참고문헌
- D. Mouhamed, S. Maabout, K. Musumbu, "Generation automatique de regles metier par enrichissement semantique de modeles," 2007; https://liris.cnrs.fr/inforsid/sites/default/files/a661c1Ungr88gvmII.pdf.
-
V. Legendre, G. Petitjean and T. Lepatre, "Gestion des regles
," Genie Logiciel, no. 92, pp. 43-52 , 2010. - Chniti, P. Albert, and J. Charlet, "Gestion de la coherence des regles metier editees a partir d'ontologies OWL," in Proceeding of the 22nd French National Conference on Knowledge Engineering (IC2011), Chambery, France, 2011, pp. 589-606.
- D. Loshin, "Business rules," in Business Intelligence, 2nd ed. Waltham, MA: Morgan Kaufman, 2013, pp. 147-163.
- M. L. Nelson, J. Peterson, R. L. Rariden, and R. Sen, "Transitioning to a business rule management service model: case studies from the property and casualty insurance industry," Information & Management, vol. 47, no. 1, pp, 30-41, 2010. https://doi.org/10.1016/j.im.2009.09.007
- "La cryptographie definition," http://tpe-messages-secrets.e-monsite.com/pages/la-cryptographie/.
- Berzati, "Analyse cryptographique des alterations d'algorithmes," Ph.D. dissertation, University of Versailles Saint-Quentin en-Yvelines, 2010.
- M. Videau, "Criteres de securite des Algorithmes de Chiffrement a cle secrete," Ph.D. dissertation, PARIS 6 University, 2005,
- N. Sad Houari and N. Taghezout, "A combined use between rules, ontology and agents in BRMS design: application to SME in Algeria," in Proceedings of International Conference on Artificial Intelligence, Energy and Manufacturing Engineering (ICAEME'2015), Dubai, 2015, pp. 11-17.
- Chniti, "Gestion des dependances et des interactions entre Ontologies et Regles Metier," Ph.D. dissertation, PARIS 6 University, 2013.
- "Collaboration definition," https://en.wikipedia.org/wiki/Collaboration.
- "Collaboration definition," http://whatis.techtarget.com/definition/collaboration.
- S. Ram and J. Liu, "An agent-based approach for sourcing business rules in supply chain management," International Journal of Intelligent Information Technologies, vol. 1, no. 1, pp. 1-6, 2005. https://doi.org/10.4018/jiit.2005010101
- J. Ferber and J. F. Perrot, Les systemes multi-agents, vers une intelligence collective. Paris: InterEditions, 1995.
- D. Lavbic and R. Rupnik, "Multi-agent system for decision support in enterprises," Journal of Information and Organizational Sciences, vol. 33, no. 2, pp. 269-284, 2009.
- Lopez-Ortega and I. Villar-Medina, "A multi-agent system to construct production orders by employing an expert system and a neural network," Expert Systems with Applications, vol. 36, no. 1, pp. 2937-2946, 2009. https://doi.org/10.1016/j.eswa.2008.01.070
- M. Bajec and M. Krisper, "A methodology and tool support for managing business rules in organisations," Information Systems, vol. 30, no. 6, pp. 423-443, 2005. https://doi.org/10.1016/j.is.2004.05.003
- "Cryptography definition," http://searchsoftwarequality.techtarget.com/definition/cryptography.
- G. Soula, "La securite des reseaux numeriques, cryptologie et autres techniques," 2008 ; http://cybertim.timone.univ-mrs.fr/enseignement/doc-enseignement/informatique/securite%20reseaux%20techniques/docpeda_fichier.
- R. B. Philippe, "Principaux algorithmes de cryptage," 2002 ; http://prolland.free.fr/works/security/algo_crypto.pdf.
- V. Bernet-Rollande and S. Lallemand, "Rapport de TX Etude d'une attaque contre l'algorithme RC4," 2010.
- "Advanced Encryption Standard," http://math.univ-lyon1.fr/-roblot/resources/masterpro_chapitre_4.pdf.
- Lan and B. Vandevelde, "Panorama des algorithmes de cryptographie," 2011; http://veille-techno.blogs.ecnantes.fr/wp-content/uploads/2011/10/Crypto_final.pdf.
- Stineman, "Pourquoi des regles metier?: un cas pour les utilisateurs metier de l'informatique," 2009; ftp://public.dhe.ibm.com/software/fr/ilog/IBM_ILOG_-_Pourquoi_des_regles_metier.pdf.
- "Quel algorithme de chiffrement symetrique (symmetric cipher) choisir?" 2012; http://www.blog-des-telecoms.com/quel-algorithme-de-chiffrement-symetrique-symmetric-cipher-choisir/.
- Bruasse-Bac, "Algorithmes de chiffrement par bloc," https://repo.zenk-security.com/Cryptographie%20.%20Algorithmes%20.%20Steganographie/Algorithmes%20de%20chiffrement%20par%20bloc.pdf.
- Ali Pacha and N. Hadj-Saiad, "La Cryptographie et ses principaux systemes de references," RIST: revue d'information scientifique et technique, vol. 12, no. 1, pp. 173-193, 2002.
- "Hybrid encryption," https://www.techopedia.com/definition/1779/hybrid-encryption.