• Title/Summary/Keyword: Business Rules Management System (BRMS)

Search Result 2, Processing Time 0.015 seconds

Programming Accounting Applications using BRMS (BRMS를 이용한 회계 프로그래밍)

  • Kim, Gi-Hwan;Park, Jong-Cheol;Kim, Jae-Hong;Park, Choong-Shik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1359-1364
    • /
    • 2010
  • In International Financial Reporting Standards(IFRS), companies have difficulties in managing efficiently own accounting rules and demonstrating the adequacy of accounting processes with the conventional accounting system. BRMS(Business Rule Management System) provides methods for managing, processing, and monitoring these accounting rules according to accounting principles and situation. This paper proposed the BRMS-based financial programming framework for managing and processing the accounting principles and the own accounting rules.

A Novel Approach for Integrating Security in Business Rules Modeling Using Agents and an Encryption Algorithm

  • Houari, Nawal Sad;Taghezout, Noria
    • Journal of Information Processing Systems
    • /
    • v.12 no.4
    • /
    • pp.688-710
    • /
    • 2016
  • Our approach permits to capitalize the expert's knowledge as business rules by using an agent-based platform. The objective of our approach is to allow experts to manage the daily evolutions of business domains without having to use a technician, and to allow them to be implied, and to participate in the development of the application to accomplish the daily tasks of their work. Therefore, the manipulation of an expert's knowledge generates the need for information security and other associated technologies. The notion of cryptography has emerged as a basic concept in business rules modeling. The purpose of this paper is to present a cryptographic algorithm based approach to integrate the security aspect in business rules modeling. We propose integrating an agent-based approach in the framework. This solution utilizes a security agent with domain ontology. This agent applies an encryption/decryption algorithm to allow for the confidentiality, authenticity, and integrity of the most important rules. To increase the security of these rules, we used hybrid cryptography in order to take advantage of symmetric and asymmetric algorithms. We performed some experiments to find the best encryption algorithm, which provides improvement in terms of response time, space memory, and security.