ارسل ملاحظاتك

ارسل ملاحظاتك لنا







يجب تسجيل الدخول أولا

Building an Islamic Financial Information System Based on Policy Managements

المصدر: مجلة جامعة الملك سعود - علوم الحاسب والمعلومات
الناشر: جامعة الملك سعود
المؤلف الرئيسي: Alsmadi, Izzat M. (Author)
مؤلفين آخرين: Zarour, Mohammad (Co-Author)
المجلد/العدد: مج27, ع4
محكمة: نعم
الدولة: السعودية
التاريخ الميلادي: 2015
الصفحات: 364 - 375
DOI: 10.33948/0584-027-004-001
ISSN: 1319-1578
رقم MD: 973702
نوع المحتوى: بحوث ومقالات
اللغة: الإنجليزية
قواعد المعلومات: science
مواضيع:
كلمات المؤلف المفتاحية:
Islamic Financial Systems | Islamic Banking | Policy Managements | XACML
رابط المحتوى:
صورة الغلاف QR قانون
حفظ في:
المستخلص: For many banks and customers in the Middle East and Islamic world, the availability and the ability to apply Islamic Shariah rules on financial activities is very important. In some cases, business and technical barriers can limit the ability to apply and offer financial services that are implemented according to Shariah rules. In this paper, we discuss enforcing Shariah rules from information technology viewpoint and show how such rules can be implemented and enforced in a financial establishment. Security authorization standard XACML is extended to consider Shariah rules. In this research XACML architecture, that is used and applied in many tools and system architectures, is used to enforce Shariah rules in the banking sector rather than its original goal of enforcing security rules where policy management systems such as XACML are usually used. We developed a model based on XACML policy management to show how an Islamic financial information system can be used to make decisions for day to day bank activities. Such a system is required by all Islamic banks around the world. Currently, most Islamic banks use advisory boards to provide opinions on general activities. The gap between those high level general rules and decision for each customer business process is to be filled by Islamic financial information systems. The flexible design of the architecture can also be effective where rules can be screened and revisited often without the need to restructure the authorization system implemented. Authorization rules described here are not necessarily the perfect reflection of Shariah opinions. They are only shown as a proof of concept and a demonstration of how such rules can be written and implemented.

ISSN: 1319-1578

عناصر مشابهة