Tyrone Grandison, Michael Bilger, Luke O’Connor, M. Graf, Morton Swimmer, M. Schunter, A. Wespi, Nevenko Zunic
{"title":"Elevating the Discussion on Security Management: The Data Centric Paradigm","authors":"Tyrone Grandison, Michael Bilger, Luke O’Connor, M. Graf, Morton Swimmer, M. Schunter, A. Wespi, Nevenko Zunic","doi":"10.1109/BDIM.2007.375015","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375015","url":null,"abstract":"Corporate decision makers have normally been disconnected from the details of the security management infrastructures of their organizations. The management of security resources has traditionally been the domain of a small group of skilled and technically savvy professionals, who report to the executive team. As threats become more prevalent, attackers get smarter and the infrastructure required to secure corporate assets become more complex, the communication gap between the decision makers and the implementers has widened. The risk of misinterpretation of corporate strategy into technical safe controls also increases with the above-mentioned trends. In this paper, we articulate a paradigm for managing enterprise security called the data centric security model (DCSM), which puts IT policy making in the hands of the corporate executives, so that security decisions can be directly executed without the diluting effect of interpretation at different levels of the Infrastructure and with the benefit of seeing direct correlation between business objective and security mechanism. Our articulation of the DCSM vision is a starting point for discussion and provides a rich platform for research into business-driven security management.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"661 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131984949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Utilizing a Service Oriented Architecture for Information Security Evaluation and Quantification","authors":"C. Martin, Khalil A. Abuosba","doi":"10.1109/BDIM.2007.375023","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375023","url":null,"abstract":"The service oriented architecture provides an abstraction utility that is characterized to be autonomous, well defined, and self-contained. In this research we define the basic building blocks of a security reference model composed out of processes domain view, security requirements view, infrastructure management view, security assurance view, and survivability management view. We build a security attributes organizational model based on security processes states and security attributes requirements. We continue to dissect our proposed architecture based on the service oriented architecture reference model, and map the SOA dimensions into security requirements attributes.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133491348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Mechanism of Specifying and Determining Pricing in Utility Computing Environments","authors":"J. Ouyang, Akhil Sahai, J. Pruyne","doi":"10.1109/BDIM.2007.375010","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375010","url":null,"abstract":"Utility services providers offer on-demand services for multiple users and applications from a shared resource pool. The utility computing environment provider manages resources that have multiple dimensions, namely CPU, Memory and Disk. It is important that a mechanism of quantification he utilized for determining pricing. Also in these environments, we believe that price needs to be adapted to reflect and influence dynamic change in demand on resources, and can be used, as an economic mechanism, to efficiently manage a utility computing environment. To achieve this, we propose in this paper an adaptive pricing mechanism. The objective of this scheme is twofold: it, for business objectives, adapts price based upon the supply and demand curves over time intervals; on the other hand, price invisibly manages the distribution of resource demand across time intervals, therefore makes resource utilization more efficient and balanced over time. In this approach, the resource unit to be priced is called capacity unit, and applications are billed based upon the capacity units that have been reserved or used.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125198671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The strategic value of the \"fit\" between business processes and IT management: The case of the Italian publishing industry","authors":"G. Petruzzi, A. Garavelli","doi":"10.1109/BDIM.2007.375021","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375021","url":null,"abstract":"This research study aims at investigating the effect of the fit between organizational processes and information technology on business performance. Our key theoretical point unfolds from the hypothesis that the information technologies can trigger their potential and (positively) impact business performance if they \"fit\" the organizational processes they are deemed to support. When firms configure their IT equipments, we argue that managers should select a configuration that better \"fit\" the processes. We have outlined a theoretically derived model of IT/process fit based on business process dimensions and their relationship to IT features that can help researchers to understand the consequences of IT investments on organization. Model estimation has been carried out in the context of the Italian publishing industry on a sample of 36 publishing firms. The results show substantial support for our main hypothesis: firms which actually use IT in a way that fits business process requirements show a better competitive positioning. Results have significant managerial implications and show that to make \"good\" IT decisions managers should consider jointly both IT characteristics and process dimensions. The cost of any IT option should be evaluated against its purpose and the organizational processes the IT should support.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model Driven Framework for IT Transformation","authors":"S. Kumaran, T. Chao, K. Bhattacharya, P. Dhoolia","doi":"10.1109/BDIM.2007.375012","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375012","url":null,"abstract":"IT organizations are faring significant business and technical challenges today. On the business realm, companies are increasingly outsourcing their IT operations to specialized IT services firms. On the technical side, new architectural approaches such as Model Driven Architecture and Service Oriented Architecture are fundamentally changing IT management. In response to these challenges, Business-driven IT management (BDIM) has emerged as a new approach lo IT management that bridges Business IT gap, improves the quality of IT services, and optimizes IT operations. In this paper, we present a multi- layer modeling framework to support BDIM, introduce a versatile Service Delivery Management (SDM) platform for IT service delivery, and use the construction of the SDM platform to demonstrate the modeling framework in action.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130037963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christian Mayerl, Kay M. Huner, Jens-Uwe Gaspar, Christof Momm, S. Abeck
{"title":"Definition of Metric Dependencies for Monitoring the Impact of Quality of Services on Quality of Processes","authors":"Christian Mayerl, Kay M. Huner, Jens-Uwe Gaspar, Christof Momm, S. Abeck","doi":"10.1109/BDIM.2007.375006","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375006","url":null,"abstract":"Service providers have to monitor the quality of offered services and to ensure the compliance of service levels provider and requester agreed on. Thereby, a service provider should notify a service requester about violations of service level agreements (SLAs). Furthermore, the provider should point to impacts on affected processes in which services are invoked. For that purpose, a model is needed to define dependencies between quality of processes and quality of invoked services. In order to measure quality of services and to estimate impacts on the quality of processes, we focus on measurable metrics related to functional elements of processes, services as well as components implementing services. Based on functional dependencies between processes and services of a service-oriented architecture (SOA), we define metric dependencies for monitoring the impact of quality of invoked services on quality of affected processes. In this paper we discuss how to derive metric dependency definitions from functional dependencies by applying dependency patterns, and how to map metric and metric dependency definitions to an appropriate monitoring architecture.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126427002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Specifying Information Security Needs for the Delivery of High Quality Security Services","authors":"Xiaomeng Su, D. Bolzoni, P. V. Eck","doi":"10.1109/BDIM.2007.375022","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375022","url":null,"abstract":"In this paper we present an approach for specifying and prioritizing information security requirements in organizations. We propose to explicitly link security requirements with the organizations' business vision, i.e. to provide business rationale for security requirements. The rationale is then used as a basis for comparing the importance of different security requirements. Furthermore we discuss how to integrate the aforementioned solution concepts into a service level management process for security services, which is an important step in IT Governance.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-Based Mitigation of Availability Risks","authors":"E. Zambon, D. Bolzoni, S. Etalle, M. Salvato","doi":"10.1109/BDIM.2007.375014","DOIUrl":"https://doi.org/10.1109/BDIM.2007.375014","url":null,"abstract":"The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present standards for risk assessment and mitigation show limitations when evaluating and mitigating availability risks. This is due to the fact that they do not fully consider the dependencies between the constituents of an IT infrastructure that are paramount in large enterprises. These dependencies make the technical problem of assessing availability issues very challenging. In this paper we define a method and a tool for carrying out a risk mitigation activity which allows us to assess the global impact of a set of risks and to choose the best set of countermeasures to cope with them. To this end, the presence of a tool is necessary, due to the high complexity of the assessment problem. Our approach can be integrated in present risk management methodologies (e.g. COBIT) to provide a more precise risk mitigation activity. We substantiate the viability of this approach by showing that most of the input required by the tool is available as part of a standard business continuity plan, and/or by performing a common tool-assisted risk management.","PeriodicalId":414047,"journal":{"name":"2007 2nd IEEE/IFIP International Workshop on Business-Driven IT Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115392278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}