Learn More
We present an approach to modeling and enforcing usage control requirements on remote clients in service-oriented architectures. Technically, this is done by leveraging a trusted software stack relying on a hardware-based root of trust and a trusted Java virtual machine to create a measurable and hence trust worthy client-side application environment. We(More)
—Creating and maintaining an enterprise architecture model that is both up-to-date and accurate is a difficult task due to the size and complexity of the models and the dispersed nature of EA information in organizations. In current EA maintenance processes, the models are maintained manually with only little automation, which is a time consuming task.(More)
Enterprise Architecture Management (EAM) is the practice of modeling the business and IT artifacts in an enterprise and relating them with each other. By documenting these interdependencies between business and the supporting IT, strategic decisions can be made towards a planned and consolidated enterprise architecture that matches the business needs.(More)
Trust and assurance of mobile platforms is a prime objective when considering their use in security-critical scenarios like in healthcare or e-government. Currently, several complementary approaches can be found in literature, ranging from purely hardware based to operating system level and application level solutions. Together, they build a "trusted and(More)
—Enterprise Architecture Management (EAM), and in particular IT–landscape management try to model the IT-and business elements of a company, in order to analyze its efficiency towards supporting business goals, optimize business–IT alignment, and to plan future IT–transformation as well as IT– standardization. A major challenge in this field is the(More)