Search Results - "Sommestad, T."
-
1
Modeling Security of Power Communication Systems Using Defense Graphs and Influence Diagrams
Published in IEEE transactions on power delivery (01-10-2009)“…The purpose of this paper is to present a framework for assessing the security of wide-area networks (WANs) used to operate electrical power systems. The…”
Get full text
Journal Article -
2
Enterprise Architecture Management's Impact on Information Technology Success
Published in 2011 44th Hawaii International Conference on System Sciences (01-01-2011)“…Both practitioners and researchers put forward enterprise architecture management as a mean for achieving success with information technology. Many arguments…”
Get full text
Conference Proceeding -
3
Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models
Published in 2009 42nd Hawaii International Conference on System Sciences (01-01-2009)“…To facilitate rational decision making regarding cyber security investments, decision makers need to be able to assess expected losses before and after…”
Get full text
Conference Proceeding -
4
Effort Estimates for Vulnerability Discovery Projects
Published in 2012 45th Hawaii International Conference on System Sciences (01-01-2012)“…Security vulnerabilities continue to be an issue in the software field and new severe vulnerabilities are discovered in software products each month. This…”
Get full text
Conference Proceeding -
5
Effort Estimates on Web Application Vulnerability Discovery
Published in 2013 46th Hawaii International Conference on System Sciences (01-01-2013)“…Web application vulnerabilities are widely considered a serious concern. However, there are as of yet scarce data comparing the effectiveness of different…”
Get full text
Conference Proceeding -
6
A Tool for Enterprise Architecture Analysis
Published in 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007) (01-10-2007)“…The discipline of enterprise architecture advocates the use of models to support decision-making on enterprise-wide information system issues. In order to…”
Get full text
Conference Proceeding -
7
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis
Published in 2008 12th International IEEE Enterprise Distributed Object Computing Conference (01-09-2008)“…Security is dependent on a mixture of interrelated concepts such as technical countermeasures, organizational policies, security procedures, and more. To…”
Get full text
Conference Proceeding -
8
Decision support oriented Enterprise Architecture metamodel management using classification trees
Published in 2009 13th Enterprise Distributed Object Computing Conference Workshops (01-09-2009)“…Models are an integral part of the discipline of Enterprise Architecture (EA). To stay relevant to management decision-making needs, the models need to be…”
Get full text
Conference Proceeding -
9
A Tool for Enterprise Architecture Analysis of Maintainability
Published in 2009 13th European Conference on Software Maintenance and Reengineering (01-03-2009)“…A tool for enterprise architecture analysis using a probabilistic mathematical framework is demonstrated. The model-view-controller tool architecture is…”
Get full text
Conference Proceeding -
10
Enterprise architecture models for cyber security analysis
Published in 2009 IEEE/PES POWER SYSTEMS CONFERENCE AND EXPOSITION (01-03-2009)“…Enterprise architecture is a rising discipline that is gaining increasing interest in both industry and academia. It pays attention to the fact that effective…”
Get full text
Conference Proceeding -
11
CySeMoL: A tool for cyber security analysis of enterprises
Published in 22nd International Conference and Exhibition on Electricity Distribution (CIRED 2013) (2013)“…The Cyber Security Modelling Language (CySeMoL) is a tool for quantitative cyber security analyses of enterprise architectures. This paper describes the…”
Get full text
Conference Proceeding -
12
A framework for assessing the cost of IT investments
Published in PICMET '09 - 2009 Portland International Conference on Management of Engineering & Technology (01-08-2009)“…Assessing life cycle costs of IT is a difficult endeavor. There are several factors that contribute to the life cycle costs of IT. Many of these factors are of…”
Get full text
Conference Proceeding -
13
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool
Published in 2008 IEEE International Conference on Web Services (01-09-2008)“…Summary form only given. A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain…”
Get full text
Conference Proceeding -
14
Web Service-Based Business Process Development, Threat Modeling and Security Assessment Tool
Published in 2008 IEEE Congress on Services Part II (services-2 2008) (01-09-2008)“…A business process is a collection of related structures and activities, undertaken by organizations in order to achieve certain business goals. The Web…”
Get full text
Conference Proceeding -
15
Development of an Effort Estimation Model: A Case Study on Delivery Projects at a Leading IT Provider within the Electric Utility Industry
Published in PICMET '07 - 2007 Portland International Conference on Management of Engineering & Technology (01-08-2007)“…When projects are sold with fixed prices, it is utterly important to quickly and accurately estimate the effort required to enable an optimal bidding. This…”
Get full text
Conference Proceeding -
16
Emergency Response Framework for Aviation XML Services on MANET
Published in 2008 IEEE International Conference on Web Services (01-09-2008)“…A XML service is a software component that supports interoperable application-to-application interaction over a network. Each service makes its functionality…”
Get full text
Conference Proceeding