Developing an access control management metamodel for secure digital enterprise architecture modeling

被引:3
作者
Nahar, Kamrun [1 ]
Gill, Asif Qumer [1 ]
Roach, Terry [2 ]
机构
[1] Univ Technol Sydney, Sch Comp Sci, Ultimo, NSW 2007, Australia
[2] Capsicum Business Architects Pty Ltd, Sydney, NSW, Australia
关键词
meta; model; access control management; action design research; enterprise architecture; ontology; INFORMATION-SYSTEMS;
D O I
10.1002/spy2.160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
There is an increasing interest in embedding the security in the design of digital enterprise architecture (EA) modeling platform to secure the digital assets. Access control management (ACM) is one of the key aspects of a secure digital enterprise architecture modeling platform design. Typical enterprise architecture modeling approaches mainly focus on the modeling of business, information, and technology elements. This draws our attention to this important question: how to model ACM for a secure digital EA modeling platform to ensure secure access to digital assets? This article aims to address this important research question in collaboration with our industry partner and developed an ontology-based ACM metamodel that can be used by enterprises to model their ACM for a particular situation. This research has been conducted using the well-known action-design research (ADR) method to develop and evaluate the ACM metamodel for the secure digital EA modeling platform.
引用
收藏
页数:18
相关论文
共 77 条
  • [41] Kreizman G., 2006, Gartner Research
  • [42] Adding Attributes to Role-Based Access Control
    Kuhn, D. Richard
    Coyne, Edward J.
    Weil, Timothy R.
    [J]. COMPUTER, 2010, 43 (06) : 79 - 81
  • [43] Lupu E C., 1998, A Role Based Framework for Distributed Systems Management
  • [44] Madhusudhana K., 2017, An Ontological Approach for User Profile Based Access Control System
  • [45] Generating and Justifying Design Theory
    Mandviwalla, Munir
    [J]. JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2015, 16 (05): : 314 - 344
  • [46] Mens T., 2002, Electronic Notes in Theoretical Computer Science, V72, P57
  • [47] Nahar Kamrun, 2020, Web, Artificial Intelligence and Network Applications. Proceedings of the Workshops of the 34th International Conference on Advanced Information Networking and Applications (WAINA-2020). Advances in Intelligent Systems and Computing (AISC 1150), P223, DOI 10.1007/978-3-030-44038-1_21
  • [48] Neo4j Graph Database, 2019, NEO4J GRAPH PLATF
  • [49] Privacy-Aware Role-Based Access Control
    Ni, Qun
    Bertino, Elisa
    Lobo, Jorge
    Brodie, Carolyn
    Karat, Clare-Marie
    Karat, John
    Trombetta, Alberto
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2010, 13 (03)
  • [50] OMG, 2014, BUS MOT MOD BMM