Search Results - "Sommestad, T."

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams by Sommestad, T., Ekstedt, M., Nordstrom, L.

    Published in IEEE transactions on power delivery (01-10-2009)
    “…The purpose of this paper is to present a framework for assessing the security of wide-area networks (WANs) used to operate electrical power systems. The…”
    Get full text
    Journal Article
  2. 2

    Enterprise Architecture Management's Impact on Information Technology Success by Lagerström, R, Sommestad, T, Buschle, M, Ekstedt, M

    “…Both practitioners and researchers put forward enterprise architecture management as a mean for achieving success with information technology. Many arguments…”
    Get full text
    Conference Proceeding
  3. 3

    Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models by Sommestad, T., Ekstedt, M., Johnson, P.

    “…To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after…”
    Get full text
    Conference Proceeding
  4. 4

    Effort Estimates for Vulnerability Discovery Projects by Sommestad, T., Holm, H., Ekstedt, M.

    “…Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This…”
    Get full text
    Conference Proceeding
  5. 5

    Effort Estimates on Web Application Vulnerability Discovery by Holm, H., Ekstedt, M., Sommestad, T.

    “…Web application vulnerabilities are widely considered a serious concern. However, there are as of yet scarce data comparing the effectiveness of different…”
    Get full text
    Conference Proceeding
  6. 6

    A Tool for Enterprise Architecture Analysis by Johnson, P., Johansson, E., Sommestad, T., Ullberg, J.

    “…The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to…”
    Get full text
    Conference Proceeding
  7. 7

    Combining Defense Graphs and Enterprise Architecture Models for Security Analysis by Sommestad, T., Ekstedt, M., Johnson, P.

    “…Security is dependent on a mixture of interrelated concepts such as technical countermeasures, organizational policies, security procedures, and more. To…”
    Get full text
    Conference Proceeding
  8. 8

    Decision support oriented Enterprise Architecture metamodel management using classification trees by Franke, U., Ullberg, J., Sommestad, T., Lagerstrom, R., Johnson, P.

    “…Models are an integral part of the discipline of Enterprise Architecture (EA). To stay relevant to management decision-making needs, the models need to be…”
    Get full text
    Conference Proceeding
  9. 9

    A Tool for Enterprise Architecture Analysis of Maintainability by Ekstedt, M., Franke, U., Johnson, P., Lagerstrom, R., Sommestad, T., Ullberg, J., Buschle, M.

    “…A tool for enterprise architecture analysis using a probabilistic mathematical framework is demonstrated. The model-view-controller tool architecture is…”
    Get full text
    Conference Proceeding
  10. 10

    Enterprise architecture models for cyber security analysis by Ekstedt, M., Sommestad, T.

    “…Enterprise architecture is a rising discipline that is gaining increasing interest in both industry and academia. It pays attention to the fact that effective…”
    Get full text
    Conference Proceeding
  11. 11

    CySeMoL: A tool for cyber security analysis of enterprises by Holm, H, Sommestad, T, Ekstedt, M, Nordstro¨M, L

    “…The Cyber Security Modelling Language (CySeMoL) is a tool for quantitative cyber security analyses of enterprise architectures. This paper describes the…”
    Get full text
    Conference Proceeding
  12. 12

    A framework for assessing the cost of IT investments by Narman, P., Sommestad, T., Sandgren, S., Ekstedt, M.

    “…Assessing life cycle costs of IT is a difficult endeavor. There are several factors that contribute to the life cycle costs of IT. Many of these factors are of…”
    Get full text
    Conference Proceeding
  13. 13

    Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool by Jianxin Li, Sommestad, T., Hung, P., Xiang Li

    “…Summary form only given. A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain…”
    Get full text
    Conference Proceeding
  14. 14

    Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool by Jianxin Li, Sommestad, T., Hung, P.C.K., Xiang Li

    “…A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain business goals. The Web…”
    Get full text
    Conference Proceeding
  15. 15

    Development of an Effort Estimation Model: A Case Study on Delivery Projects at a Leading IT Provider within the Electric Utility Industry by Sommestad, T., Lillieskold, J.

    “…When projects are sold with fixed prices, it is utterly important to quickly and accurately estimate the effort required to enable an optimal bidding. This…”
    Get full text
    Conference Proceeding
  16. 16

    Emergency Response Framework for Aviation XML Services on MANET by Yu Xiaofeng, Sommestad, T., Casey Fung, Hung, P.C.K.

    “…A XML service is a software component that supports interoperable application-to-application interaction over a network. Each service makes its functionality…”
    Get full text
    Conference Proceeding