A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using an Enterprise Architecture for IT Risk Management
2006
Information Security for South Africa
The approach is model-driven using an enterprise architecture as the basis for the security management process. ...
Using an enterprise architecture it is possible to provide an integrated description of an organisation's structure, processes and its underlying IT landscape. ...
A Security Requirement must be linked with either the main Business Security Objective of a dependency graph or it has to be derived from another Security Requirement of an upper layer model element. ...
dblp:conf/issa/Innerhofer-OberperflerB06
fatcat:aykkglurjzeznn3g3hfnilbgje
Method Framework for Developing Enterprise Architecture Security Principles
2019
Complex Systems Informatics and Modeling Quarterly
Enterprise Architecture Management (EAM) offers a holistic approach for managing different dimensions of an organization, and can be conceived as a coherent and consistent set of principles that guide ...
how the enterprise must be designed. ...
As stated by The Open Group [4, p.1] "for too long, information security has been considered a separate discipline, isolated from the business processes and Enterprise Architecture". ...
doi:10.7250/csimq.2019-20.03
fatcat:6wjmeq6bjvhdljnkvbl5znxwaa
Ranking Criteria of Enterprise Information Security Architecture Using Fuzzy Topsis
2016
International Journal of Computer Science & Information Technology (IJCSIT)
Information security against hacking, altering, corrupting, and divulging data is vital and inevitable and it requires an effective management in every organization. ...
Some of the upcoming challenges can be the study of available frameworks in Enterprise Information Security Architecture (EISA) as well as criteria extraction in this field. ...
has been presented with the aim of combining security with enterprise architecture process, and interaction in enterprise information security framework is considered as an enterprise architecture quality ...
doi:10.5121/ijcsit.2016.8504
fatcat:cqmv7nijnbdqlaew2cepegimhi
Modeling the linkage between systems interoperability and security engineering
2010
2010 5th International Conference on System of Systems Engineering
The Security Enterprise Architecture Model SABSA R [11] does not consider enterprise interoperability architectures, levels and layers and this model could not be mapped to the levels of interoperability ...
borders) is focused on the definition of business goals, modeling business processes and organizational collaboration issues. ...
doi:10.1109/sysose.2010.5544056
dblp:conf/sysose/NeagaH10
fatcat:c6gfgus6urgcze7zff2sl5daie
Enterprise Architecture Security Assessment Framework (EASAF)
2017
Journal of Computer Science
Therefore, this paper studies various enterprise architecture frameworks and shows how to develop an enterprise architecture framework that considers the organization's information security from the perspective ...
The defined framework will be capable of defining Enterprise Architecture security-related principles and metrics. ...
However, none of these approaches considers security from an early stage of enterprise architecture development. ...
doi:10.3844/jcssp.2017.558.571
fatcat:um7fxfthqna2vhwcahuc6432jy
Using FDAF to bridge the gap between enterprise and software architectures for security
2007
Science of Computer Programming
The vision, strategies, and goals of enterprises involve numerous security issues; these stem from legal and business concerns. ...
This paper focuses on the problem of how to bridge the gap between enterprise and software architectures for security using a set of UML based notations: the Business Modeling Extension for UML, standard ...
In this work, we focus on the problem of how to bridge the gap between enterprise and early software models (requirements and architecture) to help meet an enterprise's security goals. ...
doi:10.1016/j.scico.2006.10.010
fatcat:rf2zj5dpdrbpvmcg3qqvyblrai
Recommendations and Best Practices for Cloud Enterprise Security
2014
2014 IEEE 6th International Conference on Cloud Computing Technology and Science
This paper presents recommendations for enterprise security to analyze and model Enterprise Cloud organizational security of the Enterprise Cloud and its data. ...
Enterprise security is essential to achieve global information security in business and organizations. ...
of security requirements from stakeholders in the forms of interviews, business process modelling and simulations, prototypes, discussion and focus groups. ...
doi:10.1109/cloudcom.2014.105
dblp:conf/cloudcom/RamachandranC14
fatcat:ofss7oa3nrbrphj75i4wbk2ody
Security and Business Situational Awareness
[chapter]
2015
Communications in Computer and Information Science
A security information model maintains the security strategy and explains possible deviations from the originating goal. ...
Operational models of the key processes are utilized to predict critical security states, evaluate possible countermeasures, and trigger corrective actions. ...
Background An EA meta model describes the organization of an enterprise encompassing multiple views (structural layers), equally focused on business-related elements, such as business goals and processes ...
doi:10.1007/978-3-319-25360-2_9
fatcat:b3nvbvkyynfvbcycaobddrbz2q
Towards the ENTRI Framework: Security Risk Management Enhanced by the Use of Enterprise Architectures
[chapter]
2015
Lecture Notes in Business Information Processing
Given that risk management is not able to deal with this complexity alone, we claim that a connection with Enterprise Architecture Management (EAM) contributes in addressing the above challenges, thereby ...
However, with the current interconnection between information systems combined with the increasing regulation and compliance requirements, it is more and more difficult to achieve real information security ...
They propose an information security meta-model and consider the security management process to be performed by security micro-processes executed by domain owners. ...
doi:10.1007/978-3-319-19243-7_42
fatcat:iv2sw7zbjvdapazwsqz53nemg4
Usability Elements as Benchmarking Criteria for Enterprise Architecture Methodologies
2014
Jurnal Teknologi
An Enterprise Architecture (EA) serves as a blueprint to deal with the complexity within an organisation. ...
Although there are many methodologies and frameworks in enterprise architecture, each of them does not completely address all enterprise issues. ...
An Enterprise Architecture is a blueprint to guide the manager and fill the gap between business and IT. ...
doi:10.11113/jt.v68.2908
fatcat:v53cjbz3tvbb3nbaiut2ndpyiy
Automated Enterprise Architecture Model Mining
[article]
2021
arXiv
pre-print
Our new approach enables the automated mining of Enterprise Architecture models. ...
This is where the Enterprise Architecture Framework comes in. It empowers an organisation to get a clear view of their business, application, technical and physical layer. ...
The management of enterprise architectures is an iterative process and aims to improve a business-IT alignment. ...
arXiv:2108.06696v1
fatcat:qofsuhxjirbxllyxwhrwkyqhau
Security Concepts in IPv6 Based Aeronautical Communications
[chapter]
2011
Future Aeronautical Communications
The ADM explains how to derive an organization-specific enterprise architecture that addresses business requirements. ...
The aggregated architecture data that is represented in all the views from all the viewpoints could be considered a full composite model of the enterprise. ...
doi:10.5772/30089
fatcat:fgfugndx75dezbe6is3xoh5sxq
Selected Topics on Information Management in Complex Systems: Editorial Introduction to Issue 24 of CSIMQ
2020
Complex Systems Informatics and Modeling Quarterly
information) change process can bring to an enterprise. ...
Information management strategies consider the scope of information, constrains, security controls and information life cycle [3] . ...
However, the transformation process requires proper understanding and information-based management of the enterprise architecture. ...
doi:10.7250/csimq.2020-24.00
fatcat:rxnhelswurf2xmtophyk5nbrwe
An adaptive authentication and authorization model for service oriented enterprise computing
2021
Maǧallaẗ Al-Kuwayt li-l-ʿulūm
Service oriented enterprise computing is an integration architectural style aimed to expose and consume coarse grained and fine grained modularization of business functionalities as services that are being ...
It is evident from the results that the proposed security model addresses security issues comparatively better than existing security solutions. ...
The enterprise application integration (EAI) is an operational business domain driven architectural principle, which is targeted to integrate the set of inter related software applications in an enterprise ...
doi:10.48129/kjs.v49i1.10745
fatcat:stn6tjtqjjgyfahpai5vj3ekkq
Security Analysis in the Migration to Cloud Environments
2012
Future Internet
However, the architectures required by service providers to enable Web 2.0 has created an IT service that is differentiated by resilience, scalability, reusability, interoperability, security and open ...
aim of finding the needs, concerns, requirements, aspects, opportunities and benefits of security in the migration process of legacy systems. ...
The initiatives are obtained from the main topics found on the approaches analyzed of the review carried out about migration processes to Cloud. ...
doi:10.3390/fi4020469
fatcat:h7kswplimnd4fnmowr3xxdttkq
« Previous
Showing results 1 — 15 out of 53,223 results