Search For:

Displaying 1-24 out of 24 total
Message from the TEAR 2013 Workshop Chairs
Found in: 2013 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW)
By Joao Paulo A. Almeida,Mathias Ekstedt,James Lapalme
Issue Date:September 2013
pp. 287-288
This paper gives a brief overview of the 8th Workshop on Trends in Enterprise Architecture Research (TEAR) held at EDOC 2013. The paper introduces the Workshop research topics and presents the accepted papers.
 
Effort Estimates on Web Application Vulnerability Discovery
Found in: 2013 46th Hawaii International Conference on System Sciences (HICSS)
By Hannes Holm,Mathias Ekstedt,Teodor Sommestad
Issue Date:January 2013
pp. 5029-5038
Web application vulnerabilities are widely considered a serious concern. However, there are as of yet scarce data comparing the effectiveness of different security countermeasures or detailing the magnitude of the security issues associated with web applic...
   
Empirical Analysis of System-Level Vulnerability Metrics through Actual Attacks
Found in: IEEE Transactions on Dependable and Secure Computing
By Hannes Holm,Mathias Ekstedt,Dennis Andersson
Issue Date:November 2012
pp. 825-837
The Common Vulnerability Scoring System (CVSS) is a widely used and well-established standard for classifying the severity of security vulnerabilities. For instance, all vulnerabilities in the US National Vulnerability Database (NVD) are scored according t...
 
Where's the Theory for Software Engineering?
Found in: IEEE Software
By Pontus Johnson,Mathias Ekstedt,Ivar Jacobson
Issue Date:September 2012
pp. 96
Darwin's theory of natural selection, Maxwell's equations, the theory of demand and supply; almost all established academic disciplines place great emphasis on what their core theory is. This is not, however, the case in software engineering. What is the r...
 
Challenges in Power System Information Security
Found in: IEEE Security & Privacy Magazine
By György Dán,Henrik Sandberg,Mathias Ekstedt,Gunnar Björkman
Issue Date:July 2012
pp. 62-70
Achieving all-encompassing component-level security in power system IT infrastructures is difficult, owing to its cost and potential performance implications.
 
Effort Estimates for Vulnerability Discovery Projects
Found in: Hawaii International Conference on System Sciences
By Teodor Sommestad,Hannes Holm,Mathias Ekstedt
Issue Date:January 2012
pp. 5564-5573
Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This paper analyzes estimates from domain experts on the amount of effort required for a penetration teste...
   
Estimates of Success Rates of Denial-of-Service Attacks
Found in: IEEE TrustCom/IEEE ICESS/FCST, International Joint Conference of
By Teodor Sommestad,Hannes Holm,Mathias Ekstedt
Issue Date:November 2011
pp. 21-28
Denial-of-service (DoS) attacks are an imminent and real threat to many enterprises. Decision makers in these enterprises need be able to assess the risk associated with such attacks and to make decisions regarding measures to put in place to increase the ...
 
Enterprise Architecture Meta Models for IT/Business Alignment Situations
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Jan Saat, Ulrik Franke, Robert Lagerström, Mathias Ekstedt
Issue Date:October 2010
pp. 14-23
Enterprise Architecture models can be used to support IT/business alignment. However, existing approaches do not distinguish between different IT/business alignment situations. Since companies face diverse challenges in achieving a high degree of IT/busine...
 
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Johan König, Kun Zhu, Lars Nordström, Mathias Ekstedt, Robert Lagerström
Issue Date:October 2010
pp. 60-68
This paper presents a mapping between the Enterprise Architecture framework ArchiMate and the Substation Configuration Language (SCL) of IEC 61850. Enterprise Architecture (EA) is a discipline for managing an enterprise’s information system portfolio in re...
 
Enterprise Architecture Analysis for Data Accuracy Assessments
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Per Närman, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine, Johan König
Issue Date:September 2009
pp. 24-33
Poor data in information systems impede the quality of decision-making in many modern organizations. Manual business process activities and application services are never executed flawlessly which results in steadily deteriorating data accuracy, the furthe...
 
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks
Found in: Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, ACIS International Conference on
By Ulrik Franke, David Höök, Johan König, Robert Lagerström, Per Närman, Johan Ullberg, Pia Gustafsson, Mathias Ekstedt
Issue Date:May 2009
pp. 327-332
What constitutes an enterprise architecture framework is a contested subject. The contents of present enterprise architecture frameworks thus differ substantially. This paper aims to alleviate the confusion regarding which framework contains what by propos...
 
A Method for Choosing Software Assessment Measures Using Bayesian Networks and Diagnosis
Found in: Software Maintenance and Reengineering, European Conference on
By Ulrik Franke, Pontus Johnson, Robert Lagerström, Johan Ullberg, David Höök, Mathias Ekstedt, Johan König
Issue Date:March 2009
pp. 241-246
Creating accurate models of information systems is an important but challenging task. While the scientific aspects of such modeling are generally acknowledged, the monetary aspects of the modeling of software systems are not. The present paper describes a ...
 
A Tool for Enterprise Architecture Analysis of Maintainability
Found in: Software Maintenance and Reengineering, European Conference on
By Mathias Ekstedt, Ulrik Franke, Pontus Johnson, Robert Lagerström, Teodor Sommestad, Johan Ullberg, Markus Buschle
Issue Date:March 2009
pp. 327-328
A tool for Enterprise Architecture analysis using a probabilistic mathematical framework is demonstrated. The Model-View-Controller tool architecture is outlined, before the use of the tool is considered. A sample abstract maintainability model is created,...
 
Using Enterprise Architecture Models for System Quality Analysis
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Per Närman, Marten Schönherr, Pontus Johnson, Mathias Ekstedt, Moustafa Chenine
Issue Date:September 2008
pp. 14-23
Enterprise Architecture is a model-based approach to business-oriented IT management. To promote good IT decision making, an Enterprise Architecture framework needs to explicate what kind of analyses it supports. Since creating Enterprise Architecture mode...
 
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis
Found in: Enterprise Distributed Object Computing Conference, IEEE International
By Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
Issue Date:September 2008
pp. 349-355
Security is dependent on a mixture of interrelated concepts such as technical countermeasures, organizational policies, security procedures, and more. To facilitate rational decision making, these concepts need to be combined into an overall judgment on th...
 
Strategic Business and IT Alignment Assessment: A Case Study Applying an Enterprise Architecture-Based Metamodel
Found in: Hawaii International Conference on System Sciences
By Leonel Plazaola, Johnny Flores, Norman Vargas, Mathias Ekstedt
Issue Date:January 2008
pp. 398
Strategic Business and IT Alignment (SBITA) is still ranked amongst the top concerns of the enterprise's management executives. Such alignment is an organization-wide issue that influences the company's overall performance and its assessment is a fundament...
   
A Consolidated Strategic Business and IT Alignment Representation:? A Framework Aggregated From Literature
Found in: Hawaii International Conference on System Sciences
By Norman Vargas, Leonel Plazaola, Mathias Ekstedt
Issue Date:January 2008
pp. 397
Strategic Business and Information Technology Alignment (SBITA) has been linked to enterprise performance improvement. A number of attempts have been made to define the SBITA, several representations on what business and IT alignment are available in acade...
   
In Search of a Unified Theory of Software Engineering
Found in: Software Engineering Advances, International Conference on
By Pontus Johnson, Mathias Ekstedt
Issue Date:August 2007
pp. 1
<p>Highly successful scientific disciplines have at least one common denominator; they have developed unified theories that span a large set of phenomena within the discipline. The discipline of software engineering today features a multitude of disp...
 
Assessment of Enterprise Information Security — The Importance of Information Search Cost
Found in: Hawaii International Conference on System Sciences
By Erik Johansson, Mathias Ekstedt, Pontus Johnson
Issue Date:January 2006
pp. 219a
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they neither provide an indication of the amount of effort required to obtain the ...
   
Consistent Enterprise Software System Architecture for the CIO — A Utility-Cost Based Approach
Found in: Hawaii International Conference on System Sciences
By Mathias Ekstedt, Pontus Johnson, Åsa Lindström, Magnus Gammelgård, Erik Johansson, Leonel Plazaola, Enrique Silva, Joakim Liliesköld
Issue Date:January 2004
pp. 80225a
<p>Previously, business operations of most large companies were supported by a number of isolated software systems performing diverse specific tasks, from real-time process control to administrative functions. In order to better achieve business goal...
   
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
Found in: Hawaii International Conference on System Sciences
By Teodor Sommestad, Mathias Ekstedt, Pontus Johnson
Issue Date:January 2009
pp. 1-10
To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after potential investments. This paper presents a model based assessment framework for analyzing the cyber se...
   
Enterprise Architecture Management's Impact on Information Technology Success
Found in: Hawaii International Conference on System Sciences
By Robert Lagerstrom, Teodor Sommestad, Markus Buschle, Mathias Ekstedt
Issue Date:January 2011
pp. 1-10
Both practitioners and researchers put forward enterprise architecture management as a mean for achieving success with information technology. Many arguments have been put forward to support the benefits claimed to arise from mature enterprise architecture...
   
Analysis of IT/Business Alignment Situations as a Precondition for the Design and Engineering of Situated IT/Business Alignment Solutions
Found in: Hawaii International Conference on System Sciences
By Jan Saat, Robert Winter, Ulrik Franke, Robert Lagerstrom, Mathias Ekstedt
Issue Date:January 2011
pp. 1-9
IT/business alignment has constantly been among the top priorities for IT executives. From a prescriptive, design research perspective, our analysis of related work shows that neither is IT/business alignment sufficiently specified to allow systematic arti...
   
A framework for interoperability analysis on the semantic web using architecture models
Found in: Enterprise Distributed Object Computing Conference Workshops, IEEE International
By Johan Ullberg, Robert Lagerström, Mathias Ekstedt
Issue Date:September 2008
pp. 207-215
IT decision making requires analysis of possible future scenarios. The quality of the decisions can be enhanced by the use of architecture models that increase the understanding of the components of the system scenario. It is desirable that the created mod...
 
 1