An Architectural Framework for the Improvement of the Ultra-Large-Scale Systems Interoperability
|
|
- Godwin Manning
- 6 years ago
- Views:
Transcription
1 An Architectural Framework for the Improvement of the Ultra-Large-Scale Systems Interoperability S. Shervin Ostadzadeh 1 and Fereidoon Shams 2 1 Computer Engineering Dept., Science and Research Branch, Islamic Azad University, Tehran, Iran 2 Computer Engineering Dept., Shahid Beheshti University, Tehran, Iran Abstract - With a trend towards becoming more and more information based, enterprises constantly attempt to go beyond the accomplishments of each other by improving their information activities. This attempt depends on increasingly complex systems that will exceed the size of current systems and systems of systems by every measure. These systems are called Ultra-Large-Scale (ULS) systems. The sheer scale of ULS systems will change everything, necessitating that we broaden our understanding of software architectures and the ways we structure them. In this paper, we clarify the lack of an architectural framework for the ULS interoperability and suggest some early considerations towards proposing an architectural framework to improve the interoperability of ULS systems. Keywords: Ultra-Large-Scale Systems, Interoperability, Architectural Framework, Software Architecture, Software Engineering 1 Introduction Software Engineering faces a lot of challenges nowadays, however, fundamental gaps in our current understanding of software and software development at the scale of Ultra-Large-Scale [27] Software-Intensive systems (ULSSIS) remains one important challenge that present serious obstacles in the technically and economically effective achievement of the Software Engineering goals. This is due to the fact that proper development of ULSSIS would have substantial impact on software engineering activities. As systems grow larger and more complex, which eventually become ULSSIS, unprecedented demands on software architecture will emerge. The software architecture of a program or computing system is the structure or structures of the system, which comprises software elements, the externally visible properties of those elements, and the relationships among them [2]. In other words, software architecture characterizes the structure of a system. In general, architecture is the fundamental organization of a system embodied in its components, their relationships to each other, and to the environment, and the principles guiding its design and evolution [17]. According to ISO [16], an architecture represents a description of the basic arrangement and connectivity of parts of a system (either a physical or a conceptual object or entity), which is expected to create a comprehensive overview of the entire system when put together [8]. It should be noted that handling this large amount of information is quite challenging and needs a well-developed framework. This challenge will be intensified in ULS systems due to their large scale. Nowadays, various Information Systems Architecture (ISA) frameworks have been proposed; among them are Zachman Framework [28, 35], FEAF 1 [9], TEAF 2 [10], TOGAF 3 [23], E2AF 4 [26] and C4ISR [6]. Unfortunately, they do not provide all the required support for ULSSIS. The inability of current ISA frameworks to meet the demands of these systems, calls for breakthrough research in an ultra-large-scale architectural framework [27]. This paper presents an initial work on applying an architectural framework in ULS systems interoperability, which we believe has the potential to lead to the required breakthroughs. The rest of the paper is organized as follows. In Section 2, we introduce some basic concepts and principles. Next, we present an interoperability model overview in section 3. We discuss our proposed approach in section 4. Finally, we make conclusions and provide some comments for the future work. 2 Basic concepts and definitions In this section we briefly introduce some basic concepts and principles. We assume these remarks are necessary for the readers to clearly understand what we mean by the concepts used in this paper. 1 Federal Enterprise Architecture Framework 2 Treasury Enterprise Architecture Framework 3 The Open Group Architecture Framework 4 Extended Enterprise Architecture Framework
2 2.1 Ultra-Large-Scale systems In 2006, SEI [27] published a report about some systems which were called as Ultra-Large-Scale systems. These systems will go far beyond the size of current systems and system of systems by every measure, such as, the number of the lines of code; the number of people employing the system for different purposes; amount of data stored, accessed, manipulated, and refined; the number of connections and interdependencies among software components; and the number of hardware elements. There are some characteristics of ULS systems that will be revealed because of their scale [14, 27]: (1) decentralization; (2) inherently conflicting, unknowable, and diverse requirements; (3) continuous evolution and deployment; (4) heterogeneous, inconsistent, and changing elements; (5) erosion of the people/system boundary; (6) normal failures; (7) new paradigms for acquisition and policy. These characteristics undermine current, widely used, information systems framework and establish the basis for the technical challenges associated with ULS systems. 2.2 Interoperability The definitions on interoperability have been reviewed in [30, 31]. Broadly speaking, interoperability has the meaning of coexistence, autonomy and federated environment, whereas integration refers more to the concepts of coordination, coherence and uniformization [8]. Regarding the degree of coupling, when the components are totally dependent on each other and inseparable, the system is called tightly coupled or fully integrated. On the contrary, the components in a loosely coupled system (such as ULS systems) are connected via a communication network that makes the interactions possible. The components in these systems can exchange data/services while preserving locally their own logic of operations. This is called interoperability. Another point of view is given by ISO [32]. Two systems are considered as integrated if there is a detailed standard format for all constituent components. Interoperability is more related to the unified approach where there is a common meta-level structure across constituent models, providing a means for establishing semantic equivalence or the federated approach where models must dynamically accommodate rather than having a predetermined meta-model [8]. 2.3 Enterprise architecture According to ISO [16], an enterprise is one or more organizations sharing a definite mission, goals and objectives to offer an output such as a product or a service. An enterprise consists of people, information, and technologies; performs business functions; has a defined organizational structure that is commonly distributed in multiple locations; responds to internal and external events; has a purpose for its activities; provides specific services and products to its customers [25]. According to ISO [16], an architecture is a description of the basic arrangement and connectivity of parts of a system (either a physical or a conceptual object or entity). Enterprise Architecture (EA) is a comprehensive view of an enterprise. EA shows the primary components of an enterprise and depicts how these components interact with or relate to each other. EA typically encompasses an overview of the entire information system in an enterprise; including the software, hardware, and information architectures. In this sense, EA is a meta-architecture. As regards, EA contains different views of an enterprise, including, work, function, process, and information, it is at the highest level in the architecture pyramid. According to the IFAC IFIP Task Force [33] and ISO [16] there are two types of architectures that deal with enterprise integration: (1) System architecture (sometimes referred to as Type 1 architecture) that deals with the design of a system; (2) Enterprise-reference architecture (sometimes referred to as Type 2 architecture) that deals with the organization of the development and the implementation of a project such as an enterprise integration or other enterprise development program. In other words, Type 1 architecture describes a system or sub-system regarding its structure and behavior. However, Type 2 architecture implies a framework that organizes necessary concepts and activities/tasks to design and build a system [8]. Zachman Framework falls into the Type 2 architecture. 2.4 Zachman framework In 1987, an IBM researcher, named John A. Zachman, proposed a framework for Information System Architecture [35], which is now called Zachman Framework (ZF) [28]. A framework is a classification schema that defines a set of categories into which various things can be arranged. An enterprise architecture framework is a way of organizing and classifying the types of information that must be created and used for the enterprise architecture. Zachman states that "The Framework for Enterprise Architecture is a two dimensional classification scheme for descriptive representations of an Enterprise" [37]. ZF is a two dimensional information matrix consisting of 6 rows and 6 columns. Figure 1 depicts Zachman Framework.
3 Zachman Framework Data Function Network People Time Motivation Planner Owner Designer Builder Contractor Functioning Enterprise Figure 1: The Zachman Framework The rows describe the perspectives of various stakeholders. These rows starting from the top include: Planner (Scope); Owner (Enterprise Model); Designer (System Model); Builder (Technology Model); Contractor (Detail Representation); and Functioning Enterprise. The columns describe various abstractions that define each perspective. These abstractions are based on six questions that one usually asks when s/he wants to understand a thing. The columns include: Data (What is it made of?); Function (How does it work?); Network (Where are the elements?); People (Who does what work?); Time (When do things happen?); and Motivation (Why do things happen?). To find complete cell definitions of ZF refer to [36]. 3 Interoperability models Since the beginning of the last decade, most recent work on architecture development is focused on careful planning and improving an enterprise interoperability framework. Conventionally, such a framework is primarily concerned with establishing a mechanism to describe the concepts, the problem and the knowledge on enterprise interoperability in a more structured manner. This section will survey some recent interoperability models. Figure 2: LISI Reference Model [6] must cover all four enabling attributes of interoperability known as PAID, namely, Procedures, Applications, Infrastructure, and Data. The LISI approach is focused on developing interoperability in US military sector. It is also used as a basis to elaborate other interoperability maturity models such as Organizational Maturity Model [34] and Enterprise Interoperability Maturity Model in ATHENA Integrated Project [1]. 3.2 IDEAS interoperability model The IDEAS Interoperability Framework (fig. 3) was developed by IDEAS project on the basis of ECMA/NIST Toaster Model, ISO 19101, ISO and was augmented through the quality attributes and intended to reflect the view that "interoperability is achieved on multiple levels: inter-enterprise coordination, business process integration, semantic application integration, syntactical application integration and physical integration" [15]. 3.1 LISI reference model The LISI [6] (Levels of Information Systems Interoperability) approach developed by C4ISR Architecture Working Group (AWG) during 1997, is a framework to provide the US Department of Defense (DoD) with a maturity model and a process for determining joint interoperability needs, assessing the ability of the information systems to meet those needs, and selecting pragmatic solutions and a transition path for achieving higher states of capability and interoperability. Figure 2 depicts the LISI Reference Model. A critical element of interoperability assurance is a clear prescription of the common suite of requisite capabilities that must be inherent to all information systems that desire to interoperate at a selected level of sophistication [8]. Each level s prescription of capabilities Figure 3: IDEAS Interoperability Framework [15].
4 In the business layer, all issues related to the organization and the management of an enterprise are addressed. The business model is the description of the commercial relationships between an enterprise and the way it offers products or services to the market. The knowledge layer is concerned with acquiring, structuring and representing the collective/personal knowledge of an enterprise. The ICT system layer is concerned with the ICT solutions that allow an enterprise to operate, make decisions and exchange information within and outside its boundaries. The semantic dimension cuts across the business, knowledge and ICT layers. Quality attributes are a supplementary dimension of the framework. The considered attributes are: (1) Security; (2) Scalability; (3) Portability; (4) Performance; (5) Availability and (6) Evolution. 3.3 ATHENA interoperability framework The ATHENA Interoperability Framework (AIF) [1] is structured into three levels: (1) The Conceptual level is used for identification of research requirements and integrates research results; (2) The Applicative level is used for the transfer of knowledge regarding application of integration technologies; and (3) The Technical level is used for technology testing based on profiles and integrates prototypes. Figure 4 depicts the AIF. The ATHENA Interoperability Framework and the IDEAS Interoperability Framework are considered complementary [8]. At each level of AIF, one can use the IDEAS interoperability framework to structure interoperability issues into three layers (business, knowledge and ICT) and a semantic dimension. 3.4 Other relevant interoperability models In the UK, the e-government Unit7 (egu), has based its technical guidance on the e-government Interoperability Framework (e-gif) [11]. e-gif mandates sets of specifications and policies for any cross-agency collaboration and for e-government service delivery. Figure 4: ATHENA Interoperability Framework The European Interoperability Framework [12, 13] aims at supporting the European Union s strategy of providing user-centered e-government services by defining as the overarching set of policies, standards and guidelines, which describe the way in which organizations have agreed, or should agree, to do business with each other. The E-health interoperability framework [21] developed by NEHTA (National E-Health Transition Authority) initiatives in Australia, brings together organizational, information and technical aspects relating to the delivery of interoperability across health organizations. The NATO C3 Interoperability Environment (NIE) [19] encompasses the standards, the products and the agreements adopted by the Alliance to ensure C3 interoperability. It serves as the basis for the development and evolution of C3 Systems. Clark and Jones [34] proposed the Organizational Interoperability Maturity Model (OIM), which extends the LISI model into the more abstract layers of command and control support. Five levels of organizational maturity, describing the ability to interoperate, are defined. These include: (1) Independent; (2) Ad-hoc; (3) Collaborative; (4) Combined; and (5) Unified. Layers of Coalition Interoperability (LCI) [29] is a framework to deal with possible measures of merit to be used to deal with the various layers of semantic interoperability in coalition operations. The models previously discussed address a range of interoperability issues from technical to coalition organizational. SEI has developed the System of Systems Interoperability (SOSI) [18], which addresses technical interoperability (also covered by LISI, LCI, and NATO C3) and operational interoperability (also covered by OIM and LCI). However, SOSI goes a step further to address programmatic concerns between organizations building and maintaining interoperable systems. SOSI introduces three types of interoperability: (1) Programmatic, interoperability between different program offices. (2) Constructive, interoperability between the organizations that are responsible for the construction (and maintenance) of a system. (3) Operational, interoperability between the systems. 4 ULS interoperability framework It is clear now that current approaches for defining, developing, deploying, operating, acquiring, and evolving ULS systems, as described in SEI report [27], will not suffice. We can consider ULS systems as cities or socio-
5 technical ecosystems, while our current knowledge and practices are geared toward creating individual buildings or species. This leads us to define a research discipline that is needed for new solutions. In this section, we investigate the use of an architectural framework in order to improve ULS interoperability framework. 4.1 The problem The scale of complexity and uncertainty in ULS system Design will be so great to resist treatments by traditional interoperability methods. According to SEI report [27], this is a new perspective: architecture is not purely a technical plan for producing a single system or closely related family of systems, but a structuring of the design spaces that a complex design process at an industrial scale will explore over time. Note that although breaking up an architecture into design spaces and striving for a set of coherent and effective design rules would seem to imply a significant degree of control of the overall design and production process, the design spaces, design rules, and the organizations will be continually adjusting and adapting to both internal and external forces. The criticality of the research is justified by the fact that handling the large volume of information available in ULS systems is only feasible by utilizing a well-developed interoperability framework. A potential framework should broaden the traditional interoperability framework to include people and organizations; social, cognitive, and economic considerations; and design structures such as design rules and government policies. The research should center on the development of an architectural framework to improve ultra-large-scale systems interoperability. We pose this question: "Given the issues regarding the design of all levels of ultra-largescale architectures, how can we organize and classify the types of information that must be created and used in order to improve ULS interoperability?" sometimes also live within the city, in a ULS system, sometimes a person will act in the role of a traditional user, sometimes in a supporting role as a maintainer of the system health, and sometimes as a change agent adding and repairing the functions of the system. Assuming people to be part of the ULS system means that a new perspective has to be taken into account: Culture. Figure 5 depicts an extension to SOSI model to achieve ULS system socio-technical characteristics. 4.3 The proposed framework Figure 6 depicts our proposed framework to improve ULS interoperability. As depicted, the framework applies Zachman Framework perspectives and abstractions in conjunction with the ULS interoperability model. Zachman Framework is often referenced as a standard approach for expressing the basic elements of information system architecture, and is widely accepted as the main framework in ISA. In our work, we apply Zachman Framework as an initial start, and try to revise it by adding the required support for the special characteristics of the ultra-large-scale interoperability model. The proposed framework should be a spectrum of technologies and methods with software engineering, economics, human factors, cognitive psychology, sociology, systems engineering, and business policy. The proposed framework uses three basic dimensions: (1) The abstract dimension is based on six general questions required to understand interoperability; (2) The perspective dimension is based on interoperability concerns in an enterprise; and (3) The final dimension is based on interoperability barriers in a socio-technical system of systems. Current research shows that the problem stated in the previous paragraph is inherently broader and deeper than some of current successful ISA frameworks (such as Zachman Framework) [3, 4, 7, 20, 22]. 4.2 Socio: the new concern The SOSI can be consider as a significant initiative for ULS systems, however, as mentioned in SEI report [27], people will not just be users of a ULS system, rather, they will be part of its overall behavior. In addition, the boundary between the system and user/developer roles will blur. Just as people who maintain and modify a city, Figure 5: ULS Interoperability Model
6 The interoperability abstracts define the contents of interoperations: Data (What?): The interoperability of data handles information finding and sharing from heterogeneous data sources. These data sources possibly exist within different machines running different operating and data management systems. Function (How?): The interoperability of function takes care of identifying, composing and making various application functions work together. Network (Where?): The study of interconnecting the internal networks of companies is essential in a networked enterprise. This facilitates the creation of a common network for the whole enterprise. This type of interoperability focuses on the geometry or connectivity of the system's physical nodes. People (Who?): It focuses on the people and the manuals and the operating instructions or models they use to interoperate their tasks/duties. Conceptual: It focuses on the artifacts that conceptually define the interoperability from the enterprise owners' perspective. Logical: It describes the artifacts that design the way interoperability will be realized systematically, quite independently of any technologies. Physical: It focuses on the artifacts that define the interoperability implementation based on the general technological constraints being employed. Out-of-Context: It describes the artifacts that specify the implementations for specific technological products being used for the interoperability. The interoperability barriers address a range of interoperability issues from operational to cultural. In order to achieve Ultra-Large-Scale interoperation among systems, a set of cultural, management, constructive, and operational activities have to be implemented in a consistent manner. These activities require adding new and upgraded systems to a growing interoperability web: Time (When?): It is concerned with the life cycles, the timing and the schedules that are used to interoperate activities. Motivation (Why?): It focuses on goals, plans and rules that prescribe policies and ends which guide the enterprise interoperability. Operational issues define the activities within the executing system and between the executing system and its environment, including the interoperation with other systems. Constructive issues define the activities that develop or evolve system interoperability. The interoperability perspectives define various concerns of interoperation: Programmatic issues define the activities that manage the acquisition of system interoperability. Contextual: It describes the artifacts that provide the boundaries for the interoperability. Cultural issues define the activities that sustain the ULS system socio-technical characteristics. Figure 6: An ULS Interoperability Framework.
7 [3] S. Blanchette, et al. "U.S. Army Workshop on Exploring Enterprise, System of Systems, System, and Software Architectures". SEI, Carnegie Mellon University, USA, [4] P. J. Boxer, and S. Garcia. "Enterprise Architecture for Complex System-of-Systems Contexts"; 3rd Annual IEEE International Systems Conference, Vancouver, Canada, [5] Architecture Working Group (AWG). "C4ISR Architecture Framework, Version 2.0". USA Department of Defense (DoD), Figure 7: Data/Logical/Constructive Cell Together, the abstract, perspective and barrier dimensions constitute the ULS interoperability framework. The two dimensional matrix (abstract perspective) defines the contents of interoperations that take place in various levels of system perspectives. The third dimension enables to capture and to structure the type of interoperation. For example, Data/Logical/Constructive (fig. 7) represents the data that can be used for constructive interoperations in logical (system's designer) perspective. 5 Conclusions In this paper, an architectural framework to improve ULS interoperability was proposed. The framework allows software architects to model various aspects of Ultra- Large-Scale systems interoperability. The proposed framework presents a classification schema for descriptive representation of a ULS system. The goal is that the framework be used to complement a full-structural model within the Ultra-Large-Scale interoperability. In particular, this approach will enable architects to: (1) design all levels of ULS architectures; (2) represent and analyze ULS interoperability; and (3) determine and manage ULS requirements. In the future work, one is expected to propose a methodology to help architectures model the framework cells. 6 References [1] ATHENA. "Advanced Technologies for Interoperability of Heterogeneous Enterprise Networks and their Applications". FP IST1, [2] L. Bass, P. Clements, and R. Kazman. "Software Architecture in Practice". SEI Series in Software Architecture, Addison-Wesley Professional, [6] Architecture Working Group (AWG). "Levels of Information Systems Interoperability (LISI)". USA Department of Defense (DoD), [7] P. Clements. "Exploring Enterprise, System of Systems, and System and Software Architectures". SEI Webinar, Carnegie Mellon University, USA, [8] D. Chen, et al. "Architectures for enterprise integration and interoperability: Past, present and future"; Comput Industry (Ind), [9] Chief Information Officers (CIO) Council. "Federal Enterprise Architecture Framework, Version 1.1" [10] Department of the Treasury. "Treasury Enterprise Architecture Framework, Version 1" [11] egovernment Unit. "egovernment Interoperability Framework (egif), version 6.1" [12] EIF. "European Interoperability Framework". Brussels, [13] EIF. "European Interoperability Framework for PAN- European egovernment Services, Version 4.2" [14] G. Goth. "Ultra-Large System: Redefining Software Engineering"; IEEE Software Journal, Vol. 25, Issue 3, 91 94, [15] IDEAS. "IDEAS: Interoperability Development for Enterprise Application and Software Roadmaps" [16] ISO "Industrial Automation Systems Requirements for Enterprise-reference Architectures and Methodologies" [17] IEEE Standards board. "Recommended Practice for Architectural Description of Software-Intensive Systems". IEEE-Std
8 [18] E. Morris, et al. "System of Systems Interoperability". SEI, Carnegie Mellon University, USA, [19] NC3A. "NATO C3 Technical Architecture Reference Model for Interoperability". NATO Consultation, Command, and Control Agency, [20] NECSI. "Characteristics of Systems of Systems". NECSI: Complex Physical, Biological and Social Systems Project, [21] NEHTA. "Towards an Interoperability Framework, Version 1.8" [22] ODUSD. "Systems and Software Engineering: Systems Engineering Guide for Systems of Systems, Version 1.0". USA, [23] Open Group. "The Open Group Architecture Framework (TOGAF), Version 9.0". USA, [24] S. S. Ostadzadeh, et al. "A Method for Consistent Modeling of Zachman Framework"; Advances and Innovations in Systems, Computing Sciences and Software Engineering, Springer, , International Journal of Computer Integrated Manufacturing, , [32] ISO "Industrial Automation Systems Concepts and Rules for Enterprise Models". ISO TC184/SC5/WG1, [33] IFAC IFIP Task Force. "GERAM: Generalized Enterprise Reference Architecture and Methodology, Version 1.6.3". IFAC IFIP Task Force on Architecture for Enterprise Integration, [34] T. Clark, and R. Jones. "Organizational Interoperability Maturity Model for C2". Department of Defense, Canberra, Australia, [35] J. A. Zachman. "A Framework for Information Systems Architecture"; IBM Systems Journal, Vol. 26, No. 3, , [36] J. A. Zachman. "The Framework for Enterprise Architecture Cell Definitions". ZIFA, [37] J. A. Zachman. "The Zachman Framework: A Primer for Enterprise Engineering and Manufacturing" [25] S. S. Ostadzadeh, et al. "An MDA-Based Generic Framework to Address Various Aspects of Enterprise Architecture"; Advances in Computer and Information Sciences and Engineering, Springer, , [26] J. Schekkerman. "Extended Enterprise Architecture Framework Essentials Guide, Version 1.5". Institute For Enterprise Architecture Developments (IFEAD), [27] SEI. "Ultra-Large-Scale Systems: Software Challenge of the Future". Carnegie Mellon University, USA, [28] J. F. Sowa, and J. A. Zachman. "Extending and Formalizing the Framework for Information Systems Architecture"; IBM Systems Journal, Vol. 31, No. 3, , [29] A. Tolk. "Beyond Technical Interoperability: Introducing a Reference Model for Measures of Merit for Coalition Interoperability"; Proc. 8 th ICCRTS, USA, [30] D. Chen, and F. Vernadat. "Enterprise interoperability: a standardisation view"; Kluwer Academic Publishers, , [31] D. Chen, and F. Vernadat. "Standards on enterprise integration and engineering a state of the art";
Methodology for Enterprise Interoperability
Proceedings of the 7th World Congress The International Federation of Automatic Control Seoul, Korea, July 6-, 28 Methodology for Enterprise N. Daclin, D. Chen, B. Vallespir IMS - LAPS/GRAI, University
More informationA Comparative Analysis of Architecture Frameworks
A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen School of Information Technology DSTO C3 Research Centre Swinburne University of Technology Department of Defence Melbourne,
More informationIntegration and Interoperability Models for Systems of Systems
Pittsburgh, PA 15213-3890 Integration and Interoperability Models for Systems of Systems David Carney Patricia Oberndorf April 21, 2004 Systems and Software Technology Conference INCOSE-Sponsored Track
More informationOntology for Characterising Architecture Frameworks
Ontology for Characterising Architecture Frameworks Oddrun Pauline Ohren SINTEF ICT, PO Box 124, Blindern, N-0314 Oslo, Norway oddrun.ohren@sintef.no Abstract. This paper outlines an ontology for characterising
More informationSoftware Architecture
Software Architecture L T JayPrakash jtl@iiitb.ac.in Software Architecture (recap) Other Influences on SA Therefore, SA is important and look into its constituents! Every software system has an architecture!
More informationArchitectural Principles for Enterprise Frameworks
Architectural for Enterprise Frameworks Richard Martin Tinwisle Corporation Bloomington, Indiana Edward Robertson and John Springer Computer Science Department Indiana University Copyright 2004 by R. Martin,
More informationA Comparative Analysis of Architecture Frameworks
School of Information Technology Centre for Component Software and Enterprise Systems A Comparative Analysis of Architecture Frameworks Technical Report: CeCSES Centre Report: SUTIT-TR2004.01 SUT.CeCSES-TR001
More information2 The BEinGRID Project
2 The BEinGRID Project Theo Dimitrakos 2.1 Introduction Most of the results presented in this book were created within the BEinGRID project. BEinGRID, Business Experiments in GRID, is the European Commission
More informationISO/IEC/ IEEE INTERNATIONAL STANDARD. Systems and software engineering Architecture description
INTERNATIONAL STANDARD ISO/IEC/ IEEE 42010 First edition 2011-12-01 Systems and software engineering Architecture description Ingénierie des systèmes et des logiciels Description de l'architecture Reference
More informationFundamentals to Creating Architectures using ISO/IEC/IEEE Standards
Fundamentals to Creating Architectures using ISO/IEC/IEEE Standards What to Architect? How to Architect? IEEE Goals and Objectives Chartered by IEEE Software Engineering Standards Committee to: Define
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Office of the Secretary Of Defense Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior
More informationAddressing interoperability in e-health: an Australian approach
Addressing interoperability in e-health: an Australian approach Zoran Milosevic Deontik Pty Ltd Brisbane, Australia. zoran@deontik.com Abstract This paper describes the use of the ISO ODP family of standards
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationIntroduction in the Dragon1 open EA Method
Introduction in the Dragon1 open EA Method Dragon1 starts the third wave in Enterprise Architecture: Entering the era of Visual EA Management Overview Revision date: 28 November 2013 Management Overview
More informationDeveloping Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach
Developing Software Applications Using Middleware Infrastructure: Role Based and Coordination Component Framework Approach Ninat Wanapan and Somnuk Keretho Department of Computer Engineering, Kasetsart
More informationCybersecurity & Privacy Enhancements
Business, Industry and Government Cybersecurity & Privacy Enhancements John Lainhart, Director, Grant Thornton The National Institute of Standards and Technology (NIST) is in the process of updating their
More informationINTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2
INTRODUCING A MULTIVIEW SOFTWARE ARCHITECTURE PROCESS BY EXAMPLE Ahmad K heir 1, Hala Naja 1 and Mourad Oussalah 2 1 Faculty of Sciences, Lebanese University 2 LINA Laboratory, University of Nantes ABSTRACT:
More informationPREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.
PREPARE FOR TAKE OFF Accelerate your organisation s journey to the Cloud. cloud. Contents Introduction Program & Governance BJSS Cloud Readiness Assessment: Intro Platforms & Development BJSS Cloud Readiness
More informationThe-Open-Group 0G TOGAF 8 Certification for Practitioners. Download Full Version :
The-Open-Group 0G0-081 TOGAF 8 Certification for Practitioners Download Full Version : http://killexams.com/pass4sure/exam-detail/0g0-081 What guides and supports the evolution of the Solutions Continuum?
More informationIntegrating TOGAF, Zachman and DoDAF Into A Common Process
Integrating TOGAF, Zachman and DoDAF Into A Common Process Rolf Siegers Senior Principal Software Systems Engineer The Open Group Architecture Practitioner s Conference October 2003 Customer Success Is
More informationAn Overview of ISO/IEC family of Information Security Management System Standards
What is ISO/IEC 27001? The ISO/IEC 27001 standard, published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC), is known as Information
More informationTOGAF Enterprise Edition Version 8.1
TOGAF Enterprise Edition Version 8.1 A Presentation to the The Open Group Architecture Briefing San Diego 4 th February 2004 Graham John Spencer Bird Vice Director, President Architecture Forum Mobile
More informationDoD Architecture Framework Version 2.0
wreath stars Text DoD Architecture Framework Version 2.0 Volume 2: Architectural Data and Models Architect s Guide 28 May 2009 This page left intentionally blank TABLE OF CONTENTS SECTION PAGE 1. INTRODUCTION...
More information10 Steps to Building an Architecture for Space Surveillance Projects. Eric A. Barnhart, M.S.
10 Steps to Building an Architecture for Space Surveillance Projects Eric A. Barnhart, M.S. Eric.Barnhart@harris.com Howard D. Gans, Ph.D. Howard.Gans@harris.com Harris Corporation, Space and Intelligence
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationOverview of the Federal Interagency Operational Plans
Overview of the Federal Interagency Operational Plans July 2014 Table of Contents Introduction... 1 Federal Interagency Operational Plan Overviews... 2 Prevention Federal Interagency Operational Plan...2
More informationPart I: Future Internet Foundations: Architectural Issues
Part I: Future Internet Foundations: Architectural Issues Part I: Future Internet Foundations: Architectural Issues 3 Introduction The Internet has evolved from a slow, person-to-machine, communication
More informationVendor: The Open Group. Exam Code: OG Exam Name: TOGAF 9 Part 1. Version: Demo
Vendor: The Open Group Exam Code: OG0-091 Exam Name: TOGAF 9 Part 1 Version: Demo QUESTION 1 According to TOGAF, Which of the following are the architecture domains that are commonly accepted subsets of
More informationSTRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government
ATIONAL STRATEGY National Strategy for Critical Infrastructure Government Her Majesty the Queen in Right of Canada, 2009 Cat. No.: PS4-65/2009E-PDF ISBN: 978-1-100-11248-0 Printed in Canada Table of contents
More informationGeneral Framework for Secure IoT Systems
General Framework for Secure IoT Systems National center of Incident readiness and Strategy for Cybersecurity (NISC) Government of Japan August 26, 2016 1. General Framework Objective Internet of Things
More informationVocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary
Vocabulary-Driven Enterprise Architecture Development Guidelines for DoDAF AV-2: Design and Development of the Integrated Dictionary December 17, 2009 Version History Version Publication Date Author Description
More informationSoftware Architecture
Software Architecture Prof. R K Joshi Department of Computer Science and Engineering IIT Bombay What is Architecture? Software Architecture? Is this an Architecture? Is this an Architecture? Is this an
More informationReport of the Working Group on mhealth Assessment Guidelines February 2016 March 2017
Report of the Working Group on mhealth Assessment Guidelines February 2016 March 2017 1 1 INTRODUCTION 3 2 SUMMARY OF THE PROCESS 3 2.1 WORKING GROUP ACTIVITIES 3 2.2 STAKEHOLDER CONSULTATIONS 5 3 STAKEHOLDERS'
More informationCliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{
Cliayter s. Vsing the ~usiness-it 5Ztfignment :Mode{ 5.1 INTRODUCTION The purpose of the previous chapter was to recognize the knowledge embedded in current alignment approaches by inductively creating
More informationBeyond Technical Interoperability Introducing a Reference Model for Measures of Merit for Coalition Interoperability
Beyond Technical Interoperability Introducing a Reference Model for Measures of Merit for Coalition Interoperability Andreas Tolk, Ph.D. Virginia Modeling Analysis and Simulation Center Old Dominion University
More informationEnterprise Architecture Frameworks
Enterprise Architecture Frameworks Learning Objective of Chapter 2 Topic: Enterprise Architecture Framework Content and structure of enterprise architecture descriptions This is necessary because Enterprises
More informationArchives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment
Archives in a Networked Information Society: The Problem of Sustainability in the Digital Information Environment Shigeo Sugimoto Research Center for Knowledge Communities Graduate School of Library, Information
More informationDesigning a System Engineering Environment in a structured way
Designing a System Engineering Environment in a structured way Anna Todino Ivo Viglietti Bruno Tranchero Leonardo-Finmeccanica Aircraft Division Torino, Italy Copyright held by the authors. Rubén de Juan
More informationSubmission. to the. Australian Communications and Media Authority. on the. Planning for mobile broadband within the 1.
Submission to the Australian Communications and Media Authority on the Planning for mobile broadband within the 1.5 GHz mobile band Submission by: Australian Mobile Telecommunications Association and Communications
More informationcameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0
cameo Enterprise Architecture UPDM / DoDAF / MODAF / SysML / BPMN / SoaML USER GUIDE version 17.0 No Magic, Inc. 2010 All material contained herein is considered proprietary information owned by No Magic,
More informationThe HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information
The HITRUST CSF A Revolutionary Way to Protect Electronic Health Information June 2015 The HITRUST CSF 2 Organizations in the healthcare industry are under immense pressure to improve quality, reduce complexity,
More informationU.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan
U.S. Japan Internet Economy Industry Forum Joint Statement 2013 October 2013 Keidanren The American Chamber of Commerce in Japan In June 2013, the Abe Administration with the support of industry leaders
More informationIntegrating ITIL and COBIT 5 to optimize IT Process and service delivery. Johan Muliadi Kerta
Integrating ITIL and COBIT 5 to optimize IT Process and service delivery Johan Muliadi Kerta Measurement is the first step that leads to control and eventually to improvement. If you can t measure something,
More informationArchitecture and Standards Development Lifecycle
Architecture and Standards Development Lifecycle Architecture and Standards Branch Author: Architecture and Standards Branch Date Created: April 2, 2008 Last Update: July 22, 2008 Version: 1.0 ~ This Page
More informationA Study of Future Internet Applications based on Semantic Web Technology Configuration Model
Indian Journal of Science and Technology, Vol 8(20), DOI:10.17485/ijst/2015/v8i20/79311, August 2015 ISSN (Print) : 0974-6846 ISSN (Online) : 0974-5645 A Study of Future Internet Applications based on
More informationThe Zachman Framework
member of The Zachman Framework Introduction to Business-IT Alignment and Enterprise Architecture 1 Zachman Framework Regarded the origin of enterprise architecture frameworks (originally called "Framework
More informationUPDM PLUGIN. version user guide
UPDM PLUGIN version 17.0 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationComparative Analysis of Architectural Views Based on UML
Electronic Notes in Theoretical Computer Science 65 No. 4 (2002) URL: http://www.elsevier.nl/locate/entcs/volume65.html 12 pages Comparative Analysis of Architectural Views Based on UML Lyrene Fernandes
More informationToward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization
Toward Horizon 2020: INSPIRE, PSI and other EU policies on data sharing and standardization www.jrc.ec.europa.eu Serving society Stimulating innovation Supporting legislation The Mission of the Joint Research
More informationBenefits and Challenges of Architecture Frameworks
Benefits and Challenges of Architecture Frameworks Daniel Ota Michael Gerz {daniel.ota michael.gerz}@fkie.fraunhofer.de Fraunhofer Institute for Communication, Information Processing and Ergonomics FKIE
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE Digital Policy Management consists of a set of computer programs used to generate, convert, deconflict, validate, assess
More informationINFORMATION TECHNOLOGY ONE-YEAR PLAN
INFORMATION TECHNOLOGY ONE-YEAR PLAN 2016-2017 Information and Communications Technology One-year Plan 2016-2017 The purpose of this document is to identify the activities being undertaken this year by
More informationIBM Research Report. Model-Driven Business Transformation and Semantic Web
RC23731 (W0509-110) September 30, 2005 Computer Science IBM Research Report Model-Driven Business Transformation and Semantic Web Juhnyoung Lee IBM Research Division Thomas J. Watson Research Center P.O.
More informationTowards Semantic Interoperability between C2 Systems Following the Principles of Distributed Simulation
Towards Semantic Interoperability between C2 Systems Following the Principles of Distributed Simulation Authors: Vahid Mojtahed (FOI), vahid.mojtahed@foi.se Martin Eklöf (FOI), martin.eklof@foi.se Jelena
More informationSMART WATER MANAGEMENT PROCESS ARCHITECTURE WITH IOT BASED REFERENCE
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationUPDM 2 PLUGIN. version user guide
UPDM 2 PLUGIN version 17.0.1 user guide No Magic, Inc. 2011 All material contained herein is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by
More informationfor TOGAF Practitioners Hands-on training to deliver an Architecture Project using the TOGAF Architecture Development Method
Course Syllabus for 3 days Expert led Enterprise Architect hands-on training "An Architect, in the subtlest application of the word, describes one able to engage and arrange all elements of an environment
More informationlnteroperability of Standards to Support Application Integration
lnteroperability of Standards to Support Application Integration Em delahostria Rockwell Automation, USA, em.delahostria@ra.rockwell.com Abstract: One of the key challenges in the design, implementation,
More informationThe Zackman Framework
The Zackman Framework 1987 - John Zachman published the Zachman Framework for Enterprise Architecture. He wrote "To keep the business from disintegrating, the concept of information systems architecture
More informationThe University of Queensland
UQ Cyber Security Strategy 2017-2020 NAME: UQ Cyber Security Strategy DATE: 21/07/2017 RELEASE:0.2 Final AUTHOR: OWNER: CLIENT: Marc Blum Chief Information Officer Strategic Information Technology Council
More informationModule 3. Overview of TOGAF 9.1 Architecture Development Method (ADM)
Module 3 Overview of TOGAF 9.1 Architecture Development Method (ADM) TOGAF 9.1 Structure The Architecture Development Method (ADM) Needs of the business shape non-architectural aspects of business operation
More informationA Mapping of Common Information Model: A Case Study of Higher Education Institution
A Mapping of Common Information Model: A Case Study of Higher Education Institution Abdullah Fajar, Setiadi Yazid, Mame S. Sutoko Faculty of Engineering, Widyatama University, Indonesia E-mail : {abdullah.fajar,
More informationUNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 2: COST ($ in Millions) Prior Years
More informationGeneric and Domain Specific Ontology Collaboration Analysis
Generic and Domain Specific Ontology Collaboration Analysis Frantisek Hunka, Steven J.H. van Kervel 2, Jiri Matula University of Ostrava, Ostrava, Czech Republic, {frantisek.hunka, jiri.matula}@osu.cz
More informationSoftware Language Engineering of Architectural Viewpoints
Software Language Engineering of Architectural Viewpoints Elif Demirli and Bedir Tekinerdogan Department of Computer Engineering, Bilkent University, Ankara 06800, Turkey {demirli,bedir}@cs.bilkent.edu.tr
More informationFrameworks for Model-based Analysis and Design of Enterprise Information Systems
Frameworks for Model-based Analysis and Design of Enterprise Information Systems Mara Nikolaidou 1, Nancy Alexopoulou 12 {mara@di.uoa.gr, nancy@hua.gr} 1 Harokopio University of Athens, El. Venizelou Str,
More informationNext-Generation Architecture for Virtual Prototyping
Next-Generation Architecture for Virtual Prototyping Dr. Bipin Chadha John Welsh Principal Member Manager Lockheed Martin ATL Lockheed Martin ATL (609) 338-3865 (609) 338-3865 bchadha@atl.lmco.com jwelsh@atl.lmco.com
More informationModule 1 Management Overview
Module 1 Management Overview V9.1 Edition Copyright 2009-2011 Slide 1 of 67 All rights reserved Published by The Open Group, 2011 Management Overview Slide 2 of 67 TOGAF is a registered trademark of The
More informationNational Information Exchange Model (NIEM):
National Information Exchange Model (NIEM): DoD Adoption and Implications for C2 D r. S c o t t R e n n e r Presented at 19th International Command and Control Research and Technology Symposium (ICCRTS)
More informationData Governance Central to Data Management Success
Data Governance Central to Data Success International Anne Marie Smith, Ph.D. DAMA International DMBOK Editorial Review Board Primary Contributor EWSolutions, Inc Principal Consultant and Director of Education
More informationUnited States Government Cloud Standards Perspectives
United States Government Cloud Standards Perspectives in the context of the NIST initiative to collaboratively build a USG Cloud Computing Technology Roadmap NIST Mission: To promote U.S. innovation and
More informationDATA Act Information Model Schema (DAIMS) Architecture. U.S. Department of the Treasury
DATA Act Information Model Schema (DAIMS) Architecture U.S. Department of the Treasury September 22, 2017 Table of Contents 1. Introduction... 1 2. Conceptual Information Model... 2 3. Metadata... 4 4.
More informationSummary of Contents LIST OF FIGURES LIST OF TABLES
Summary of Contents LIST OF FIGURES LIST OF TABLES PREFACE xvii xix xxi PART 1 BACKGROUND Chapter 1. Introduction 3 Chapter 2. Standards-Makers 21 Chapter 3. Principles of the S2ESC Collection 45 Chapter
More informationSTRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE
STRENGTHENING THE CYBERSECURITY OF FEDERAL NETWORKS AND CRITICAL INFRASTRUCTURE By the authority vested in me as President by the Constitution and the laws of the United States of America, it is hereby
More informationConceptual Framework
ArchiMate in a Nutshell v11 Conceptual Framework Generic Meta Model / Framework / Meta Model Creative Commons Attribution-No Derivative Works Licence 2.0 Attribution: You may copy, distribute and display
More informationChapter 2 Overview of the Design Methodology
Chapter 2 Overview of the Design Methodology This chapter presents an overview of the design methodology which is developed in this thesis, by identifying global abstraction levels at which a distributed
More informationHow Cisco IT Improved Development Processes with a New Operating Model
How Cisco IT Improved Development Processes with a New Operating Model New way to manage IT investments supports innovation, improved architecture, and stronger process standards for Cisco IT By Patrick
More informationICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)
ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update) June 2017 INSERT YEAR HERE Contact Information: Jeremy Dalpiaz AVP, Cyber and Data Security Policy Jeremy.Dalpiaz@icba.org ICBA Summary
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Mapping The Network Mapping helps visualize the network and understand relationships and connectivity between
More informationInternational Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015)
International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Risk Management Theory Application in national information security risk control Analysis of the relationship
More informationStakeholder Participation Guidance
Climate, Community & Biodiversity Alliance, Verra Stakeholder Participation Guidance Guidance to support stakeholder participation in design, implementation and assessment of policies and actions May 2018
More informationThe Analysis and Proposed Modifications to ISO/IEC Software Engineering Software Quality Requirements and Evaluation Quality Requirements
Journal of Software Engineering and Applications, 2016, 9, 112-127 Published Online April 2016 in SciRes. http://www.scirp.org/journal/jsea http://dx.doi.org/10.4236/jsea.2016.94010 The Analysis and Proposed
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More informationContent Management for the Defense Intelligence Enterprise
Gilbane Beacon Guidance on Content Strategies, Practices and Technologies Content Management for the Defense Intelligence Enterprise How XML and the Digital Production Process Transform Information Sharing
More informationEUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE
EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE Overview all ICT Profile changes in title, summary, mission and from version 1 to version 2 Versions Version 1 Version 2 Role Profile
More informationThe ATCP Modeling Framework
The ATCP 2+9+1 Modeling Framework Bobbi Underbakke Adaptive Team Collaboration, Inc. 800.837.0677 atcprocess.com Adaptive Team Collaboration, Inc. March 22, 2005 Chris Armstrong Armstrong Process Group,
More informationEvolution of the ICT Field: New Requirements to Specialists
Lumen 2/2017 ARTICLE Evolution of the ICT Field: New Requirements to Specialists Vladimir Ryabov, PhD, Principal Lecturer, School of Business and Culture, Lapland UAS Tuomo Lindholm, MBA, Senior Lecturer,
More informationResearch on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus
Research on Approach of Equipment Status and Operation Information Acquisition Based on Equipment Control Bus Xu Li a, *, Chen Meng, Huixia Jiang, Cheng Wang Army Engineering University, Shijiazhuang 050003,
More information4.2.2 Usability. 4 Medical software from the idea to the finished product. Figure 4.3 Verification/validation of the usability, SW = software
4.2.2 Usability Intended purpose, Market Validation Usability Usability Risk analysis and measures Specification of the overall system SW SW architecture/ of SW SW design Software design & integration
More informationInformation Security and Service Management. Security and Risk Management ISSM and ITIL/ITSM Interrelationship
Information Security and Service Management for Management better business for State outcomes & Local Governments Security and Risk Management ISSM and ITIL/ITSM Interrelationship Introduction Over the
More informationPROJECT FINAL REPORT. Tel: Fax:
PROJECT FINAL REPORT Grant Agreement number: 262023 Project acronym: EURO-BIOIMAGING Project title: Euro- BioImaging - Research infrastructure for imaging technologies in biological and biomedical sciences
More informationApplying Human-Centered Design Process to SystemDirector Enterprise Development Methodology
Applying Human-Centered Design Process to SystemDirector Enterprise Development HIRAMATSU Takeshi, FUKUZUMI Shin ichi Abstract Human-centered design process is specified in ISO13407 international standard,
More informationEPRO. Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS
EPRO Electric Infrastructure Protection Initiative EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS EPRO BLACK SKY SYSTEMS ENGINEERING PROCESS The Role of Systems Engineering in Addressing Black Sky Hazards
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO 15489-1 Second edition 2016-04-15 Information and documentation Records management Part 1: Concepts and principles Information et documentation Gestion des documents d activité
More informationUBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT
2018 Viasat White Paper August 27, 2018 UBIQUITIOUS, RESILIENT, SECURE CONNECTIVITY IN THE NEAR-PEER THREAT ENVIRONMENT With Hybrid Adaptive Networking By Craig Miller Vice President, Chief Technical Officer
More informationOFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE HEALTH AFFAIRS SKYLINE FIVE, SUITE 810, 5111 LEESBURG PIKE FALLS CHURCH, VIRGINIA 22041-3206 TRICARE MANAGEMENT ACTIVITY MEMORANDUM FOR: SEE DISTRIBUTION SUBJECT:
More informationSecuring Europe's Information Society
Securing Europe's Information Society Dr. Udo Helmbrecht Executive Director European Network and Information Security Agency 16 June 2010 FIRST AGM Miami 16/6/2010 1 Agenda ENISA overview Challenges EU
More informationSystems and Capability Relation Management in Defence Systems-of-System Context
Systems and Capability Relation Management in Defence Systems-of-System Context Pin Chen, Ronnie Gori, Angela Pozgay Defence Science and Technology Organisation Department of Defence, Canberra ACT 2600
More information