Filters








53,223 Hits in 6.8 sec

Using an Enterprise Architecture for IT Risk Management

Frank Innerhofer-Oberperfler, Ruth Breu
2006 Information Security for South Africa  
The approach is model-driven using an enterprise architecture as the basis for the security management process.  ...  Using an enterprise architecture it is possible to provide an integrated description of an organisation's structure, processes and its underlying IT landscape.  ...  A Security Requirement must be linked with either the main Business Security Objective of a dependency graph or it has to be derived from another Security Requirement of an upper layer model element.  ... 
dblp:conf/issa/Innerhofer-OberperflerB06 fatcat:aykkglurjzeznn3g3hfnilbgje

Method Framework for Developing Enterprise Architecture Security Principles

Sara Larno, Faculty of Information Technology, University of Jyvaskyla, Mattilanniemi 2, Jyväskylä, FI-40014, Finland, Ville Seppänen, Jarkko Nurmi, Faculty of Information Technology, University of Jyvaskyla, Mattilanniemi 2, Jyväskylä, FI-40014, Finland, Faculty of Information Technology, University of Jyvaskyla, Mattilanniemi 2, Jyväskylä, FI-40014, Finland
2019 Complex Systems Informatics and Modeling Quarterly  
Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles that guide  ...  how the enterprise must be designed.  ...  As stated by The Open Group [4, p.1] "for too long, information security has been considered a separate discipline, isolated from the business processes and Enterprise Architecture".  ... 
doi:10.7250/csimq.2019-20.03 fatcat:6wjmeq6bjvhdljnkvbl5znxwaa

Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis

Farzaneh Sadat Jalayer, Akbar Nabiollahi
2016 International Journal of Computer Science & Information Technology (IJCSIT)  
Information security against hacking, altering, corrupting, and divulging data is vital and inevitable and it requires an effective management in every organization.  ...  Some of the upcoming challenges can be the study of available frameworks in Enterprise Information Security Architecture (EISA) as well as criteria extraction in this field.  ...  has been presented with the aim of combining security with enterprise architecture process, and interaction in enterprise information security framework is considered as an enterprise architecture quality  ... 
doi:10.5121/ijcsit.2016.8504 fatcat:cqmv7nijnbdqlaew2cepegimhi

Modeling the linkage between systems interoperability and security engineering

Elena Irina Neaga, Michael J de C. Henshaw
2010 2010 5th International Conference on System of Systems Engineering  
The Security Enterprise Architecture Model SABSA R [11] does not consider enterprise interoperability architectures, levels and layers and this model could not be mapped to the levels of interoperability  ...  borders) is focused on the definition of business goals, modeling business processes and organizational collaboration issues.  ... 
doi:10.1109/sysose.2010.5544056 dblp:conf/sysose/NeagaH10 fatcat:c6gfgus6urgcze7zff2sl5daie

Enterprise Architecture Security Assessment Framework (EASAF)

Bandar Mzel Alshammari
2017 Journal of Computer Science  
Therefore, this paper studies various enterprise architecture frameworks and shows how to develop an enterprise architecture framework that considers the organization's information security from the perspective  ...  The defined framework will be capable of defining Enterprise Architecture security-related principles and metrics.  ...  However, none of these approaches considers security from an early stage of enterprise architecture development.  ... 
doi:10.3844/jcssp.2017.558.571 fatcat:um7fxfthqna2vhwcahuc6432jy

Using FDAF to bridge the gap between enterprise and software architectures for security

Lirong Dai, Kendra Cooper
2007 Science of Computer Programming  
The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns.  ...  This paper focuses on the problem of how to bridge the gap between enterprise and software architectures for security using a set of UML based notations: the Business Modeling Extension for UML, standard  ...  In this work, we focus on the problem of how to bridge the gap between enterprise and early software models (requirements and architecture) to help meet an enterprise's security goals.  ... 
doi:10.1016/j.scico.2006.10.010 fatcat:rf2zj5dpdrbpvmcg3qqvyblrai

Recommendations and Best Practices for Cloud Enterprise Security

Muthu Ramachandran, Victor Chang
2014 2014 IEEE 6th International Conference on Cloud Computing Technology and Science  
This paper presents recommendations for enterprise security to analyze and model Enterprise Cloud organizational security of the Enterprise Cloud and its data.  ...  Enterprise security is essential to achieve global information security in business and organizations.  ...  of security requirements from stakeholders in the forms of interviews, business process modelling and simulations, prototypes, discussion and focus groups.  ... 
doi:10.1109/cloudcom.2014.105 dblp:conf/cloudcom/RamachandranC14 fatcat:ofss7oa3nrbrphj75i4wbk2ody

Security and Business Situational Awareness [chapter]

Roland Rieke, Maria Zhdanova, Jürgen Repp
2015 Communications in Computer and Information Science  
A security information model maintains the security strategy and explains possible deviations from the originating goal.  ...  Operational models of the key processes are utilized to predict critical security states, evaluate possible countermeasures, and trigger corrective actions.  ...  Background An EA meta model describes the organization of an enterprise encompassing multiple views (structural layers), equally focused on business-related elements, such as business goals and processes  ... 
doi:10.1007/978-3-319-25360-2_9 fatcat:b3nvbvkyynfvbcycaobddrbz2q

Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures [chapter]

Nicolas Mayer, Eric Grandry, Christophe Feltus, Elio Goettelmann
2015 Lecture Notes in Business Information Processing  
Given that risk management is not able to deal with this complexity alone, we claim that a connection with Enterprise Architecture Management (EAM) contributes in addressing the above challenges, thereby  ...  However, with the current interconnection between information systems combined with the increasing regulation and compliance requirements, it is more and more difficult to achieve real information security  ...  They propose an information security meta-model and consider the security management process to be performed by security micro-processes executed by domain owners.  ... 
doi:10.1007/978-3-319-19243-7_42 fatcat:iv2sw7zbjvdapazwsqz53nemg4

Usability Elements as Benchmarking Criteria for Enterprise Architecture Methodologies

Amir Bijarchian, Rosmah Ali
2014 Jurnal Teknologi  
An Enterprise Architecture (EA) serves as a blueprint to deal with the complexity within an organisation.  ...  Although there are many methodologies and frameworks in enterprise architecture, each of them does not completely address all enterprise issues.  ...  An Enterprise Architecture is a blueprint to guide the manager and fill the gap between business and IT.  ... 
doi:10.11113/jt.v68.2908 fatcat:v53cjbz3tvbb3nbaiut2ndpyiy

Automated Enterprise Architecture Model Mining [article]

Peter Hillmann, Erik Heiland, Andreas Karcher
2021 arXiv   pre-print
Our new approach enables the automated mining of Enterprise Architecture models.  ...  This is where the Enterprise Architecture Framework comes in. It empowers an organisation to get a clear view of their business, application, technical and physical layer.  ...  The management of enterprise architectures is an iterative process and aims to improve a business-IT alignment.  ... 
arXiv:2108.06696v1 fatcat:qofsuhxjirbxllyxwhrwkyqhau

Security Concepts in IPv6 Based Aeronautical Communications [chapter]

Tommaso Pecorella, Romano Fantacci, Luigia Micciullo, Antonietta Stango, Neeli Prasad, Piotr Pacyna, Norbert Rapacz, Tomasz Chmielecki
2011 Future Aeronautical Communications  
The ADM explains how to derive an organization-specific enterprise architecture that addresses business requirements.  ...  The aggregated architecture data that is represented in all the views from all the viewpoints could be considered a full composite model of the enterprise.  ... 
doi:10.5772/30089 fatcat:fgfugndx75dezbe6is3xoh5sxq

Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ

Erika Nazaruka, Department of Applied Computer Science, Riga Technical University, 1 Setas Str., Riga, LV-1048, Latvia
2020 Complex Systems Informatics and Modeling Quarterly  
information) change process can bring to an enterprise.  ...  Information management strategies consider the scope of information, constrains, security controls and information life cycle [3] .  ...  However, the transformation process requires proper understanding and information-based management of the enterprise architecture.  ... 
doi:10.7250/csimq.2020-24.00 fatcat:rxnhelswurf2xmtophyk5nbrwe

An adaptive authentication and authorization model for service oriented enterprise computing

Mohamed Ibrahim, Dept. of Computer & Information Sciences Universiti Teknologi Petronas , 32610 Seri Iskandar, Malaysia, Beer Mohamed, Mohd Fadzil Hassan, Dept. of Computer & Information Sciences Universiti Teknologi Petronas , 32610 Seri Iskandar, Malaysia, Dept. of Computer & Information Sciences Universiti Teknologi Petronas , 32610 Seri Iskandar, Malaysia
2021 Maǧallaẗ Al-Kuwayt li-l-ʿulūm  
Service oriented enterprise computing is an integration architectural style aimed to expose and consume coarse grained and fine grained modularization of business functionalities as services that are being  ...  It is evident from the results that the proposed security model addresses security issues comparatively better than existing security solutions.  ...  The enterprise application integration (EAI) is an operational business domain driven architectural principle, which is targeted to integrate the set of inter related software applications in an enterprise  ... 
doi:10.48129/kjs.v49i1.10745 fatcat:stn6tjtqjjgyfahpai5vj3ekkq

Security Analysis in the Migration to Cloud Environments

David G. Rosado, Rafael Gómez, Daniel Mellado, Eduardo Fernández-Medina
2012 Future Internet  
However, the architectures required by service providers to enable Web 2.0 has created an IT service that is differentiated by resilience, scalability, reusability, interoperability, security and open  ...  aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems.  ...  The initiatives are obtained from the main topics found on the approaches analyzed of the review carried out about migration processes to Cloud.  ... 
doi:10.3390/fi4020469 fatcat:h7kswplimnd4fnmowr3xxdttkq
« Previous Showing results 1 — 15 out of 53,223 results