Ivan Magdalenić - Academia.edu (original) (raw)
Papers by Ivan Magdalenić
Ovaj rad daje uvid u zahtjeve i potrebe koje se javljaju kod razmjene poslovnih dokumenata te pre... more Ovaj rad daje uvid u zahtjeve i potrebe koje se javljaju kod razmjene poslovnih dokumenata te predlaže nacine njihovog rjesavanja. Namjera rada je
Disertacija predlaže arhitekturu i model za ostvarivanje dinamickog generiranja ontoloski podržan... more Disertacija predlaže arhitekturu i model za ostvarivanje dinamickog generiranja ontoloski podržanih usluga Weba za dohvat podataka iz raznorodnih
This paper describes methodology of finding potential risks of bank's noncompliance with Payment ... more This paper describes methodology of finding potential risks of bank's noncompliance with Payment Card Industry Data Security Standard (PCI DSS) v2.0 mandatory security requirements. For different types of information assets or security requirements it is necessary to apply different methods of security risk assessment or different standards for specific environment. In this paper, PCI DSS security requirements are explained, Analytic Hierarchy Process (AHP) technique is used as a groundwork to decide which PCI requirements are the most critical and the OCTAVE method is used for formal risk assessment of the most significant PCI requirement in case the requirement is not satisfied. Both, AHP technique and OCTAVE method are applied to a real case scenario in the bank before conducting PCI auditing process.
International Journal of Metadata, Semantics and Ontologies, 2012
Ontology matching is the process of finding semantic relationships between entities of different ... more Ontology matching is the process of finding semantic relationships between entities of different ontologies. It plays an important role in the integration of heterogeneous data sources. To find semantic correspondences between entities, various matchers can be used. When multiple matchers are integrated into a matching system, the issue of combining these matchers together and determining the importance of every basic matcher arises. In a parallel composition of basic matchers, several matchers are used independently and then their results are aggregated. In this paper, we propose a method for automatically determining weights of basic matchers in their parallel composition and the architecture of the matching system. An evaluation of the method is performed on case study examples concerning the matching of four ontology pairs and a comparison with other aggregation methods is given. Additionally, the architecture of the matching system based on our automatic weighted aggregation method is presented.
International Journal of Safety and Security Engineering, Apr 30, 2020
In today's fast, agile, complex and interconnected business world, one of the main goals and conc... more In today's fast, agile, complex and interconnected business world, one of the main goals and concerns is to find an efficient and effective way of managing information security risks. So, one of the means is usage of multicriteria decision-making techniques for such purposes. The vast majority of research begins with some form of literature review. Thus, the review of the literature must be done thoroughly and impartially in order to obtain certain scientific value. This paper provides a systematic literature review (SLR) of relevant and recent literature from both research domains, namely information security risk management and multicriteria decision-making, identifying the standards, methods, techniques and tools that are considered to be the most relevant in the research areas observed. The main purpose of the paper is to discover complementary ISRA and MCDM methods that could be used as a basis to create a new hybrid model for more efficient evaluation of critical IT solutions. The related context, main goals, review methods, relevant results of each research phase along with the findings, papers' analysis, recommendations and conclusions are all given in this review article in order to fully comply with the SLR requirements.
IGI Global eBooks, 2013
Many benefits from implementation of e-business solutions are related to network effects which me... more Many benefits from implementation of e-business solutions are related to network effects which means that there are many interconnected parties utilizing the same or compatible technologies. The large-scale adoption of e-business practices in public sectors and in small and medium enterprises (SMEs)-prevailing economic environments will be successful if appropriate support in the form of education, adequate legislative, directions, and open source applications is provided. This case study describes the adoption of e-business in public sectors and SMEs by using an integrated open source approach called e-modules. E-module is a model which has process properties, data properties, and requirements on technology. Therefore e-module presents a holistic framework for deployment of e-business solutions and such e-module structure mandates an approach which requires reengineering of business processes and adoption of strong standardization that solves interoperability issues. E-module is based on principles of service-oriented architectures with guidelines for introduction into business processes and integration with ERP systems. Such an open source approach enables the spreading of compatible software solutions across any given country, thus, increasing e-business adoption. This paper presents a methodology for defining and building e-modules.
Journal of Advances in Computer Networks, 2016
Widespread of smartphones which are equipped with cameras and an Internet connection allow develo... more Widespread of smartphones which are equipped with cameras and an Internet connection allow development of applications that might be used as parking assistance, or to help humans to coordinate their actions with something that they cannot see directly. We propose an application that uses distributed architecture with carefully designed techniques to deal with Network Address Translation (NAT) issues and to allow users to, simply, temporarily and in an Ad-Hoc manner, interconnect their smartphones and achieve live video streaming with QoS feedback. Based on the proposed model, a prototype application was implemented and tested. Conducted experiments confirm the soundness of this approach. Index Terms-Video streaming, mobile application, peer-to-peer, Ad-Hoc association. I. INTRODUCTION Widespread of smartphones with cameras and Internet connections permits implementation of a mobile application that can help humans in activities that require coordination with objects or events that are outside of direct sight, e.g. due to physical obstacles. Compared to specialized equipment like the interconnected camera-and-display system, the mobile application has some advantages. It is easily obtainable by simply downloading and installing the application by a user that already owns the smartphone. The mobile application is handy since people do not have to carry additional equipment, and the user does not have to spend money for buying additional hardware. The motivating example for such application is the case of helping a driver with vehicle parking that might be difficult because of additionally attached trailers, narrow or complicated parking space, etc. In this situation, one owner of the smartphone can record a view from outside of the vehicle and live stream this video to the driver's smartphone. Unlike the live broadcast of sport events that can tolerate delays in order of tens of seconds or even minutes, the proposed application has to meet stricter real-time constraints, otherwise its usage could result with damage or injury. To be practical, this application has to manage a temporary connection between smartphones, in an Ad-Hoc manner, and for the untrained user this has to be simple and fast. Other use scenarios include helping humans in placing stuff on the wall that should be aligned with other objects that are not visible to them, or helping viewing an area that is hard to Manuscript
Journal of Computer Science, Oct 1, 2016
Component-based software engineering and generative programming are common approaches in software... more Component-based software engineering and generative programming are common approaches in software engineering. Each approach has some benefits and domain of usage. Component-based development is used to build autonomous components that can be further combined in different ways, while generative programming is more suitable when building systems that have different variants. Before a variable component based system can be build, it needs to be modeled. In this article, a new common metamodel that aims to enable modeling a system which combines both component-based development and generative programming is introduced. The introduced metamodel proposed in this paper combines the component diagram that is used to model systems in component-based development and the feature diagram that is employed in modeling systems in generative programming. The combined metamodel enables modeling of variable systems using components.
Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of ... more Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of Zagreb works on the research project named ''Networked Economy'', supported by Croatian Ministry of Science and Technology. The project is also recognized by corporate domain and was made a part of an e-business initiative by the Agrokor group. The Agrokor's intention is to use the ebXML Registry/Repository layer as the central point of integration among the many Agrokor's affiliates and partners. We have considered different approaches toward ebXML specifications describing Registry/Repository layer, not only to conform to specifications, but also with vision that careful architecture modeling will enable modularity and flexibility of our solution. This could be vital, as we must bear in mind that specifications are surely going to be improved over certain period of time. This paper describes modeling ebXML Registry/Repository architecture and concentrates on its Registry Service part.
Communications in computer and information science, 2010
A mapping of Core Components specification based e-business standards to an ontology is presented... more A mapping of Core Components specification based e-business standards to an ontology is presented. The Web Ontology Language (OWL) is used for ontology development. In order to preserve the existing hierarchy of the standards, an emphasis is put on the mapping of Core Components elements to specific constructs in OWL. The main purpose of developing an e-business standards' ontology is to create a foundation for an automated mapping system that would be able to convert concepts from various standards in an independent fashion. The practical applicability and verification of the presented mappings is tested on the mapping of Universal Business Language version 2.0 and Cross Industry Invoice version 2.0 to OWL.
Communications in computer and information science, 2011
Today, there is a rapid increase of the available data because of advances in information and com... more Today, there is a rapid increase of the available data because of advances in information and communications technology. Therefore, many mutually heterogeneous data sources that describe the same domain of interest exist. To facilitate the integration of these heterogeneous data sources, an ontology can be used as it enriches the knowledge of a data source by giving a detailed description of entities and their mutual relations within the domain of interest. Ontology matching is a key issue in integrating heterogeneous data sources described by ontologies as it eases the management of data coming from various sources. The ontology matching system consists of several basic matchers. To determine high-quality correspondences between entities of compared ontologies, the matching results of these basic matchers should be aggregated by an aggregation method. In this paper, a new weighted aggregation method for parallel composition of basic matchers based on genetic algorithm is presented. The evaluation has confirmed a high quality of the new aggregation method as this method has improved the process of matching two ontologies by obtaining higher confidence values of correctly found correspondences and thus increasing the quality of matching results.
The Web services technology enables communication, distributed computation and interoperability i... more The Web services technology enables communication, distributed computation and interoperability in heterogeneous environments. Although the technology is well specified and supported by the programming tools, it is still not widely used. Some of the main reasons are the difficulties which the end users have in searching an adequate Web service to get the required data. Even if found, the Web
Ovaj rad daje uvid u zahtjeve i potrebe koje se javljaju kod razmjene poslovnih dokumenata te pre... more Ovaj rad daje uvid u zahtjeve i potrebe koje se javljaju kod razmjene poslovnih dokumenata te predlaže nacine njihovog rjesavanja. Namjera rada je
Disertacija predlaže arhitekturu i model za ostvarivanje dinamickog generiranja ontoloski podržan... more Disertacija predlaže arhitekturu i model za ostvarivanje dinamickog generiranja ontoloski podržanih usluga Weba za dohvat podataka iz raznorodnih
This paper describes methodology of finding potential risks of bank's noncompliance with Payment ... more This paper describes methodology of finding potential risks of bank's noncompliance with Payment Card Industry Data Security Standard (PCI DSS) v2.0 mandatory security requirements. For different types of information assets or security requirements it is necessary to apply different methods of security risk assessment or different standards for specific environment. In this paper, PCI DSS security requirements are explained, Analytic Hierarchy Process (AHP) technique is used as a groundwork to decide which PCI requirements are the most critical and the OCTAVE method is used for formal risk assessment of the most significant PCI requirement in case the requirement is not satisfied. Both, AHP technique and OCTAVE method are applied to a real case scenario in the bank before conducting PCI auditing process.
International Journal of Metadata, Semantics and Ontologies, 2012
Ontology matching is the process of finding semantic relationships between entities of different ... more Ontology matching is the process of finding semantic relationships between entities of different ontologies. It plays an important role in the integration of heterogeneous data sources. To find semantic correspondences between entities, various matchers can be used. When multiple matchers are integrated into a matching system, the issue of combining these matchers together and determining the importance of every basic matcher arises. In a parallel composition of basic matchers, several matchers are used independently and then their results are aggregated. In this paper, we propose a method for automatically determining weights of basic matchers in their parallel composition and the architecture of the matching system. An evaluation of the method is performed on case study examples concerning the matching of four ontology pairs and a comparison with other aggregation methods is given. Additionally, the architecture of the matching system based on our automatic weighted aggregation method is presented.
International Journal of Safety and Security Engineering, Apr 30, 2020
In today's fast, agile, complex and interconnected business world, one of the main goals and conc... more In today's fast, agile, complex and interconnected business world, one of the main goals and concerns is to find an efficient and effective way of managing information security risks. So, one of the means is usage of multicriteria decision-making techniques for such purposes. The vast majority of research begins with some form of literature review. Thus, the review of the literature must be done thoroughly and impartially in order to obtain certain scientific value. This paper provides a systematic literature review (SLR) of relevant and recent literature from both research domains, namely information security risk management and multicriteria decision-making, identifying the standards, methods, techniques and tools that are considered to be the most relevant in the research areas observed. The main purpose of the paper is to discover complementary ISRA and MCDM methods that could be used as a basis to create a new hybrid model for more efficient evaluation of critical IT solutions. The related context, main goals, review methods, relevant results of each research phase along with the findings, papers' analysis, recommendations and conclusions are all given in this review article in order to fully comply with the SLR requirements.
IGI Global eBooks, 2013
Many benefits from implementation of e-business solutions are related to network effects which me... more Many benefits from implementation of e-business solutions are related to network effects which means that there are many interconnected parties utilizing the same or compatible technologies. The large-scale adoption of e-business practices in public sectors and in small and medium enterprises (SMEs)-prevailing economic environments will be successful if appropriate support in the form of education, adequate legislative, directions, and open source applications is provided. This case study describes the adoption of e-business in public sectors and SMEs by using an integrated open source approach called e-modules. E-module is a model which has process properties, data properties, and requirements on technology. Therefore e-module presents a holistic framework for deployment of e-business solutions and such e-module structure mandates an approach which requires reengineering of business processes and adoption of strong standardization that solves interoperability issues. E-module is based on principles of service-oriented architectures with guidelines for introduction into business processes and integration with ERP systems. Such an open source approach enables the spreading of compatible software solutions across any given country, thus, increasing e-business adoption. This paper presents a methodology for defining and building e-modules.
Journal of Advances in Computer Networks, 2016
Widespread of smartphones which are equipped with cameras and an Internet connection allow develo... more Widespread of smartphones which are equipped with cameras and an Internet connection allow development of applications that might be used as parking assistance, or to help humans to coordinate their actions with something that they cannot see directly. We propose an application that uses distributed architecture with carefully designed techniques to deal with Network Address Translation (NAT) issues and to allow users to, simply, temporarily and in an Ad-Hoc manner, interconnect their smartphones and achieve live video streaming with QoS feedback. Based on the proposed model, a prototype application was implemented and tested. Conducted experiments confirm the soundness of this approach. Index Terms-Video streaming, mobile application, peer-to-peer, Ad-Hoc association. I. INTRODUCTION Widespread of smartphones with cameras and Internet connections permits implementation of a mobile application that can help humans in activities that require coordination with objects or events that are outside of direct sight, e.g. due to physical obstacles. Compared to specialized equipment like the interconnected camera-and-display system, the mobile application has some advantages. It is easily obtainable by simply downloading and installing the application by a user that already owns the smartphone. The mobile application is handy since people do not have to carry additional equipment, and the user does not have to spend money for buying additional hardware. The motivating example for such application is the case of helping a driver with vehicle parking that might be difficult because of additionally attached trailers, narrow or complicated parking space, etc. In this situation, one owner of the smartphone can record a view from outside of the vehicle and live stream this video to the driver's smartphone. Unlike the live broadcast of sport events that can tolerate delays in order of tens of seconds or even minutes, the proposed application has to meet stricter real-time constraints, otherwise its usage could result with damage or injury. To be practical, this application has to manage a temporary connection between smartphones, in an Ad-Hoc manner, and for the untrained user this has to be simple and fast. Other use scenarios include helping humans in placing stuff on the wall that should be aligned with other objects that are not visible to them, or helping viewing an area that is hard to Manuscript
Journal of Computer Science, Oct 1, 2016
Component-based software engineering and generative programming are common approaches in software... more Component-based software engineering and generative programming are common approaches in software engineering. Each approach has some benefits and domain of usage. Component-based development is used to build autonomous components that can be further combined in different ways, while generative programming is more suitable when building systems that have different variants. Before a variable component based system can be build, it needs to be modeled. In this article, a new common metamodel that aims to enable modeling a system which combines both component-based development and generative programming is introduced. The introduced metamodel proposed in this paper combines the component diagram that is used to model systems in component-based development and the feature diagram that is employed in modeling systems in generative programming. The combined metamodel enables modeling of variable systems using components.
Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of ... more Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of Zagreb works on the research project named ''Networked Economy'', supported by Croatian Ministry of Science and Technology. The project is also recognized by corporate domain and was made a part of an e-business initiative by the Agrokor group. The Agrokor's intention is to use the ebXML Registry/Repository layer as the central point of integration among the many Agrokor's affiliates and partners. We have considered different approaches toward ebXML specifications describing Registry/Repository layer, not only to conform to specifications, but also with vision that careful architecture modeling will enable modularity and flexibility of our solution. This could be vital, as we must bear in mind that specifications are surely going to be improved over certain period of time. This paper describes modeling ebXML Registry/Repository architecture and concentrates on its Registry Service part.
Communications in computer and information science, 2010
A mapping of Core Components specification based e-business standards to an ontology is presented... more A mapping of Core Components specification based e-business standards to an ontology is presented. The Web Ontology Language (OWL) is used for ontology development. In order to preserve the existing hierarchy of the standards, an emphasis is put on the mapping of Core Components elements to specific constructs in OWL. The main purpose of developing an e-business standards' ontology is to create a foundation for an automated mapping system that would be able to convert concepts from various standards in an independent fashion. The practical applicability and verification of the presented mappings is tested on the mapping of Universal Business Language version 2.0 and Cross Industry Invoice version 2.0 to OWL.
Communications in computer and information science, 2011
Today, there is a rapid increase of the available data because of advances in information and com... more Today, there is a rapid increase of the available data because of advances in information and communications technology. Therefore, many mutually heterogeneous data sources that describe the same domain of interest exist. To facilitate the integration of these heterogeneous data sources, an ontology can be used as it enriches the knowledge of a data source by giving a detailed description of entities and their mutual relations within the domain of interest. Ontology matching is a key issue in integrating heterogeneous data sources described by ontologies as it eases the management of data coming from various sources. The ontology matching system consists of several basic matchers. To determine high-quality correspondences between entities of compared ontologies, the matching results of these basic matchers should be aggregated by an aggregation method. In this paper, a new weighted aggregation method for parallel composition of basic matchers based on genetic algorithm is presented. The evaluation has confirmed a high quality of the new aggregation method as this method has improved the process of matching two ontologies by obtaining higher confidence values of correctly found correspondences and thus increasing the quality of matching results.
The Web services technology enables communication, distributed computation and interoperability i... more The Web services technology enables communication, distributed computation and interoperability in heterogeneous environments. Although the technology is well specified and supported by the programming tools, it is still not widely used. Some of the main reasons are the difficulties which the end users have in searching an adequate Web service to get the required data. Even if found, the Web