Architectural Alignment of Access Control Requirements Extracted from Business Processes

Download Architectural Alignment of Access Control Requirements Extracted from Business Processes PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 3731512122
Total Pages : 366 pages
Book Rating : 4.27/5 ( download)

DOWNLOAD NOW!


Book Synopsis Architectural Alignment of Access Control Requirements Extracted from Business Processes by : Pilipchuk, Roman

Download or read book Architectural Alignment of Access Control Requirements Extracted from Business Processes written by Pilipchuk, Roman and published by KIT Scientific Publishing. This book was released on 2023-01-27 with total page 366 pages. Available in PDF, EPUB and Kindle. Book excerpt: Business processes and information systems evolve constantly and affect each other in non-trivial ways. Aligning security requirements between both is a challenging task. This work presents an automated approach to extract access control requirements from business processes with the purpose of transforming them into a) access permissions for role-based access control and b) architectural data flow constraints to identify violations of access control in enterprise application architectures.

Architectural Alignment of Access Control Requirements Extracted from Business Processes

Download Architectural Alignment of Access Control Requirements Extracted from Business Processes PDF Online Free

Author :
Publisher :
ISBN 13 :
Total Pages : pages
Book Rating : 4.74/5 ( download)

DOWNLOAD NOW!


Book Synopsis Architectural Alignment of Access Control Requirements Extracted from Business Processes by : Roman Pilipchuk

Download or read book Architectural Alignment of Access Control Requirements Extracted from Business Processes written by Roman Pilipchuk and published by . This book was released on 2021 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Evaluating Architectural Safeguards for Uncertain AI Black-Box Components

Download Evaluating Architectural Safeguards for Uncertain AI Black-Box Components PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 373151320X
Total Pages : 472 pages
Book Rating : 4.09/5 ( download)

DOWNLOAD NOW!


Book Synopsis Evaluating Architectural Safeguards for Uncertain AI Black-Box Components by : Scheerer, Max

Download or read book Evaluating Architectural Safeguards for Uncertain AI Black-Box Components written by Scheerer, Max and published by KIT Scientific Publishing. This book was released on 2023-10-23 with total page 472 pages. Available in PDF, EPUB and Kindle. Book excerpt: Although tremendous progress has been made in Artificial Intelligence (AI), it entails new challenges. The growing complexity of learning tasks requires more complex AI components, which increasingly exhibit unreliable behaviour. In this book, we present a model-driven approach to model architectural safeguards for AI components and analyse their effect on the overall system reliability.

A Reference Structure for Modular Model-based Analyses

Download A Reference Structure for Modular Model-based Analyses PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 3731513412
Total Pages : 398 pages
Book Rating : 4.14/5 ( download)

DOWNLOAD NOW!


Book Synopsis A Reference Structure for Modular Model-based Analyses by : Koch, Sandro Giovanni

Download or read book A Reference Structure for Modular Model-based Analyses written by Koch, Sandro Giovanni and published by KIT Scientific Publishing. This book was released on 2024-04-25 with total page 398 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this work, the authors analysed the co-dependency between models and analyses, particularly the structure and interdependence of artefacts and the feature-based decomposition and composition of model-based analyses. Their goal is to improve the maintainability of model-based analyses. They have investigated the co-dependency of Domain-specific Modelling Languages (DSMLs) and model-based analyses regarding evolvability, understandability, and reusability.

Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

Download Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 3731512467
Total Pages : 412 pages
Book Rating : 4.62/5 ( download)

DOWNLOAD NOW!


Book Synopsis Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements by : Seifermann, Stephan

Download or read book Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements written by Seifermann, Stephan and published by KIT Scientific Publishing. This book was released on 2022-12-09 with total page 412 pages. Available in PDF, EPUB and Kindle. Book excerpt: Software vendors must consider confidentiality especially while creating software architectures because decisions made here are hard to change later. Our approach represents and analyzes data flows in software architectures. Systems specify data flows and confidentiality requirements specify limitations of data flows. Software architects use detected violations of these limitations to improve the system. We demonstrate how to integrate our approach into existing development processes.

Architecture-based Evolution of Dependable Software-intensive Systems

Download Architecture-based Evolution of Dependable Software-intensive Systems PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 3731512947
Total Pages : 154 pages
Book Rating : 4.43/5 ( download)

DOWNLOAD NOW!


Book Synopsis Architecture-based Evolution of Dependable Software-intensive Systems by : Heinrich, Robert

Download or read book Architecture-based Evolution of Dependable Software-intensive Systems written by Heinrich, Robert and published by KIT Scientific Publishing. This book was released on 2023-06-05 with total page 154 pages. Available in PDF, EPUB and Kindle. Book excerpt: This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.

Consistent View-Based Management of Variability in Space and Time

Download Consistent View-Based Management of Variability in Space and Time PDF Online Free

Author :
Publisher : KIT Scientific Publishing
ISBN 13 : 3731512416
Total Pages : 310 pages
Book Rating : 4.17/5 ( download)

DOWNLOAD NOW!


Book Synopsis Consistent View-Based Management of Variability in Space and Time by : Ananieva, Sofia

Download or read book Consistent View-Based Management of Variability in Space and Time written by Ananieva, Sofia and published by KIT Scientific Publishing. This book was released on 2022-12-06 with total page 310 pages. Available in PDF, EPUB and Kindle. Book excerpt: Developing variable systems faces many challenges. Dependencies between interrelated artifacts within a product variant, such as code or diagrams, across product variants and across their revisions quickly lead to inconsistencies during evolution. This work provides a unification of common concepts and operations for variability management, identifies variability-related inconsistencies and presents an approach for view-based consistency preservation of variable systems.

COBIT 5 for Information Security

Download COBIT 5 for Information Security PDF Online Free

Author :
Publisher : ISACA
ISBN 13 : 1604202548
Total Pages : 220 pages
Book Rating : 4.40/5 ( download)

DOWNLOAD NOW!


Book Synopsis COBIT 5 for Information Security by : ISACA

Download or read book COBIT 5 for Information Security written by ISACA and published by ISACA. This book was released on 2012 with total page 220 pages. Available in PDF, EPUB and Kindle. Book excerpt: COBIT 5 provides a comprehensive framework that assists enterprises in achieving their objectives for the governance and management of enterprise IT. COBIT 5 enables IT to be governed and managed in a holistic manner for the entire enterprise, taking into account the full end-to-end business and IT functional areas of responsibility, considering IT-related interests of internal and external stakeholders.

Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services

Download Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services PDF Online Free

Author :
Publisher : Logos Verlag Berlin GmbH
ISBN 13 : 3832557083
Total Pages : 272 pages
Book Rating : 4.89/5 ( download)

DOWNLOAD NOW!


Book Synopsis Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services by : Michael Middelhoff

Download or read book Secure-by-Design Enterprise Architectures and Business Processes in Supply Chains. Handling Threats from Physical Transport Goods in Parcel Mail Services written by Michael Middelhoff and published by Logos Verlag Berlin GmbH. This book was released on with total page 272 pages. Available in PDF, EPUB and Kindle. Book excerpt: Supply chain security encompasses measures preventing theft, smuggling, and sabotage through heightened awareness, enhanced visibility, and increased transparency. This necessitates the adoption of a security-by-design paradigm to achieve effective and efficient security measures, yielding additional benefits such as diminished supply chain costs. Given their vulnerability, transportation and logistics service providers play a pivotal role in supply chain security. This thesis leverages systems security engineering and security-by-design to provide a methodology for designing and evaluating security measures for physical transport goods. It formulates nine principles that define security-by-design and establishes a supply chain security framework. An adaptation of the TOGAF architecture development facilitates the creation of secure-by-design enterprise architectures. Security measures are documented using security-enhanced processes based on BPMN. This enables an analysis and compliance assessment to ascertain the alignment of security with business objectives and the adequate implementation of requirements. The culmination of these efforts is exemplified through a case study.

Advances in Government Enterprise Architecture

Download Advances in Government Enterprise Architecture PDF Online Free

Author :
Publisher : IGI Global
ISBN 13 : 1605660698
Total Pages : 502 pages
Book Rating : 4.91/5 ( download)

DOWNLOAD NOW!


Book Synopsis Advances in Government Enterprise Architecture by : Saha, Pallab

Download or read book Advances in Government Enterprise Architecture written by Saha, Pallab and published by IGI Global. This book was released on 2008-11-30 with total page 502 pages. Available in PDF, EPUB and Kindle. Book excerpt: Presents current developments, issues, and trends in enterprise architecture (EA). Provides insights into the impact of effective EA on IT governance, IT portfolio management, and IT outsourcing.