Study on intelligent financial supervision management system based on context-awareness and rule engine

Author(s):  
Y. Z. Xu ◽  
J. J. Yang ◽  
Q. Wang
2013 ◽  
Vol 411-414 ◽  
pp. 2384-2386
Author(s):  
Xiao Xiong Zeng

The flexibility is always a big trouble of workflow system. For nowadays, in order to catch up with the new management of company, the traditional workflow has to be upgraded too. Being used as a small control to assist the development of controlling the flow, the rule engine separates the business rule from business logic and manages them as a whole part in order to improve the flexibility and agility of traditional workflow while the basic function of workflow would be maintained, then to attain the decoupled nature and generality of the software.


2019 ◽  
Vol 3 (100) ◽  
pp. 3-17 ◽  
Author(s):  
Beata Mrozowska - Bartkiewicz ◽  
Aldona Wnęk

Following the Solvency II Directive, the detailed rules for delegating own activities to external providers by insurance and reinsurance undertakings have been introduced into the insurance law regime, including the requirements regarding the contents of agreements under which the outsourced services are provided (outsourcing contracts). As institutions of public trust, insurance undertakings should perform their functions properly and safely for customers. Hence, the requirements for outsourcing certain activities and functions constitute an important element of the insurance company management system. Insurance outsourcing is subject to disclosure obligations, and is supervised by the Polish Financial Supervision Authority (KNF). The article discusses legal provisions specifying the basic outsourcing rules for insurance and reinsurance undertakings, including the principles for the development of internal policy and the fulfillment of disclosure requirements, with special emphasis on the outsourcing of certain activities and functions of the management system. Moreover, it also presents the requirements for outsourcing contracts which are imposed on insurance undertakings both by EU and Polish legislation. An appropriate formulation of the rights and obligations of the parties to the contract should ensure, in particular, both compliance with the law and the effective services supervision. More importantly, the KNF has been authorized to perform inspection activities in respect of entities providing outsourced services.


Author(s):  
Jared Zebedee ◽  
Patrick Martin ◽  
Kirk Wilson ◽  
Wendy Powley

Pervasive computing presents an exciting realm where intelligent devices interact within the background of our environments to create a more intuitive experience for their human users. Context-awareness is a key requirement in a pervasive environment because it enables an application to adapt to the current situation. Context-awareness is best facilitated by a context management system that supports the automatic discovery, retrieval and exchange of context information by devices. Such a system must perform its functions in a pervasive computing environment that involves heterogeneous mobile devices which may experience intermittent connectivity and resource and power constraints. The objective of the chapter is to describe a robust and adaptable context management system. We achieve an adaptable context management system by adopting the autonomic computing paradigm, which supports systems that are aware of their surroundings and that can automatically react to changes in them. A robust context management system is achieved with an implementation based on widely accepted standards, specifically Web services and the Web Services Distributed Management (WSDM) standard.


Author(s):  
Jared Zebedee ◽  
Patrick Martin ◽  
Kirk Wilson ◽  
Wendy Powley

Pervasive computing presents an exciting realm where intelligent devices interact within the background of our environments to create a more intuitive experience for their human users. Context-awareness is a key requirement in a pervasive environment because it enables an application to adapt to the current situation. Context-awareness is best facilitated by a context management system that supports the automatic discovery, retrieval and exchange of context information by devices. Such a system must perform its functions in a pervasive computing environment that involves heterogeneous mobile devices which may experience intermittent connectivity and resource and power constraints. The objective of the chapter is to describe a robust and adaptable context management system. We achieve an adaptable context management system by adopting the autonomic computing paradigm, which supports systems that are aware of their surroundings and that can automatically react to changes in them. A robust context management system is achieved with an implementation based on widely accepted standards, specifically Web services and the Web Services Distributed Management (WSDM) standard.


2021 ◽  
Author(s):  
Cody Lewis ◽  
Nan Li ◽  
Vijay Varadharajan

Trust models play an important role in Internet of Things (IoT) as it provides a means of finding whether a given device can provide a service to a satisfactory level as well as a means for identifying potentially malicious devices in the network. Context awareness in trust models allows a trustor to filter and aggregate evidence by their relevance to the current situation. Context awareness is important in the formulation of trust in IoT networks due to their heterogeneity and due to the dynamic changes in the capabilities of IoT devices. In this paper,we have proposed a new type of context-based attack on context aware trust models for IoT systems. An adversary is able to manipulate the context and impact a target group of IoT devices, while other devices in non-targeted groups are not even aware of the attack. We have demonstrated the effectiveness of this new type of attack on six previously proposed trust models. Through practical simulations and theoretical proofs, we show that the adversaries can launch such context-based attacks against a targeted group of IoT devices in the network. The paper also proposes a new trust management system that can mitigate such context-based attacks.


Sign in / Sign up

Export Citation Format

Share Document