Browse > Article
http://dx.doi.org/10.3745/JIPS.03.0056

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm  

Houari, Nawal Sad (Dept. of Computer Science, University of Oran1 Ahmed BenBella)
Taghezout, Noria (Dept. of Computer Science, University of Oran1 Ahmed BenBella)
Publication Information
Journal of Information Processing Systems / v.12, no.4, 2016 , pp. 688-710 More about this Journal
Abstract
Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.
Keywords
Business Rules (BR); Business Rules Management System (BRMS); Encryption Algorithms; Security Agent;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. L. Nelson, J. Peterson, R. L. Rariden, and R. Sen, "Transitioning to a business rule management service model: case studies from the property and casualty insurance industry," Information & Management, vol. 47, no. 1, pp, 30-41, 2010.   DOI
2 "La cryptographie definition," http://tpe-messages-secrets.e-monsite.com/pages/la-cryptographie/.
3 Berzati, "Analyse cryptographique des alterations d'algorithmes," Ph.D. dissertation, University of Versailles Saint-Quentin en-Yvelines, 2010.
4 Lopez-Ortega and I. Villar-Medina, "A multi-agent system to construct production orders by employing an expert system and a neural network," Expert Systems with Applications, vol. 36, no. 1, pp. 2937-2946, 2009.   DOI
5 D. Loshin, "Business rules," in Business Intelligence, 2nd ed. Waltham, MA: Morgan Kaufman, 2013, pp. 147-163.
6 Ali Pacha and N. Hadj-Saiad, "La Cryptographie et ses principaux systemes de references," RIST: revue d'information scientifique et technique, vol. 12, no. 1, pp. 173-193, 2002.
7 "Hybrid encryption," https://www.techopedia.com/definition/1779/hybrid-encryption.
8 D. Mouhamed, S. Maabout, K. Musumbu, "Generation automatique de regles metier par enrichissement semantique de modeles," 2007; https://liris.cnrs.fr/inforsid/sites/default/files/a661c1Ungr88gvmII.pdf.
9 V. Legendre, G. Petitjean and T. Lepatre, "Gestion des regles ," Genie Logiciel, no. 92, pp. 43-52 , 2010.
10 Chniti, P. Albert, and J. Charlet, "Gestion de la coherence des regles metier editees a partir d'ontologies OWL," in Proceeding of the 22nd French National Conference on Knowledge Engineering (IC2011), Chambery, France, 2011, pp. 589-606.
11 "Collaboration definition," https://en.wikipedia.org/wiki/Collaboration.
12 M. Videau, "Criteres de securite des Algorithmes de Chiffrement a cle secrete," Ph.D. dissertation, PARIS 6 University, 2005,
13 N. Sad Houari and N. Taghezout, "A combined use between rules, ontology and agents in BRMS design: application to SME in Algeria," in Proceedings of International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015), Dubai, 2015, pp. 11-17.
14 Chniti, "Gestion des dependances et des interactions entre Ontologies et Regles Metier," Ph.D. dissertation, PARIS 6 University, 2013.
15 "Collaboration definition," http://whatis.techtarget.com/definition/collaboration.
16 S. Ram and J. Liu, "An agent-based approach for sourcing business rules in supply chain management," International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 1-6, 2005.   DOI
17 J. Ferber and J. F. Perrot, Les systemes multi-agents, vers une intelligence collective. Paris: InterEditions, 1995.
18 D. Lavbic and R. Rupnik, "Multi-agent system for decision support in enterprises," Journal of Information and Organizational Sciences, vol. 33, no. 2, pp. 269-284, 2009.
19 "Cryptography definition," http://searchsoftwarequality.techtarget.com/definition/cryptography.
20 M. Bajec and M. Krisper, "A methodology and tool support for managing business rules in organisations," Information Systems, vol. 30, no. 6, pp. 423-443, 2005.   DOI
21 G. Soula, "La securite des reseaux numeriques, cryptologie et autres techniques," 2008 ; http://cybertim.timone.univ-mrs.fr/enseignement/doc-enseignement/informatique/securite%20reseaux%20techniques/docpeda_fichier.
22 R. B. Philippe, "Principaux algorithmes de cryptage," 2002 ; http://prolland.free.fr/works/security/algo_crypto.pdf.
23 V. Bernet-Rollande and S. Lallemand, "Rapport de TX Etude d'une attaque contre l'algorithme RC4," 2010.
24 "Advanced Encryption Standard," http://math.univ-lyon1.fr/-roblot/resources/masterpro_chapitre_4.pdf.
25 Lan and B. Vandevelde, "Panorama des algorithmes de cryptographie," 2011; http://veille-techno.blogs.ecnantes.fr/wp-content/uploads/2011/10/Crypto_final.pdf.
26 Stineman, "Pourquoi des regles metier?: un cas pour les utilisateurs metier de l'informatique," 2009; ftp://public.dhe.ibm.com/software/fr/ilog/IBM_ILOG_-_Pourquoi_des_regles_metier.pdf.
27 "Quel algorithme de chiffrement symetrique (symmetric cipher) choisir?" 2012; http://www.blog-des-telecoms.com/quel-algorithme-de-chiffrement-symetrique-symmetric-cipher-choisir/.
28 Bruasse-Bac, "Algorithmes de chiffrement par bloc," https://repo.zenk-security.com/Cryptographie%20.%20Algorithmes%20.%20Steganographie/Algorithmes%20de%20chiffrement%20par%20bloc.pdf.