Developing an access control management metamodel for secure digital enterprise architecture modeling

被引:3
作者
Nahar, Kamrun [1 ]
Gill, Asif Qumer [1 ]
Roach, Terry [2 ]
机构
[1] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[2] Capsicum Business Architects Pty Ltd, Sydney, NSW, Australia
关键词
meta; model; access control management; action design research; enterprise architecture; ontology; INFORMATION-SYSTEMS;
D O I
10.1002/spy2.160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is an increasing interest in embedding the security in the design of digital enterprise architecture (EA) modeling platform to secure the digital assets. Access control management (ACM) is one of the key aspects of a secure digital enterprise architecture modeling platform design. Typical enterprise architecture modeling approaches mainly focus on the modeling of business, information, and technology elements. This draws our attention to this important question: how to model ACM for a secure digital EA modeling platform to ensure secure access to digital assets? This article aims to address this important research question in collaboration with our industry partner and developed an ontology-based ACM metamodel that can be used by enterprises to model their ACM for a particular situation. This research has been conducted using the well-known action-design research (ADR) method to develop and evaluate the ACM metamodel for the secure digital EA modeling platform.
引用
收藏
页数:18
相关论文
共 77 条
  • [1] Preventing unauthorized access in information centric networking
    AbdAllah, Eslam G.
    Zulkernine, Mohammad
    Hassanein, Hossam S.
    [J]. SECURITY AND PRIVACY, 2018, 1 (04):
  • [2] Adams C., 2020, SECUR PRIVACY, V3
  • [3] Aftab MU, 2015, 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), P83, DOI 10.1109/CIACS.2015.7395571
  • [4] Ahn GJ, 2009, IEEE ICC, P998
  • [5] Alshammari B.M., 2017, Journal of Computer Sciences Original, V13, P558
  • [6] Alzoubi Yehia Ibrahim, 2015, Journal of Software, V10, P681, DOI 10.17706/jsw.10.6.681-694
  • [7] Managing Security and Privacy Integration across Enterprise Business Process and Infrastructure
    Anderson, John A.
    Rachamadugu, Vijay
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, : 351 - 358
  • [8] Angles R., 2018, CEUR WORKSHOP PROC, V2100
  • [9] Survey of graph database models
    Angles, Renzo
    Gutierrez, Claudio
    [J]. ACM COMPUTING SURVEYS, 2008, 40 (01)
  • [10] [Anonymous], 2014, Model Driven Architecture (MDA) Guide 2.0