Corpus ID: 4632955

Developing a Semantic Mapping between TOGAF and BSI-IT-Grundschutz

@inproceedings{Mathew2018DevelopingAS,
  title={Developing a Semantic Mapping between TOGAF and BSI-IT-Grundschutz},
  author={Delin Mathew and Simon Hacks and Horst Lichter},
  year={2018}
}
Enterprise Architecture Frameworks (EAFs) are being employed vastly within various organizations in recent years. Moreover, due to the high prevalence of information technology in the enterprises, Information Security (IS) was incorporated into the EAFs. Therefore, it gradually became important for the EAFs to conform to the IS standards such as the ISO and the BSI series. In this paper, we present a mapping of such an EAF, called The Open Group Architecture Framework (TOGAF), to an IS standard… Expand
Integrating Security Behavior into Attack Simulations
TLDR
The authors present an approach for integrating user actions, so called “security behavior”, by mapping SBA to a MAL-based language through MITRE ATT&CK techniques. Expand

References

SHOWING 1-10 OF 20 REFERENCES
Mapping the Substation Configuration Language of IEC 61850 to ArchiMate
TLDR
The mapping is intended to support the integration of SA systems applying IEC 61850 into the enterprise architecture and is demonstrated with an example applying the mapping to a SA configuration based on SCL. Expand
Mapping the Enterprise Architecture Principles in TOGAF to the Cybernetic Concepts--An Exploratory Study
TLDR
Whether the principles of cybernetics can provide a theoretical basis for interpreting Enterprise Architecture principles derived through practice is explored and possible shortfalls in the existing set of principles are identified. Expand
An enterprise architecture mapping approach for realizing e-government
TLDR
The paper proposes an EA benchmarking model based on a dual mapping approach that is on Zachman framework and the Software Development Lifecycle (SDLC) that aims at providing guidelines for the selection of an EA framework and identifying the framework that is best aligned with stakeholders' needs. Expand
Automatic data collection for enterprise architecture models
TLDR
Network scanning for automatic data collection is proposed and an existing software tool for generating EA models is used based on the IT infrastructure of enterprises to show that the methodology is accurate and (in its default state) require little effort to carry out. Expand
EAF2- A Framework for Categorizing Enterprise Architecture Frameworks
  • U. Franke, David Höök, +5 authors M. Ekstedt
  • Computer Science
  • 2009 10th ACIS International Conference on Software Engineering, Artificial Intelligences, Networking and Parallel/Distributed Computing
  • 2009
TLDR
This paper aims to alleviate the confusion regarding which framework contains what by proposing a meta framework for enterprise architecture frameworks by using this meta framework to express their requirements on what their enterprise architecture framework must contain and also to evaluate whether the existing frameworks meets these requirements. Expand
Composition of Relations in Enterprise Architecture Models
TLDR
A general approach to derive an operator that allows for the composition of relations in architecture description languages is presented, which opens the door for the creation of more modelling flexibility, by allowing to leave out certain details, and automated abstraction and complexity reduction of models facilitating stakeholder-specific visualisations. Expand
Designing enterprise architecture framework for non-cloud to cloud migration using TOGAF, CCRM, and CRMM
Cloud computing paradigm motivates many companies to adopt and use cloud services to take advantage of the inherent characteristics. Increasing number of companies are adopting cloud computing, butExpand
Enterprise information security architecture a review of frameworks, methodology, and case studies
  • S. Oda, Huirong Fu, Ye Zhu
  • Computer Science
  • 2009 2nd IEEE International Conference on Computer Science and Information Technology
  • 2009
TLDR
This paper will identify Oakland University's current security architecture, compare it to industry standards and best practices, and make recommendations to develop an ideal-world framework. Expand
The Roles of Principles in Enterprise Architecture
TLDR
The role of principles in the field of enterprise architecture is focused on, where it is positioned as a means to direct enterprise transformations. Expand
Mapping service concept and enterprise ontology in service identification
TLDR
This paper has tried to provide a semantic context of service in service identification phase by using existing knowledge in different service identification methods and definitions about services in SOA, and using enterprise ontology, as a tool for modeling enterprise, to display concepts and aspects of service that can be mapped to concepts of enterpriseOntology. Expand
...
1
2
...