SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks

被引:2
|
作者
Yadav, Surya B. [1 ]
机构
[1] Texas Tech Univ, Rawls Coll Business, Telecom Technol, Lubbock, TX 79409 USA
关键词
data-location-security; process-location-security; secure computer network; secure enterprise architecture-based network; secure enterprise network design; security adequacy level;
D O I
10.4018/jisp.2008010101
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
The extent methods largely ignore the importance of integrating security requirements with business requirements and providing built-in steps for dealing with these requirements seamlessly. To address this problem, a new approach to secure network analysis and design is presented. The proposed method, called the SEACON method, provides an integrated approach to use existing principles of information systems analysis and design with the unique requirements of distributed secure network systems. We introduce several concepts including security adequacy level, process-location-security matrix, data-location-security matrix, and secure location model to provide built-in mechanisms to capture security needs and use them seamlessly throughout the steps of analyzing and designing secure networks. This method is illustrated and compared to other secure network design methods. The SEACON method is found to be a useful and effective method.
引用
收藏
页码:1 / 25
页数:25
相关论文
共 50 条
  • [1] Architecture-based design of computer based systems
    Denford, M
    O'Neill, T
    Leaney, J
    [J]. ECBS 2003: 10TH IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2003, : 39 - 46
  • [2] Enterprise architecture alignment (an overview of the architecture-based development approach)
    McMullen, B
    [J]. TOWARD AN ELECTRONIC PATIENT RECORD '97 - CONFERENCE AND EXPOSITION, PROCEEDINGS, VOLS 1-3, 1997, : B166 - B168
  • [3] Improving Testing in an Enterprise SOA with an Architecture-based Approach
    Buchgeher, Georg
    Klammer, Claus
    Heider, Wolfgang
    Schuetz, Martin
    Huber, Heinz
    [J]. 2016 13TH WORKING IEEE/IFIP CONFERENCE ON SOFTWARE ARCHITECTURE (WICSA), 2016, : 231 - 240
  • [4] Enterprise Architecture-Based Risk and Security Modelling and Analysis
    Jonkers, Henk
    Quartel, Dick A. C.
    [J]. GRAPHICAL MODELS FOR SECURITY, GRAMSEC 2016, 2016, 9987 : 94 - 101
  • [5] Analysis and design for architecture-based software
    Jia Xiaolin
    [J]. Journal of Systems Engineering and Electronics, 2005, (04) : 924 - 930
  • [6] Towards Secure Architecture-based Adaptations
    Khakpour, Narges
    Skandylas, Charilaos
    Nariman, Goran Saman
    Weyns, Danny
    [J]. 2019 IEEE/ACM 14TH INTERNATIONAL SYMPOSIUM ON SOFTWARE ENGINEERING FOR ADAPTIVE AND SELF-MANAGING SYSTEMS (SEAMS 2019), 2019, : 114 - 125
  • [7] Analyzing Enterprise Models Using Enterprise Architecture-Based Ontology
    Sunkle, Sagar
    Kulkarni, Vinay
    Roychoudhury, Suman
    [J]. MODEL-DRIVEN ENGINEERING LANGUAGES AND SYSTEMS, 2013, 8107 : 622 - 638
  • [8] Architecture-based visualisation of computer based systems
    Denford, M
    O'Neill, T
    Leaney, J
    [J]. NINTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER-BASED SYSTEMS, PROCEEDINGS, 2002, : 139 - 146
  • [9] Automatic Design of Secure Enterprise Architecture
    Lagerstrom, Robert
    Johnson, Pontus
    Ekstedt, Mathias
    [J]. PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, : 65 - 70
  • [10] The Integrated Performability Analysis Architecture of The computer networks
    Shi, Jian
    Wang, Shaoping
    Wang, Kang
    [J]. MATERIALS AND PRODUCT TECHNOLOGIES, 2010, 118-120 : 907 - 911