5 CONCLUSIONS
Actually, the capability to fine-grained control the ac-
cess to the artifacts of an organization, or even, the
capability to define and implement business rules, are
most of the times, decoupled from the enterprise de-
sign. The practical consequence of this decoupling, is
(i) the duplication of effort in the control and models
design counterparts and (ii) with the designed mod-
els not aligned with control. Nowadays, a change in
the control requires a change in the model design, and
vice versa. Integrating the access control at the mod-
els design enables a fine-grained access control to the
artifacts directly in the design with a perfect align-
ment that enables the continuous changes throughout
time. Moreover, this integration enables a full ob-
servability of the operation of the enterprise and thus
allows the enforcing of business rules that are able
to react in run-time based in the actual and historical
observations. As a consequence of this, the business
rules are kept as directions that are truly followed by
the organization.
This paper defeat a completely different approach
when compared with non ontological models or even
with models that are solely black-box oriented. We
accept that in order to understand control it is cor-
rect to view the models and the control principles us-
ing a black-box approach, yet the white-box concepts
that relate the separation from the controller and the
controlled process should be researched and precisely
ontological specified if a real implementation is ex-
pected. It is not enough to consider only the black-box
approach. On the other hand, a white-box approach
enables (i) the continuous observation of the design
restrictions of the run-time DBT from the inside and
then (ii) to actuate with a change in the DBT models
when needed. In the limit, parts of the control could
be performed by automatic systems rather than exclu-
sively performed by actors.
For short, our approach represents an effort for con-
ceptualizing the control patterns that should be in-
cluded in the design of the real systems that supports
the organization. Moreover, the control concepts pre-
sented herein are directly related with the EG area re-
garding the lower level of governance for a DBT. For
other aspects of the organization, other control lay-
ers should be further considered. Despite the con-
cepts that are presented in this paper, further research
is needed to design a full ontology for the control of
the DBT. In particular the concepts of business rules
enforcement. It is also needed to develop automatic
tools to design and validate the ontological models.
REFERENCES
Dietz, J. L. G. (2005). A world ontology specification lan-
guage. pages pp. 688699. OTM Workshops.
Dietz, J. L. G. (2006). Enterprise Ontology: Theory and
Methodology. Springer.
Emery, F. and Trist, E. (1965). The Causal Texture of Or-
ganizational Environments. Systems Thinking, Fred-
erick Emery edition.
Ferraiolo, D., Kuhn, D., and Chandramouli, R. (2007).
Role-Based Access Control. ArtechHouse, 2nd edition
edition.
Ferraiolo, D. F., Sandhu, R., Gavrila, S., Kuhn, D. R., and
Chandramouli, R. (2001). Proposed nist standard for
role-based access control. ACM Trans. Inf. Syst. Se-
cur., 4(3):224274.
Franklin, G. F., Powell, J.D., and Emami-Naeini, A. (1991).
Feedback Control of Dynamic Systems. Addison-
Wesley Publishing Company, second edition.
Herwig, M. and Verelst, J. (2009). Normalized Systems:
Recreating Information Technology based on Laws
forSoftware Evolvability. Koppa.
Hofstede, G. (1978). The poverty of management control
philosophy. The Academy of Management Review,
3(3):450461.
Hoogervorst, J. A.(2009). Enterprise Governance and En-
terprise Engineering. The Enterprise Engineering Se-
ries. Springer Science.
IEEE830 (1998). Ieee recommended practice for software
requirements specifications.
Kervel, S. (2009). Enterprise ontology driven information
system engineering. In: Presentation given at CIAO!
Kervel, S. (2011). forthcoming in, Phd Thesis regarding
DEMO processor. PhD thesis, Delft University of
Technology, Netherlands.
Mannaert, H., Verelst, J., and Ven, K. (2008). Exploring
the concept of systems theoretic stability as a start-
ing point for a unified theory on software engineering.
Software Engineering Advances, International Con-
ference on,0:360366.
Ogata, K.(1997). Modern control engineering. Prentice-
Hall, Inc.
Piirainen, K., Gonzalez, R.,and Kolfschoten, G. (2010).
Quo vadis,design science? a survey of literature. In
Winter, R.,Zhao,J., and Aier, S., editors, Global Per-
spectives on Design Science Research, volume 6105
of Lecture Notes in Computer Science, pages 93108.
SpringerBerlin/Heidelberg.
Pressman, R. S. (1992). Software Engineering, A practi-
tioners Approach. McGraw Hill Book Company Eu-
rope,third edition.
Sandhu, R., Ferraiolo, D., and Kuhn, R. (2000). The nist
model for role-based access control: towards a unified
standard. In Proceedings of the fifth ACM workshop
on Role-based access control, RBAC00, pages4763,
NewYork, NY, USA. ACM.
Santos, C. A. L. d.(2007). Modelo Conceptual para Audito-
ria Organizacional Cont´ınua com An´alise em Tempo
Real. PhD thesis, Universidade T´ecnica de Lisboa,
Instituto Superior T´ecnico.
Tribolet, J. and Magalh˜aes, R. (2007). Ventos de Mudanc¸a,
chapter Engenharia Organizacional: das partes ao
todo e do todo `as partes na dial´ectica entre pessoas
e sistemas. Editora Fundo de Cultura. Brasil. in Por-
tuguese.
KEOD 2011 - International Conference on Knowledge Engineering and Ontology Development
554