'evich Sosunov. "Formation of the approach towards development of lifecycle model for the integrated security systems." Вопросы безопасности, no. 4 (April 2021): 50–60. http://dx.doi.org/10.25136/2409-7543.2021.4.37121.

Full text
Abstract:
The subject of this research is the integrated security systems and the processes of their continuous improvement during the lifecycle. The goal lies in examination of the problem of systematization of lifecycle processes of the integrated security systems and formalization of their lifecycle model, taking into consideration the available practices of building security systems. The effectiveness of complex system support processes is first and foremost determined by the accurate identification of management goals and objectives, which requires an the lifecycle model adequate to the controlled object. Since the integrated security system has the characteristics of both, capital construction (engineering networks) and technical system (integration platform), the question of improvement of the lifecycle model is relevant. The main research results are as follows: substantiation of the problem of systematization of lifecycle models of the integrated security systems; analysis of the approaches towards their standardization, and substantiation of lifecycle model of the integrated security systems based on the system accounting of conducted operations. The novelty of the proposed model lies in the improvement of reference models of the integrated security systems by taking into account the entirety of reconfiguration and modernization operations. Description is given to the problem of systematization of lifecycle processes of the integrated security systems, which occurs due to the possibility of their classification as different groups of the complex systems. The offered lifecycle model of the integrated security systems through systematization of regulatory requirements is an attempt to acquire a non-contradictory list of measures in creation and operation of the integrated security systems. The results of this research can be used in practical activity of the employees of onsite security service in the context of development of the integrated security system. The implementation of the offered lifecycle model of the integrated security system in the processes of their development would allow systematizing the structure of processes, arranging the functions and activity of the departments on the continuous logistic support of the integrated security systems, and ensuring their consistent improvement.
APA, Harvard, Vancouver, ISO, and other styles
2

Denysenko, Mykola P. "MANAGEMENT TECHNOLOGIES FOR ENHANCING INTEGRATED PROCESSES IN THE CUSTOMS AND LOGISTICS SERVICES SECTOR." Bulletin of the Kyiv National University of Technologies and Design. Series: Economic sciences 147, no. 3 (December 29, 2020): 57–66. http://dx.doi.org/10.30857/2413-0117.2020.3.5.

Full text
Abstract:
The article discusses the issues of modern electronic technologies implementation in managing integrated processes in the customs and logistics services sector in Ukraine. It is argued that collection and processing of large amounts of information are hardly possible without the use of latest information technology advancements. It has been verified that to operate effectively, the "Electronic Customs" should involve close interaction between all its subsystems, such as electronic declaration; electronic document management; risk analysis and risk management; transit control delivery; single interdepartmental automated system for collecting, storing and processing information; implementation of fully automated government control; unified database of regulatory and reference documentation used for customs purposes; information support for audit and law enforcement activities. The research findings have revealed a number of benefits of using the electronic declaration pattern, in particular, it contributes to boosting trade, reducing the time period for customs control, eliminating of subjective factors while handling customs procedures through the use of online prior notification and preliminary electronic customs declaration in the frameworks of customs clearance of goods and customs documents and goods delivery. Ultimately, building a multifunctional integrated system of "Electronic Customs" is focused towards better facilitating and enhancing the customs units performances by speeding up customs control and customs clearance procedures, improving the public service quality in the area government customs regulation, mitigating the risk of any illegal actions and corruption along with ensuring and enhancing the customs services security in Ukraine, contributing to further development, adaptation and successful harmonization of information systems of the State Customs Service of Ukraine to the European Union standards and good practice.
APA, Harvard, Vancouver, ISO, and other styles
3

Golubetskaya, N. P., and A. V. Kurlov. "Infrastructure Support for the Innovative Transformation of Business Structures in the Digital Economy." Economics and Management 26, no. 11 (January 16, 2021): 1210–16. http://dx.doi.org/10.35854/1998-1627-2020-11-1210-1216.

Full text
Abstract:
Aim. The presented study aims to develop conceptual approaches to the formation of infrastructure for the innovative transformation of entrepreneurship in the digital economy, which would make it possible to optimize the management system of regional economic entities aimed at creating a favorable climate for the generation, development, and implementation of innovations in the Russian socioeconomic system.Tasks. The authors analyze conceptual approaches to the formation of a system of infrastructural support for the innovative transformation of business structures based on a comprehensive analysis of the parameters of its subsystems; substantiate priority directions for the development of regional infrastructure with a view to ensuring sustainable operation of economic entities; propose scenarios for the formation of regional infrastructure based on digital technologies for the transformation of innovation activities of companies.Methods. This study is based on the classical corporate life cycle theory, which includes mechanisms and organizational structures that facilitate the sustainable development of business structures in the digital economy. Theoretical and practical recommendations for innovation management and system analysis of the formation of competitive advantages of regional economic entities are used with allowance for current trends in the world economy and geopolitical risks.Results. Infrastructure support for the innovative transformation of business structures in the digital economy should allow for the reloading of the logistical, technological, financial, economic, informational, personnel, and communication units of the company’s integrated functioning system. Digital technologies transform system-wide, strategic, marketing, information, and communication methods of development and implementation of management decisions within regional socio-economic systems.Conclusions. Infrastructure support for the innovative transformation of business structures largely depends on the use of digital methods that allow for the implementation of information and communication platforms making it possible to optimize the organizational management structures of companies. The effectiveness of innovative transformation can be increased by accelerating and simplifying business processes; increasing the level of transparency and reliability of procedures performed on the web and implemented in business applications; structural transformations of forms of interaction with customers based on modern interfaces and access to complete information about consumer preferences; ensuring the availability of services provided on a cloud platform; achieving a high level of security of the knowledge base. Digital technologies have made the effectiveness of company management more dependent on the parameters of economic security and indicators of the quality of the information and communication infrastructure used at all stages of the functioning of the regional socio-economic system. Business communications in the global market of goods and services are accelerating and simplifying.
APA, Harvard, Vancouver, ISO, and other styles
4

Jiang, Nan, Erlin Tian, Fattaneh Daneshmand Malayeri, and Alireza Balali. "A new model for investigating the impact of urban knowledge, urban intelligent transportation systems and IT infrastructures on the success of SCM systems in the distributed organizations." Kybernetes 49, no. 11 (January 2, 2020): 2799–818. http://dx.doi.org/10.1108/k-04-2019-0288.

Full text
Abstract:
Purpose A fundamental concept of the smart city is to get the right information at the right place to make city-related decisions easier and quicker. The main goal of supply chain management (SCM) systems is to enhance the supply chain process for delivering the identified products to customers correctly in distributed organizations. In addition, new IT infrastructure such as cloud-based systems and internet of things (IoT) have changed many organizations and firms. Hence, this study aims to assess the factors that contribute to the success of SCM systems. Design/methodology/approach In this paper, the usage of urban knowledge, urban intelligent transportation systems and IT infrastructure was considered as a key factor for the success of SCM systems. For assessing the features of the model, a comprehensive questionnaire was designed. The survey questionnaires were sent to critical informers who are practical heads associated with SCM and urbanism. Of these, 315 usable responses were received, resulting in a response rate of 82.03%. The data were examined using Smart-PLS version 3.2 and IBM SPSS version 25. Findings The obtained results showed the high strength of the proposed model. This study found that the impact of urban ITS (safety, accessibility, information management and flexibility) is important to the success of supply chain management systems. Another important finding is that the cloud-based system (cloud security, resource virtualization, on-demand self-service and scalability) has a very important role in the success of supply chain management systems. The finding showed that the effect of IoT service variable (commercialization, mobility features, infrastructure capabilities and security and privacy) on the success of supply chain management systems is significant and positive. The findings also showed that urban knowledge (usage skills, awareness, experience and knowledge sharing) is viewed as a significant factor in the success of supply chain management systems. Research limitations/implications The inductive nature of research methodology has introduced limitations on the generalizability of results. Therefore, it is recommended to examine the validity of this research model in other supply chains. Practical implications The statistical results support the crucial role of urban knowledge, urban intelligent transportation systems, IoT services and cloud-based systems. Therefore, aspects relating to these factors must be the focus of attention of any distributed organization in their endeavor to develop supply chain management systems. Implementing cloud based IoT through accurate and timely availability of information, can predict forecasting and planning processes, resources, logistics and support, service management and spare parts and many sub-processes in the supply chain. These technologies allow organizations to invest in manufacturing and operating processes rather than paying for the software section, which will generate more cash flow. Originality/value One of the most crucial and fundamental parts of an organization’s management is the supply chain management. The department is responsible for coordinating all units from the initial stages, such as supplying materials to the final stages, such as delivery and after-sales service. Comprehensive and credible information platforms are essential for managing a supply chain. Therefore, it is important to use integrated information systems such as IoT, cloud computing, intelligent transportation systems and more in this part of the organization management. Covering this information in a timely and accurate manner will facilitate the process and make the process more transparent. For this purpose, a model is needed to determine the relationship between technologies and supply chain management, which this study has provided a comprehensive model.
APA, Harvard, Vancouver, ISO, and other styles
5

MASHKANTSEVA, Svetlana. "TRANSPORT AND LOGISTICS SYSTEM OF THE REGION: THE STATE AND FUNCTIONS OF FUNCTIONING." Ukrainian Journal of Applied Economics 4, no. 3 (August 30, 2019): 324–29. http://dx.doi.org/10.36887/2415-8453-2019-3-36.

Full text
Abstract:
Introduction. The article considers the state and prospects of development of transport and logistics systems in the region, which will help to accelerate cargo delivery, increase the competitiveness of transportation, improve the investment climate of the transport industry in the region, as well as expand the activities of companies providing comprehensive logistics services. The purpose of this article is a study of experience of using mechanisms of state regulation of development of regional structural transformations in agribusiness. Results. The basic principles of functioning of the transport and logistics system of the region, which integrate the transport industry into the transport and logistics systems of the country by ensuring their effective interaction, are highlighted; satisfy the needs of consumers of transport and logistics services by harmonizing their interests with the interests of all participants in the logistics process. The functions of the transport and logistics system that influence the efficiency of its activity at the regional level are revealed. Conclusions. The functioning of an advanced transport and logistics system, provided with adequate transport infrastructure in all regions of the country, will contribute to the development of many sectors of the economy and will serve as the basis for economic development of the country. In order to effectively develop the transport and logistics system of the regions, it is advisable to intensify the following areas: state regulation of logistics processes, including their legal support; creation and operation of transport infrastructure by type of activity; stimulating the development of logistics projects by region. The formation of high-quality transport and logistics systems in the region provides a full range of transport services, including multimodal transportation, the development of logistics schemes for freight, insurance, transportation security. Development of transport and logistics systems in the region can be ensured by updating the logistics base of transport; increased informatization; quality improvement and development of transport and logistics infrastructure of the region; expansion of the internal market of transport and logistics services; improving the efficiency of transportation; improvement of customs tariff and investment policy; the interaction of all participants in the supply chain; development and implementation of joint programs for the development of transport and logistics systems in the region. Key words: transport and logistics system; transport industry; region; logistic approach; transport; integration.
APA, Harvard, Vancouver, ISO, and other styles
6

Fadeev, Aleksey. "Production Support in the Arctic: a Strategic Approach." Strategizing: Theory and Practice 2021, no. 1 (June 25, 2021): 15–27. http://dx.doi.org/10.21603/2782-2435-2021-1-1-15-27.

Full text
Abstract:
The Arctic reserves of hydrocarbons play an important geostrategic and economic role for many states, whose energy security will rely on this region in the nearest decades. The development of hydrocarbon deposits in extreme conditions requires unique scientific and industrial solutions, as well as new sourcing strategies for attracting vehicles that can operate at low temperatures. Mineral production in the Polar regions is a complex technological, transport, and logistical task. As a result, each industrial production project needs a highly efficient and complex system of supporting projects, which involve naval aviation, marine fleet, integrated support bases, etc. In addition to solving technical problems, this production support system should comply with the highest standards of environmental and industrial safety, generating no adverse impact on the sensitive ecosystem of the Russian Arctic and adjacent marine territories.
APA, Harvard, Vancouver, ISO, and other styles
7

Badawy, Sherif M., and Ana Radovic. "Digital Approaches to Remote Pediatric Health Care Delivery During the COVID-19 Pandemic: Existing Evidence and a Call for Further Research." JMIR Pediatrics and Parenting 3, no. 1 (June 25, 2020): e20049. http://dx.doi.org/10.2196/20049.

Full text
Abstract:
The global spread of the coronavirus disease (COVID-19) outbreak poses a public health threat and has affected people worldwide in various unprecedented ways, both personally and professionally. There is no question that the current global COVID-19 crisis, now more than ever, is underscoring the importance of leveraging digital approaches to optimize pediatric health care delivery in the era of this pandemic. In this perspective piece, we highlight some of the available digital approaches that have been and can continue to be used to streamline remote pediatric patient care in the era of the COVID-19 pandemic, including but not limited to telemedicine. JMIR Pediatrics and Parenting is currently publishing a COVID-19 special theme issue in which investigators can share their interim and final research data related to digital approaches to remote pediatric health care delivery in different settings. The COVID-19 pandemic has rapidly transformed health care systems worldwide, with significant variations and innovations in adaptation. There has been rapid expansion of the leveraging and optimization of digital approaches to health care delivery, particularly integrated telemedicine and virtual health. Digital approaches have played and will play major roles as invaluable and reliable resources to overcome restrictions and challenges imposed during the COVID-19 pandemic and to increase access to effective, accessible, and consumer-friendly care for more patients and families. However, a number of challenges remain to be addressed, and further research is needed. Optimizing digital approaches to health care delivery and integrating them into the public health response will be an ongoing process during the current COVID-19 outbreak and during other possible future pandemics. Regulatory changes are essential to support the safe and wide adoption of these approaches. Involving all relevant stakeholders in addressing current and future challenges as well as logistical, technological, and financial barriers will be key for success. Future studies should consider evaluating the following research areas related to telemedicine and other digital approaches: cost-effectiveness and return on investment; impact on quality of care; balance in use and number of visits needed for the management of both acute illness and chronic health conditions; system readiness for further adoption in other settings, such as inpatient services, subspecialist consultations, and rural areas; ongoing user-centered evaluations, with feedback from patients, families, and health care providers; strategies to optimize health equity and address disparities in access to care related to race and ethnicity, socioeconomic status, immigration status, and rural communities; privacy and security concerns for protected health information with Health Insurance Portability and Accountability Act (HIPAA)–secured programs; confidentiality issues for some specific populations, especially adolescents and those in need of mental health services; early detection of exposure to violence and child neglect; and integration of training into undergraduate and graduate medical education and subspecialty fellowships. Addressing these research areas is essential to understanding the benefits, sustainability, safety, and optimization strategies of telemedicine and other digital approaches as key parts of modern health care delivery. These efforts will inform long-term adoption of these approaches with expanded dissemination and implementation efforts.
APA, Harvard, Vancouver, ISO, and other styles
8

Xiao, Liang, Srinandan Dasmahapatra, Paul Lewis, Bo Hu, Andrew Peet, Alex Gibb, David Dupplaw, et al. "The design and implementation of a novel security model for HealthAgents." Knowledge Engineering Review 26, no. 3 (July 28, 2011): 261–82. http://dx.doi.org/10.1017/s0269888911000117.

Full text
Abstract:
AbstractIn this paper, we analyze the special security requirements for software support in health care and the HealthAgents system in particular. Our security solution consists of a link-anonymized data scheme, a secure data transportation service, a secure data sharing and collection service, and a more advanced access control mechanism. The novel security service architecture, as part of the integrated system architecture, provides a secure health-care infrastructure for HealthAgents and can be easily adapted for other health-care applications.
APA, Harvard, Vancouver, ISO, and other styles
9

Et al., Artem Bratko. "Some Aspects of Capability-based Planning in the Field of National Security." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 6 (April 5, 2021): 2219–25. http://dx.doi.org/10.17762/turcomat.v12i6.4827.

Full text
Abstract:
The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the state of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security.
APA, Harvard, Vancouver, ISO, and other styles
10

Bratko, Artem, Dmytro Oleshko, Anton Datskov, Valerii Vychavka, Oleksandr Olytskyi, and Ihor Balytskyi. "Use of the SWOT Analysis in the Field of National Security Planning." Emerging Science Journal 5, no. 3 (June 1, 2021): 330–37. http://dx.doi.org/10.28991/esj-2021-01280.

Full text
Abstract:
The authors propose to improve the methodology of operational and service activities planning based on the methodology of defense planning within the national security system on the basis of opportunities. The capability-based planning will allow for better planning of operational and service activities of the border agency and will ensure active cooperation between Ukraine and NATO in order to achieve the criteria necessary for full membership in the Alliance. A defense survey is conducted to assess the state and readiness of the defense forces to perform tasks related to the defense of Ukraine, the state of their personnel, financial, logistical and other types of support in the current and projected conditions of the security environment. The survey of the State Border Guard Service of Ukraine was conducted using an analytical method, namely the analysis of strengths and weaknesses, opportunities and threats (SWOT-analysis), which allows substantiating the main directions of the Development Strategy of the State Border Guard Service of Ukraine and increasing the level of operational and service activities planning within the system of national security. The State Border Guard Service of Ukraine is a component of the security and defense sector and the new conditions the border agency operates in arise the issue on improving the methodology of planning its operational and service activities. Doi: 10.28991/esj-2021-01280 Full Text: PDF
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security Service integrated logistical support system"

1

Sysoiev, Volodymyr Viktorovych. "Determination of a rational structure of the security service integrated logistical support system based on regional logistics clusters." Thesis, Institute of Technology and Business in Ceske Budejovice, 2013. http://repository.kpi.kharkov.ua/handle/KhPI-Press/45905.

Full text
Abstract:
Development of an integrated logistical support system for all types of national security services requires the solution to a problem of definition its rational structure. The methodical approach proposes to consider this issue as a complex of two successive optimization tasks. In the first place, it assumes to determine regional logistics clusters amount and then to optimize their logistics infrastructure. The models and methods are developed to allow optimization of the integrated logistical support system structure according to a real transport network communications and a regional supply chain by a minimal total logistics costs criterion.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security Service integrated logistical support system"

1

Zhao, Fang. "Technological Challenges in E-Collboration and E-Business." In Electronic Business, 701–8. IGI Global, 2009. http://dx.doi.org/10.4018/978-1-60566-056-1.ch043.

Full text
Abstract:
E-collaboration takes advantage of the current Internet-driven business environment, which integrates the most advanced electronic technologies and the knowledge-based economy. Companies engaging in e-collaboration must participate in external business relationships by using computer interactions (Damanpour, 2001). Implementing e-collaboration strategy can require many sophisticated technologies and systems such as EDI, XML, eCRM. E-collaboration is thus confronted with the great challenge of reengineering IT strategies and resources. “Nearly 80% of organizations that have rushed to establish Web sites for online retailing have failed to invest in the purchasing and distribution systems that make delivery of their products possible” (Neef, 2001, p.3). System failure has a profound effect on e-collaboration and e-business, both in the short and long-term. The tremendous complexity of information technologies has become a huge hurdle to companies embracing them, affecting their entire management strategy, process, structure, and most importantly, business bottom line results. The main technological issues to be considered are associated with IT infrastructure, and managers’ and operatives’ knowledge and skills in e-collaboration and e-partnership. The following constitutes some of the key technological issues facing e-collaboration. • Process and system alignment and integration • Interoperability of systems • Accessibility, security and compatibility of interorganizational information systems • Traffic in collaborative e-commerce activities • Sustained IT support and resources • Transferring and sharing information and data • Building and sustaining an effective virtual network structure amongst e-partners • Quality and effectiveness of networking and communications (Zhao, 2004) This article focuses on the most important technological challenges and issues facing e-collaboration and e-business in the areas of information flow, procurement, logistics, engineering and manufacturing, marketing, customer services, and human resources. It deals specifically with the process and system alignment and integration as well as the issues of interoperability which have become of primary concerns in the practices of e-collaboration.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense, 52–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.

Full text
Abstract:
Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service
APA, Harvard, Vancouver, ISO, and other styles
3

Riemann, Ute. "Benefits and Challenges for BPM in the Cloud." In Cloud Security, 1844–68. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8176-5.ch091.

Full text
Abstract:
Business processes are not only variable, they are dynamic as well. A key benefit of BPM is the ability to adjust processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape that allows the flexible provision and usage-based invoicing of resources, services, and applications via a network or the Internet. The generic term “X-as-a-Service” summarized the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, Microsoft delivered an application platform with managed cloud infrastructure services however more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. In order to be classified as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, it should be hosted off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential, questions that need to be answered are as follows: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as safeguards with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.
APA, Harvard, Vancouver, ISO, and other styles
4

Bode, Stephan, and Matthias Riebisch. "Tracing the Implementation of Non-Functional Requirements." In Non-Functional Properties in Service Oriented Architecture, 1–23. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-60566-794-2.ch001.

Full text
Abstract:
A software architecture has to enable the non-functional properties, such as flexibility, scalability, or security, because they constitute the decisive factors for its design. Unfortunately, the methodical support for the implementation of non-functional requirements into software architectures is still weak; solutions are not generally established. Recently, there are only few approaches that actually deal with non-functional requirements during design; even fewer take advantage of traceability, which supports a mapping of requirements to solutions through the development process. Therefore, in this chapter the new architectural design method TraGoSoMa is presented, which supports these issues. The method uses a so-called Goal Solution Scheme, which guides the design activities, supports conflict resolution, decision-making, and the classification of solutions. For illustration purposes the chapter uses a case study from a reengineering project for a Manufacturing Execution System (MES) that is restructured according to the SOA principles and integrated with an Enterprise Resource Planning (ERP) system.
APA, Harvard, Vancouver, ISO, and other styles
5

Riemann, Ute. "Benefits and Challenges for BPM in the Cloud." In Web Services, 1681–705. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7501-6.ch087.

Full text
Abstract:
Business processes are not only variable, they are dynamic as well. A key benefit of BPM is the ability to adjust processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape that allows the flexible provision and usage-based invoicing of resources, services, and applications via a network or the Internet. The generic term “X-as-a-Service” summarized the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, Microsoft delivered an application platform with managed cloud infrastructure services however more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. In order to be classified as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, it should be hosted off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential, questions that need to be answered are as follows: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as safeguards with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.
APA, Harvard, Vancouver, ISO, and other styles
6

Riemann, Ute. "Benefits and Challenges for Business Process Management in the Cloud." In Web-Based Services, 2096–121. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch092.

Full text
Abstract:
Business processes are not only variable they are as well dynamic. A key benefit of Business Process Management (BPM) is the ability to adjust business processes accordingly in response to changing market requirements. In parallel to BPM, enterprise cloud computing technology has emerged to provide a more cost effective solution to businesses and services while making use of inexpensive computing solutions, which combines pervasive, internet, and virtualization technologies (). Despite the slow start, the business benefits of cloud computing are as such that the transition of BPM to the cloud is now underway. Cloud services refer to the operation of a virtualized, automated, and service-oriented IT landscape allowing the flexible provision and usage-based invoicing of resources, services, and applications via a network or the internet. The generic term “X-as-a-Service” summarize the business models delivering almost everything as a service. BPM in the cloud is often regarded as a SaaS application. More recently, BPM is being regarded as a PaaS as it facilitates the creation and deployment of applications, in this case business process solutions. The PaaS landscape is the least developed of the four cloud based software delivery models previously discussed. PaaS vendors, such as IBM, Oracle, and Microsoft delivered an application platform with managed cloud infrastructure services however, more recently the PaaS market has begun to evolve to include other middleware capabilities including process management. BPM PaaS is the delivery of BPM technology as a service via a cloud service provider. For the classification as a PaaS a BPM suite requires the following capabilities: the architecture should be multi-tenant, hosting should be off premise and it should offer elasticity and metering by use capabilities. When we refer to BPM in the cloud, what we are really referring to is a combination of BPM PaaS and BPaaS (Business Process as a Service). Business Process as a Service (BPaaS) is a set of pre-defined business processes that allows the execution of customized business processes in the cloud. BPaaS is a complete pre-integrated BPM platform hosted in the cloud and delivered as a service, for the development and execution of general-purpose business process application. Although such a service harbors an economic potential there are remaining questions: Can an individual and company-specific business process supported by a standardized cloud solution, or should we protect process creativity and competitive differentiation by allowing the company to design the processes individually and solely support basic data flows and structures? Does it make sense to take a software solution “out of the box” that handles both data and process in a cloud environment, or would this hinder the creativity of business (process) development leading to a lower quality of processes and consequently to a decrease in the competitive positioning of a company? How to manage the inherent compliance and security topic. Within a completely integrated business application system, all required security aspects can be implemented as a safeguarding with just enough money. Within the cloud, however, advanced standards and identity prove is required to monitor and measure information exchange across the federation. Thereby there seems to be no need for developing new protocols, but a standardized way to collect and evaluate the collected information.
APA, Harvard, Vancouver, ISO, and other styles
7

Ammari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Securing the Internet of Things, 800–913. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch039.

Full text
Abstract:
The eXtensible Markup Language (XML) has been widely adopted in many financial institutions in their daily transactions. This adoption was due to the flexible nature of XML providing a common syntax for systems messaging in general and in financial messaging in specific. Excessive use of XML in financial transactions messaging created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages in an efficient yet powerful mechanism. However, financial institutions (i.e. banks) perform large volume of transactions on daily basis which require securing XML messages on large scale. Securing large volume of messages will result performance and resource issues. Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts. In this research we have developed a smart approach for securing financial XML transactions using effective and intelligent fuzzy classification techniques. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named “Importance Level”. Assigned value indicates the data sensitivity for each XML tag. The research also defines the process of securing classified financial XML message content by performing element-wise XML encryption on selected parts defined in fuzzy classification phase. Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes. Key size of 128-bit is being used on tags classified with “Medium” importance level; a key size of 256-bit is being used on tags classified with “High” importance level. An implementation has been performed on a real-life environment using online banking system in Jordan Ahli Bank one of the leading banks in Jordan to demonstrate its flexibility, feasibility, and efficiency. Our experimental results of the system verified tangible enhancements in encryption efficiency, processing-time reduction, and resulting XML message sizes. Finally, our proposed system was designed, developed, and evaluated using a live data extracted from an internet banking service in one of the leading banks in Jordan. The results obtained from our experiments are promising, showing that our model can provide an effective yet resilient support for financial systems to secure exchanged financial XML messages.
APA, Harvard, Vancouver, ISO, and other styles
8

Ammari, Faisal Tawfiq, and Joan Lu. "Securing Financial XML Transactions Using Intelligent Fuzzy Classification Techniques." In Ontologies and Big Data Considerations for Effective Intelligence, 214–326. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-2058-0.ch007.

Full text
Abstract:
The eXtensible Markup Language (XML) has been widely adopted in many financial institutions in their daily transactions. This adoption was due to the flexible nature of XML providing a common syntax for systems messaging in general and in financial messaging in specific. Excessive use of XML in financial transactions messaging created an aligned interest in security protocols integrated into XML solutions in order to protect exchanged XML messages in an efficient yet powerful mechanism. However, financial institutions (i.e. banks) perform large volume of transactions on daily basis which require securing XML messages on large scale. Securing large volume of messages will result performance and resource issues. Therefore, an approach is needed to secure specified portions of an XML document, syntax and processing rules for representing secured parts. In this research we have developed a smart approach for securing financial XML transactions using effective and intelligent fuzzy classification techniques. Our approach defines the process of classifying XML content using a set of fuzzy variables. Upon fuzzy classification phase, a unique value is assigned to a defined attribute named “Importance Level”. Assigned value indicates the data sensitivity for each XML tag. The research also defines the process of securing classified financial XML message content by performing element-wise XML encryption on selected parts defined in fuzzy classification phase. Element-wise encryption is performed using symmetric encryption using AES algorithm with different key sizes. Key size of 128-bit is being used on tags classified with “Medium” importance level; a key size of 256-bit is being used on tags classified with “High” importance level. An implementation has been performed on a real-life environment using online banking system in Jordan Ahli Bank one of the leading banks in Jordan to demonstrate its flexibility, feasibility, and efficiency. Our experimental results of the system verified tangible enhancements in encryption efficiency, processing-time reduction, and resulting XML message sizes. Finally, our proposed system was designed, developed, and evaluated using a live data extracted from an internet banking service in one of the leading banks in Jordan. The results obtained from our experiments are promising, showing that our model can provide an effective yet resilient support for financial systems to secure exchanged financial XML messages.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security Service integrated logistical support system"

1

Sun, Lijian, Steven Lei, Hsuan-Tsung Hsieh, Yitung Chen, and Darrell W. Pepper. "An Integrated, Near Real-Time, Web-Based Data Acquisition and Management System for Air Quality Prediction for Las Vegas Valley, Nevada." In ASME 2003 International Mechanical Engineering Congress and Exposition. ASMEDC, 2003. http://dx.doi.org/10.1115/imece2003-42041.

Full text
Abstract:
Clark County, Nevada has been criticized by US Environmental Protection Agency (US EPA) for its un-attainment air quality problem for particulate matters (PM 10 and PM 2.5) and ozone (O3) and carbon monoxide (CO). The Department of Air Quality Management (DAQM), Clark County, the regulatory and enforcement agency, is required by the US EPA to measure and report to the public the impact of aeroallergens as well as visibility and haze issues. From the long-term observation, air quality in the Las Vegas Valley is also influenced by those pollution from the neighboring states, currently around 30 monitoring stations through out the county have been in service for years to continuously monitor meteorological condition and provide valuable air quality information to the public in a timely fashion. Since the existing monitoring system was not designed to collect and process large amount of data set at a short time period, the agency cannot flexibly acquire higher resolution data sets as well as any non-scheduled data collection. Meanwhile, the much-needed data presentation and reporting features were not considered for the past. To ensure that Clark County will reach and maintain attainment of all federal air quality standards, the Nevada Center for Advanced Computational Methods (NCACM) at University of Nevada, Las Vegas (UNLV) is required by the DAQM to design a new system that can provide a multi-function data acquisition and management system. By characterized the deficiencies in the existing system, the NCACM redesign the current system that will provide a web-based work environment with new communication, model simulation and database management modules. More remote control capabilities are also included in the new system. The application will be more scalable, flexible and maintainable. The system is defined into four distinct tiers, data acquisition, data repository, data analysis and forecasting and data presentation tiers. After the 9–11 terrorist attacks, emergency response for any major cities around the country becomes a vital issue for homeland security. Through the timely data acquisition support, the system can return high-resolution data from monitoring stations for efficient model simulation. While continuously meteorological data feeding through the network, the NCACM’s newly configured Beowulf PC-clustering system calculates the possible transportation scenario around the valley and returns the best emergency scenario analysis.
APA, Harvard, Vancouver, ISO, and other styles
2

Nomeer, Mohamed. "Intelligent Energy Platform." In International Petroleum Technology Conference. IPTC, 2021. http://dx.doi.org/10.2523/iptc-21252-ms.

Full text
Abstract:
Abstract Turning an organization to an effective data driven decision making is vital factor to have and achieve digital transformation journey smoothly and successfully in the Energy sector, in which the energy industry has been trying to achieve the complete cycle Listen, Understand, effect and Decide rightly and quickly across the whole value chain such as HR, Finance, legal and contracts, operations, etc. since several decades where the software solutions were not in the priority list of the industry special the operations for many reasons, which created a serious of concequences which the industry is suffering from now such as listening carefully to the operations, understand the exact needs no matter how much we might save even if it’s 1 USD or 1 minute but do it correctly first time will save hours and millions later, silos in the organizations, distracted technologies not integrated, limitation of the technologies capabilities, people skills and compenetencies and the expectation the has been always set wrongly didn't support the industry to have organization reliance, security, safety, service quality and loyalty and reduce time and cost. With the current unprecedented crisis which are the COVID-19 and the massive oil crisis bundled together have created disturbance across the whole Energy industry which impacted the whole value chain not only for the Energy industry not the rest of the industries dramatically. The Panademic affect the whole key processes that the people used to for the last several decades, but the most important thing is change management process or manage to change process approach which is completely changed and from my opinion since years came true. Having the disruptive technologies will support the whole industry to come back much stronger than before as proven in other industries such as Aerospace and Defense, Telecome, Automative, Banking etc. The Intelligent Energy Platform focus on achieving what they couldn't achieve in the last decades through unique a approach towards the whole complete cycle Listen, Understand, effect and Decide, through developing and design a subway map for the whole workflows across the whole industry value chain integrating all the data sources together, by studying and remapping the whole processes, answering key four questions for each process, activity and tasks who, where, what and why, empowered machine learning with algorithms that will achieve the automation through digitizing and standardizing over a cognitive environment. There are several key pillars to get the digital transformation journey successfully and smoothly happening from my experience in the field operations, engineering, business, marketing and sales; Know and be clear on the end goal, which the Intelligent Energy Platform will include; select the right team from all the key stakholders, felexible and adoptable to change during the journey, tackle the exact needs for every process, activity and tasks, the power to change and update the solution at any given time, strong learning system, etc. In addition there are complimentary and network tool which is empowering the Intelligent Energy Platform that will expedite and support the journey massively, which is an advanced Infinity unique communication tool which is empower by all disruptive technology that will allow as an example all field engineers and management to be in one free Infinity business communication ' chatting' constructive and organize powered by disruptive solution where an example the engineer in a field and the operations has stopped for spare parts, equipment, machine, tool, etc. so he/she will send a normal message over our Infinity chatting app through the mobile or tablet and automatically this app will do a quick research in the back system, and display where it's available if it's within the country in another field, company, workshop, hence the engineer will click on the intended target, then automatically will go to the right approvals to approve on fly though the mobile or tablet, this will impact the performance of the operations massively and drop the non-productive time heavily by 20-30% and generate new business revenue in which few companies who are not utilizing all there equipment can rent to other sister companies and get revenue out of instead of just being in the workshop without any useful usage or productivity, it won’t stop by that only but will go to the contracts, legal, HR, etc. After implementing the solution and look to our demand graph, this free, perfect and instant unique communication app will allow the company immediately to see huge improvement on organization resilience which will reduce the time taken for any such request mentioned above from months to few days, organization will be more efficient, reduce cost by millions and millions meanwhile generate new business revenue by millions a well, enhance service customers loyalty and experience, improve decision making process, safety and security. this will impact directly the consumer surplus where the consumers who will be in this case the engineers will be willing to pay the gap based on the market preference and also avoiding the dead loss where the company will be financially and operationally more efficient. Not only that also transforming on people how they are communication through exchanging quickly photos expressing what they want to say, getting the attention quickly, make things faster in terms of decision that need to be taken through friends, families, and sometimes business as well with limitation. Digital is the only recourse and last hope for this industry to get out of its repeated pitfalls in the last decade and Intelligent Energy Platform will allow the industry and the whole value chain to be effectively integrated, tackle all the needs and requirements through Listen, understand, effect and decide to achieve a significant results, generate new jobs and roles and also will allow the industry to upturn again quickly and be able to face the upcoming expected and unexpected crisis. It's clear that the big players in the Energy industry are struggling because of several reasons but the most important factor is the digital path and develop digital solutions and one of the main issues is setting the right expectation which is related to the organizations, expectation and the experience across the whole ecosystem such operators, partners, vendors, etc. our Intelligent Energy Platform is focus on introducing an end-to-end platform solution focus on organization resilience, integrated technology, and completely agile complement by free, profit and instant app such as an infinity unique secured communication app, sharing experience business app, that focus on getting more and more networks to attract thousands and thousands of users and regain the trust and loyalty again in the industry. The unique secured communication app within the Intelligent Energy Platform which is n-sided with the engineers, service companies, management and business team will be zero-price quite close to the YouTube approach in terms of pricing strategy where it will be connecting n-sided with zero price and when it will expand it might be with negative price as well in which will allow 2/ 3 sided and even more to attract more users within the industries and enhance the service loyalty and quality, achieve one of the complex objective organization reliance, optimize performance, decision making and turn to data drive organization successfully and smoothly. Developing the Intelligent energy platform will allow our team to lead the platform approach in the Energy industry differently through free, profit and instant approach which will attract huge number of users who are looking for opportunities to gain the trust, loyalty again and feel secured. this will upturn the companies not only to find their ways throught the right approach but creating and developing new jobs and roles across the whole industry accompaniment significant contribution to the market revenue and profit.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography