{"title":"Capturing Business Strategy and Value in Enterprise Architecture to Support Portfolio Valuation","authors":"M. Iacob, D. Quartel, H. Jonkers","doi":"10.1109/EDOC.2012.12","DOIUrl":"https://doi.org/10.1109/EDOC.2012.12","url":null,"abstract":"This paper investigates and enhances the suitability of the Archi Mate enterprise architecture modeling language to support the modeling of business strategy concepts and architecture-based approaches to IT portfolio valuation. It gives an overview of existing strategy and valuation concepts and methods in the literature and motivates the need for enterprise architecture and business requirements modeling to capture these aspects as well. This overview results in the identification of strategy and value related concepts, such as value, risks, resources, capabilities, competencies and constraints. The paper provides an analysis of the extent to which Archi Mate may support some of the above-mentioned concepts and extends it with the missing concepts. The proposed language extension is formalized in terms of a met model fragment, which is aligned with the Archi Mate metamodel. The approach is also illustrated by means of an application portfolio consolidation case study in which we demonstrate how a constrained optimization valuation method can be applied to architecture models enhanced with the new concepts.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130639287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Debessay Fesehaye, Yunlong Gao, K. Nahrstedt, Guijun Wang
{"title":"Impact of Cloudlets on Interactive Mobile Cloud Applications","authors":"Debessay Fesehaye, Yunlong Gao, K. Nahrstedt, Guijun Wang","doi":"10.1109/EDOC.2012.23","DOIUrl":"https://doi.org/10.1109/EDOC.2012.23","url":null,"abstract":"In this paper we analyze and study the impact of cloudlets in interactive mobile cloud applications. To study the impact we propose the design of cloudlet network and service architectures. Our study focuses on file editing, video streaming and collaborative chatting which are representative enterprise application scenarios. Initial simulation results show the performance gains of using cloudlets over using clouds in terms of data transfer delay and system throughput. When not more than two cloudlet wireless hops are used to transfer data, the cloudlet-based approach outperforms the cloud-based approach for all three application scenarios. With more cloudlet wireless hops under mobility, the cloud-based approach can give a better performance for some of the data transfers even though the cloudlet-based can outperform the cloud-based approach for most of the flows. In such scenarios, we suggest that an adaptive scheme should be used. For example, a scheme making an intelligent decision on either the cloudlet network or the cloud network, whichever gives minimum delay, can be used.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126658662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Harrison, B. Bordbar, Syed T. T. Ali, Chris I. Dalton, Andrew P. Norman
{"title":"A Framework for Detecting Malware in Cloud by Identifying Symptoms","authors":"K. Harrison, B. Bordbar, Syed T. T. Ali, Chris I. Dalton, Andrew P. Norman","doi":"10.1109/EDOC.2012.27","DOIUrl":"https://doi.org/10.1109/EDOC.2012.27","url":null,"abstract":"Security is seen as one of the major challenges of the Cloud computing. Recent malware are not only becoming more sophisticated, but have also demonstrated a trend to make use of components, which can easily be distributed through the Internet to develop newer and better malware. As a result, the key problem facing Cloud security is to cope with identifying diverse sets of malware. This paper presents a method of detecting malware by identifying the symptoms of malicious behaviour as opposed to looking for the malware itself. This can be compared to the use of symptoms in human pathology, in which study of symptoms direct physicians to diagnosis of a disease or possible causes of illnesses. The main advantage of shifting the attention to the symptoms is that a wide range of malicious behaviour can result in the same set of symptoms. We propose the creation of Forensic Virtual Machines (FVM), which are mini Virtual Machines (VM) that can monitor other VMs to discover the symptoms. In this paper, we shall present a framework to support the FVMs so that they collaborate with each other in identifying symptoms by exchanging messages via secure channels. The FVMs report to a Command & Control module that collects and correlates the information so that suitable remedial actions can take place in real-time. The Command & Control can be compared to the physician who infers possibility of an illness from the occurring symptoms. In addition, as FVMs make use of the computational resources of the system we will present an algorithm for sharing of the FVMs so that they can be guided to search for the symptoms in the VMs with higher priority.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129195731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tobias Binz, F. Leymann, Alexander Nowak, D. Schumm
{"title":"Improving the Manageability of Enterprise Topologies Through Segmentation, Graph Transformation, and Analysis Strategies","authors":"Tobias Binz, F. Leymann, Alexander Nowak, D. Schumm","doi":"10.1109/EDOC.2012.17","DOIUrl":"https://doi.org/10.1109/EDOC.2012.17","url":null,"abstract":"The software systems running in an enterprise consist of countless components, having complex dependencies, are hosted on physical or virtualized environments, and are scattered across the technical infrastructure of an enterprise, ranging from on-premise data centers up to public cloud deployments. The resulting topology of the current IT landscape of an enterprise is often extremely complex. We show that information about this complex ecosystem can be captured in a graph-based structure, the enterprise topology graph. We argue that, using such graph-based representation, many challenges in Enterprise Architecture Management (EAM) can be tackled through the aid of graph processing algorithms. However, the high complexity of an enterprise topology graph is the main obstacle to this approach. An enterprise topology graph may consist of millions of nodes, each representing an element of the enterprise IT landscape. Further, these nodes comprise a large variety of properties and relationships, making the topology hardly manageable by human users and software tools. To address this complexity problem, we propose different mechanisms to make enterprise topology graphs manageable. Segmentation techniques, tailored to specific use cases, extract manageable segments from the enterprise topology graph. Based on a set of formally defined transformation operations we then demonstrate the power of the approach in three application scenarios.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120978018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"From Business Application Execution to Design Through Model-Based Reporting","authors":"T. Holmes","doi":"10.1109/EDOC.2012.25","DOIUrl":"https://doi.org/10.1109/EDOC.2012.25","url":null,"abstract":"Cross-disciplinary models constitute essential instruments to master complexity. Often it is easier to relate to high-level concepts than to deal with low-level technical details. In model-driven engineering (MDE) models are designated a pivotal role from which systems are generated. As such, MDE enables different stakeholders of business applications to participate in the engineering process. Until now however, MDE does not penetrate phases beyond generation and deployment such as monitoring, analysis, and reporting. To display information from runtime and analytics it would be interesting if reporting could utilize models from design time. Therefore, this paper presents model-based reporting (MbR). Bridging the gap between reporting and design, it enables stakeholders to intuitively specify the reporting through a domain-specific language (DSL) while accelerating development cycles. In non-model-driven settings, MbR can help to introduce models as a first step towards MDE.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"454 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132697030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Matthias Farwick, Wilfried Pasquazzo, R. Breu, Christian M. Schweda, Karsten Voges, Inge Hanschke
{"title":"A Meta-Model for Automated Enterprise Architecture Model Maintenance","authors":"Matthias Farwick, Wilfried Pasquazzo, R. Breu, Christian M. Schweda, Karsten Voges, Inge Hanschke","doi":"10.1109/EDOC.2012.11","DOIUrl":"https://doi.org/10.1109/EDOC.2012.11","url":null,"abstract":"Maintaining a high quality enterprise architecture (EA) model that is up-to-date and consistent is a difficult but crucial task. The reasons for this difficulty are the size and complexity of EA models, frequent changes in the architecture and the challenge of collecting EA data from different stakeholders in large organizations. In our research project Living IT-Landscape Models we are working towards a tighter synchronization between EA models and what they represent in the real world, thus increasing the model actuality and consistency. With our previous work we have established semi-automated processes for EA data collection and quality assurance. To support these processes an implementing EAM tool needs to be able work with contextual information that is not typically stored alongside the EA models. In the paper at hand we describe a meta-model that incorporates the required context information and can form the basis for EAM tools that support i) recurring data collection from data sources, ii) maintaining relations from imported elements to their sources, iii) storing actuality related characteristics for triggering updates, and iv) identifying properties used to avoid duplicate entries. Related work has acknowledged the relevance of the problem, however no comprehensive approaches to for automating EA model maintenance have been presented yet.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116198090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automating the Management and Versioning of Service Models at Runtime to Support Service Monitoring","authors":"T. Holmes, Uwe Zdun, S. Dustdar","doi":"10.1109/EDOC.2012.32","DOIUrl":"https://doi.org/10.1109/EDOC.2012.32","url":null,"abstract":"In a model-driven service-oriented architecture (SOA), the services are in large parts generated from models. To facilitate monitoring, governance, and self-adaptation the information in these models can be used by services that monitor, manage, or adapt the SOA at runtime. If a service for monitoring, management, or adaptation in an SOA is dependent on models, and the metamodel changes, usually the service needs to be manually adapted to work with the new version, recompiled, and redeployed. This manual effort impedes the use of models at runtime. To address this problem, this paper introduces model-aware services that work with models at runtime. These services are supported using a service environment, called Morse. Hiding the complexity of implicit versioning of models from users while respecting the principle of Universally Unique Identifiers (UUIDs), it realizes a novel transparent UUID-based model versioning technique. It uses the model-driven approach to automatically generate and deploy Morse services that are used by the model-aware services to access models in the correct version. In this way, monitoring and adaptation in SOAs can be better supported, and the manual effort to evolve services for monitoring, management, or adaptation, which are based on models at runtime, can be minimized.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126840415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andrea Burattin, F. Maggi, Wil M.P. van der Aalst, A. Sperduti
{"title":"Techniques for a Posteriori Analysis of Declarative Processes","authors":"Andrea Burattin, F. Maggi, Wil M.P. van der Aalst, A. Sperduti","doi":"10.1109/EDOC.2012.15","DOIUrl":"https://doi.org/10.1109/EDOC.2012.15","url":null,"abstract":"The increasing availability of event data recorded by information systems, electronic devices, web services and sensor networks provides detailed information about the actual processes in systems and organizations. Process mining techniques can use such event data to discover processes and check the conformance of process models. For conformance checking, we need to analyze whether the observed behavior matches the modeled behavior. In such settings, it is often desirable to specify the expected behavior in terms of a declarative process model rather than of a detailed procedural model. However, declarative models do not have an explicit notion of state, thus making it more difficult to pinpoint deviations and to explain and quantify discrepancies. This paper focuses on providing high-quality and understandable diagnostics. The notion of activation plays a key role in determining the effect of individual events on a given constraint. Using this notion, we are able to show cause-and-effect relations and measure the healthiness of the process.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process-oriented Information Logistics: Aligning Enterprise Information with Business Processes","authors":"Bernd Michelberger, Bela Mutschler, M. Reichert","doi":"10.1109/EDOC.2012.13","DOIUrl":"https://doi.org/10.1109/EDOC.2012.13","url":null,"abstract":"Today, enterprises are confronted with a continuously increasing amount of data. Examples of such data include office files, e-mails, process descriptions, and data from process-aware information systems. This data overload makes it difficult for knowledge-workers to identify the information they need to perform their tasks in the best possible way. Particularly challenging is the alignment of process-related information with business processes. In fact, process-related information and business processes are usually managed separately. On the one hand, enterprise content management systems, shared drives, and Intranet portals are used for organizing information, on the other hand, process management technology is used to design and enact business processes. With process-oriented information logistics (POIL) this paper presents an approach for bridging this gap. POIL enables the process-oriented and context-aware delivery of process-related information to knowledge-workers. We also present a clinical use case and a proof-of-concept prototype to demonstrate the application and benefits of POIL.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121126131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lei Wang, A. Wombacher, L. F. Pires, M. V. Sinderen, Chihung Chi
{"title":"A State Synchronization Mechanism for Orchestrated Processes","authors":"Lei Wang, A. Wombacher, L. F. Pires, M. V. Sinderen, Chihung Chi","doi":"10.1109/EDOC.2012.16","DOIUrl":"https://doi.org/10.1109/EDOC.2012.16","url":null,"abstract":"Two orchestrated processes interacting with each other have to maintain their own states. Messages are used to synchronize states between orchestrated processes. Server crash and network failure may result in loss of messages and therefore result in a state change performed by only one party. Thus, the states of the parties are no longer synchronized, resulting in state inconsistencies and in worst case deadlocks. In this paper, we propose a mechanism for guaranteed state synchronization of orchestrated processes with system and network failures. Our mechanism is based on interaction patterns and process transformations. The basic idea is to redesign the original processes into their state synchronization-enabled counterparts via process transformations that can be automated. The transformation mechanism is formalized based on Colored Petri Nets. We present the formal proof of the correctness of our mechanism and give the overhead analysis to illustrate its practicability.","PeriodicalId":448875,"journal":{"name":"2012 IEEE 16th International Enterprise Distributed Object Computing Conference","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129755511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}