2019
DOI: 10.1007/978-3-030-35151-9_15
|View full text |Cite
|
Sign up to set email alerts
|

Cybersecurity Evaluation of Enterprise Architectures: The e-SENS Case

Abstract: Technology management through enterprise architectures has already become a widespread practice across large enterprises. Modeling and evaluating the cybersecurity aspect of it, however, has just begun to get the needed attention. This paper presents а cybersecurity evaluation methodology developed for the reference architecture of the e-SENS project and derives a generic framework for cybersecurity evaluation of an enterprise architecture. The evaluation addresses both the high-level design artefacts (the ref… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Further research and efforts from the side of government actors are needed to successfully implement the OOP across borders. The TOOP project provides a great federated architecture [28,44] for enabling the provision of OOP solutions across borders. This architecture is picked up and further developed in the DE4ALL project [8].…”
Section: Discussionmentioning
confidence: 99%
“…Further research and efforts from the side of government actors are needed to successfully implement the OOP across borders. The TOOP project provides a great federated architecture [28,44] for enabling the provision of OOP solutions across borders. This architecture is picked up and further developed in the DE4ALL project [8].…”
Section: Discussionmentioning
confidence: 99%
“…Ebbers et al [29] use EA models to aggregate vulnerabilities from assets to a level of relevance for the management. Lastly, Pavleska et al [34] took EA models in a health context and transferred them by hand to securiCAD to perform security analysis. Similarly, Jiang et al [35] did with models from the power domain.…”
Section: Related Workmentioning
confidence: 99%
“…In an analysis of drivers and barriers for OOP implementation in the SCOOP4C project, trust is stressed as underlying condition [12], [38], [39]. In the TOOP project, trust is addressed with a technical approach by defining a trust architecture as part of the system design [40], [41]. In a broader perspective, TOOP also links the question of trust to the organizational culture of government agencies.…”
Section: Political Significance Of Data-driven Transformation With Th...mentioning
confidence: 99%