2017 Open Conference of Electrical, Electronic and Information Sciences (eStream) 2017
DOI: 10.1109/estream.2017.7950320
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise architecture modeling based on cloud computing security ontology as a reference model

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(6 citation statements)
references
References 20 publications
0
6
0
Order By: Relevance
“…Our examination reveals that, for almost a decade after introduction of the new research field, publications focused mainly on subject understanding. Later, the focus shifted towards application and management of enterprise architectures [96]. We identified ''modeling'' as the third significant subcategory, and again, we observed increasing dynamics within this research field.…”
Section: Trends In Enterprise Architecture Managementmentioning
confidence: 61%
“…Our examination reveals that, for almost a decade after introduction of the new research field, publications focused mainly on subject understanding. Later, the focus shifted towards application and management of enterprise architectures [96]. We identified ''modeling'' as the third significant subcategory, and again, we observed increasing dynamics within this research field.…”
Section: Trends In Enterprise Architecture Managementmentioning
confidence: 61%
“…of matching services, time of execution, average score, and recall. The time of execution minimized by 20% plus maintained the same value for all other parameters as SimQ [31]. There goals was to aim covering all of the areas of security by proposed an ontology based on systematic analysis and mapping of the relevant documentation of cloud computing security.…”
Section: Discussionmentioning
confidence: 99%
“…In 2017, Simona et al [31] proposed ontology by mapping from the recommendations the knowledge needed. According to the overlapping of ontology, the granularity has been chosen and selected for this process.…”
Section: Literature Reviewmentioning
confidence: 99%
“…• R. Rainys researches we tied up to computer network infrastructure (Rainys, 2006;Kajackas et al, 2011); • N. Goranin proposed a genetic algorithm based model for estimating the propagation rates of known and perspective Internet worms after their propagation reaches the satiation phase (Goranin et al 2008); • S. Ramanauskaite proposes a composite denial of service attack model that combines bandwidth exhaustion, filtering, and memory depletion models for a more realistic representation of similar cyber attacks (Ramanauskaitė et al 2015); • J. Janulevicius performed analysis of virtualization and risk assessment (Janulevičius et al, 2017); • Several scientists under M.K. Ragulskis leadership performed an indepth analysis of cryptography.…”
Section: Research On Information Security Management In Lithuaniamentioning
confidence: 99%