Ontology-based security modeling in ArchiMate

Í Oliveira, TP Sales, JPA Almeida, R Baratella… - Software and systems …, 2024 - Springer
Abstract Enterprise Risk Management involves the process of identification, evaluation,
treatment, and communication regarding risks throughout the enterprise. To support the …

Obtaining secure business process models from an enterprise architecture considering security requirements

L San Martín, A Rodríguez, A Caro… - Business Process …, 2022 - emerald.com
Purpose Security requirements play an important role in software development. These can
be specified both in enterprise architecture models and in business processes. Enterprises …

Measuring and achieving test coverage of attack simulations extended version

S Hacks, L Persson, N Hersén - Software and Systems Modeling, 2023 - Springer
Designing secure and reliable systems is a difficult task. Threat modeling is a process that
supports the secure design of systems by easing the understanding of the system's …

Develo** an access control management metamodel for secure digital enterprise architecture modeling

K Nahar, AQ Gill, T Roach - Security and Privacy, 2021 - Wiley Online Library
There is an increasing interest in embedding the security in the design of digital enterprise
architecture (EA) modeling platform to secure the digital assets. Access control management …

Analyzing enterprise architecture models by means of the meta attack language

A Aldea, S Hacks - International Conference on Advanced Information …, 2022 - Springer
The digital transformation exposes organizations to new threats endangering their business.
A way to uncover these threats is threat modeling and attack simulations. However …

[PDF][PDF] An Ontological Approach to Security Modeling

Í Oliveira - 2024 - researchgate.net
This thesis contributes to the definition of general ontological foundations for security
modeling, that is, conceptual modeling activities within the security domain. In this chapter …

[PDF][PDF] A pragmatic Mission-centric Approach to ICT Risk and Security–Autonomous Vehicles as a Case

F Mancini - Proceedings of the 33rd European Safety and …, 2023 - rpsonline.com.sg
Cyber security in the military domain has long been characterized by the focus on data
confidentiality protection through strong system isolation and cryptography. Current warfare …

[PDF][PDF] Automating Enterprise Cyber Threat Modeling

C Benson - 2024 - adelphi.edu
Enterprises must keep their businesses safe from hostile actors, regardless of size.
Protecting an enterprise benefits from creating and maintaining large-scale cyber threat …

Modelling the 2021 Microsoft Exchange Server Data Breach in ArchiMate

A Konça - 2024 - essay.utwente.nl
In the field of enterprise architecture, enterprise architects and risk and security analysts use
various modelling applications to demonstrate how the business goals of an organization …

An Object-Event Simulation Approach to Simulation of ArchiMate Models

M Ploeg - 2024 - essay.utwente.nl
Simulation is a frequently used tool in enterprise management, with Object-Event Simulation
(OES), a discrete-event simulation paradigm, being one option. However, in current …