Learn More
Enterprise Architecture Management (EAM) is the practice of modeling the business and IT artifacts in an enterprise and relating them with each other. By documenting these interdependencies between business and the supporting IT, strategic decisions can be made towards a planned and consolidated enterprise architecture that matches the business needs.(More)
We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trust worthy client-side application environment. We(More)
Creating and maintaining an enterprise architecture model that is both up-to-date and accurate is a difficult task due to the size and complexity of the models and the dispersed nature of EA information in organizations. In current EA maintenance processes, the models are maintained manually with only little automation, which is a time consuming task.(More)
Trust and assurance of mobile platforms is a prime objective when considering their deployment to security-critical scenarios in e.g., healthcare or e-government. Currently, several complementary approaches are being pursued in parallel, ranging from purely hardware based, to operating system level, and application level solutions. Together , they build a "(More)
Enterprise Architecture Management (EAM), and in particular IT--landscape management try to model the IT- and business elements of a company, in order to analyze its efficiency towards supporting business goals, optimize business--IT alignment, and to plan future IT--transformation as well as IT--standardization. A major challenge in this field is the(More)
Security testing is very important to assure ac ertain levelo fr eliability in as ystem. On the system level, security testing has to guarantee that security requirements such as confidentiality ,i ntegrity,a uthentication, authorization, availability and non-repudiation hold. In this paper,w e present an approach to system levelsecurity testing of service(More)