1 |
M. L. Nelson, J. Peterson, R. L. Rariden, and R. Sen, "Transitioning to a business rule management service model: case studies from the property and casualty insurance industry," Information & Management, vol. 47, no. 1, pp, 30-41, 2010.
DOI
|
2 |
"La cryptographie definition," http://tpe-messages-secrets.e-monsite.com/pages/la-cryptographie/.
|
3 |
Berzati, "Analyse cryptographique des alterations d'algorithmes," Ph.D. dissertation, University of Versailles Saint-Quentin en-Yvelines, 2010.
|
4 |
Lopez-Ortega and I. Villar-Medina, "A multi-agent system to construct production orders by employing an expert system and a neural network," Expert Systems with Applications, vol. 36, no. 1, pp. 2937-2946, 2009.
DOI
|
5 |
D. Loshin, "Business rules," in Business Intelligence, 2nd ed. Waltham, MA: Morgan Kaufman, 2013, pp. 147-163.
|
6 |
Ali Pacha and N. Hadj-Saiad, "La Cryptographie et ses principaux systemes de references," RIST: revue d'information scientifique et technique, vol. 12, no. 1, pp. 173-193, 2002.
|
7 |
"Hybrid encryption," https://www.techopedia.com/definition/1779/hybrid-encryption.
|
8 |
D. Mouhamed, S. Maabout, K. Musumbu, "Generation automatique de regles metier par enrichissement semantique de modeles," 2007; https://liris.cnrs.fr/inforsid/sites/default/files/a661c1Ungr88gvmII.pdf.
|
9 |
V. Legendre, G. Petitjean and T. Lepatre, "Gestion des regles ," Genie Logiciel, no. 92, pp. 43-52 , 2010.
|
10 |
Chniti, P. Albert, and J. Charlet, "Gestion de la coherence des regles metier editees a partir d'ontologies OWL," in Proceeding of the 22nd French National Conference on Knowledge Engineering (IC2011), Chambery, France, 2011, pp. 589-606.
|
11 |
"Collaboration definition," https://en.wikipedia.org/wiki/Collaboration.
|
12 |
M. Videau, "Criteres de securite des Algorithmes de Chiffrement a cle secrete," Ph.D. dissertation, PARIS 6 University, 2005,
|
13 |
N. Sad Houari and N. Taghezout, "A combined use between rules, ontology and agents in BRMS design: application to SME in Algeria," in Proceedings of International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015), Dubai, 2015, pp. 11-17.
|
14 |
Chniti, "Gestion des dependances et des interactions entre Ontologies et Regles Metier," Ph.D. dissertation, PARIS 6 University, 2013.
|
15 |
"Collaboration definition," http://whatis.techtarget.com/definition/collaboration.
|
16 |
S. Ram and J. Liu, "An agent-based approach for sourcing business rules in supply chain management," International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 1-6, 2005.
DOI
|
17 |
J. Ferber and J. F. Perrot, Les systemes multi-agents, vers une intelligence collective. Paris: InterEditions, 1995.
|
18 |
D. Lavbic and R. Rupnik, "Multi-agent system for decision support in enterprises," Journal of Information and Organizational Sciences, vol. 33, no. 2, pp. 269-284, 2009.
|
19 |
"Cryptography definition," http://searchsoftwarequality.techtarget.com/definition/cryptography.
|
20 |
M. Bajec and M. Krisper, "A methodology and tool support for managing business rules in organisations," Information Systems, vol. 30, no. 6, pp. 423-443, 2005.
DOI
|
21 |
G. Soula, "La securite des reseaux numeriques, cryptologie et autres techniques," 2008 ; http://cybertim.timone.univ-mrs.fr/enseignement/doc-enseignement/informatique/securite%20reseaux%20techniques/docpeda_fichier.
|
22 |
R. B. Philippe, "Principaux algorithmes de cryptage," 2002 ; http://prolland.free.fr/works/security/algo_crypto.pdf.
|
23 |
V. Bernet-Rollande and S. Lallemand, "Rapport de TX Etude d'une attaque contre l'algorithme RC4," 2010.
|
24 |
"Advanced Encryption Standard," http://math.univ-lyon1.fr/-roblot/resources/masterpro_chapitre_4.pdf.
|
25 |
Lan and B. Vandevelde, "Panorama des algorithmes de cryptographie," 2011; http://veille-techno.blogs.ecnantes.fr/wp-content/uploads/2011/10/Crypto_final.pdf.
|
26 |
Stineman, "Pourquoi des regles metier?: un cas pour les utilisateurs metier de l'informatique," 2009; ftp://public.dhe.ibm.com/software/fr/ilog/IBM_ILOG_-_Pourquoi_des_regles_metier.pdf.
|
27 |
"Quel algorithme de chiffrement symetrique (symmetric cipher) choisir?" 2012; http://www.blog-des-telecoms.com/quel-algorithme-de-chiffrement-symetrique-symmetric-cipher-choisir/.
|
28 |
Bruasse-Bac, "Algorithmes de chiffrement par bloc," https://repo.zenk-security.com/Cryptographie%20.%20Algorithmes%20.%20Steganographie/Algorithmes%20de%20chiffrement%20par%20bloc.pdf.
|