42 research outputs found

    Competences of IT Architects

    Get PDF
    The field of architecture in the digital world uses a plethora of terms to refer to different kinds of architects, and recognises a confusing variety of competences that these architects are required to have. Different service providers use different terms for similar architects and even if they use the same term, they may mean something different. This makes it hard for customers to know what competences an architect can be expected to have.\ud \ud This book combines competence profiles of the NGI Platform for IT Professionals, The Open Group Architecture Framework (TOGAF), as well as a number of Dutch IT service providers in a comprehensive framework. Using this framework, the book shows that notwithstanding a large variety in terminology, there is convergence towards a common set of competence profiles. In other words, when looking beyond terminological differences by using the framework, one sees that organizations recognize similar types of architects, and that similar architects in different organisations have similar competence profiles. The framework presented in this book thus provides an instrument to position architecture services as offered by IT service providers and as used by their customers.\ud \ud The framework and the competence profiles presented in this book are the main results of the special interest group “Professionalisation” of the Netherlands Architecture Forum for the Digital World (NAF). Members of this group, as well as students of the universities of Twente and Nijmegen have contributed to the research on which this book is based

    An Assessment Framework to Determine the Strategic Value of IT Architectures in Smart Grids

    Get PDF
    Design Science Research (DSR) is a popular new research approach and paradigm, for which a number of research methodologies have been developed. One of the challenges facing researchers wanting to apply this new approach is the choice of research methodology. In this paper we give an account of six DSR methodologies and we compare them using a Design Science Research Methodology Comparison Framework that we adapted from an existing Information Systems Development Methodology Comparison Framework. Based on the outcomes of the comparison, we develop a set of technological rules that forms a contingency-based framework to support Design Science Researchers in choosing an appropriate and well-suited DSR methodology, depending on the contingencies of the situation at hand

    Delegation Protocols in Human-Centric Workflows

    Get PDF
    International audienceOrganisations are facilitated and conducted using workflow management systems. Currently, we observe a tendency moving away from strict workflow modelling towards dynamic approaches supporting human interactions when deploying a workflow. One specific approach ensuring human-centric workflows is task delegation. Delegating a task may require an access to specific and potentially sensitive data that have to be secured and specified into authorisation policies. In this paper, we propose a modelling approach to secure delegation. In doing so, we define delegation protocols supporting specific constraints based on both workflow and access control systems. Moreover, we develop an advanced access control framework to integrate delegation constraints within existing policies. The novelty consists in the proactivity aspect of our framework to cope with dynamic delegation of authority in authorisation policies

    Injecting Task Delegation Constraints into a Role-based Access Control Model

    Get PDF
    International audienceIn role-based access control models, delegation of authorityinvolves delegating roles that a user can assume or the set of permissions that he can acquire, to other users. Several role-based delegation models have been proposed in the literature. However, these models consider only delegation in presence of the role type, which have some inherent limitations to task delegation in workïŹ‚ow systems. In this paper, we address task delegation in a workïŹ‚ow and elaborate a security model supporting delegation constraints. Delegation constraints express security requirements with regards to task's resources, user's assignment and privileges (delegation of authority). Further, we show how, using a role-based security model, we inject formalised delegation constraints to compute delegation principals with their respective privileges

    A logical framework for reasoning about delegation policies in workflow management systems

    Get PDF
    International audienceTask delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between workflow and access control systems. Delegation completion and authorisation enforcement are specified under specific constraints so-called events. In this article, we aim to reason about delegation events to model task delegation and to specify delegation policies using a logical framework. To that end, we propose an event-based task delegation model to control the delegation execution. We then identify relevant events responsible for the dynamic enforcement of delegation policies. Further, we define a task-oriented access control model to specify delegation constraints into authorisation policies. Finally, we propose a technique to automate the delegation policies integration. Using event calculus, we develop a reasoning tool to control the delegation execution and to increase the compliance of all delegation changes in the existing policy of the workflow

    Towards an e-government enterprise architecture framework for developing economies

    Get PDF
    The growth and uptake of e-government in developing economies is still affected by the interoperability challenge, which can be perceived as an orchestration of several issues that imply the existence of gaps in methods used for e-government planning and implementation. To a great extent, various counterparts in developed economies have succeeded in addressing the method-related gaps by developing e-government enterprise architectures, as blueprints for guiding e-government initiatives in a holistic and manageable way. However, existing e-government enterprise architectures are country-specific to appropriately serve their intended purpose, while enterprise architecture frameworks or methods are generic to accommodate several enterprise contexts. The latter do not directly accommodate the unique peculiarities of e-government efforts. Thus, a detailed method is lacking that can be adapted by developing economies to develop e-government enterprise architectures that fit their contexts. To address the gap, this article presents research that adopted a Design Science approach to develop an e-Government Enterprise Architecture Framework (EGEAF), as an explicit method for guiding the design of e-government enterprise architectures in a developing economy. EGEAF was designed by extending the Architecture Development Method of The Open Group Architecture Framework (TOGAF ADM) to address requirements for developing interoperable e-government solutions in a developing economy. EGEAF was evaluated using two scenarios in the Ugandan context, and findings indicate that it is feasible; its design is understandable to enable its adoption and extension to accommodate requirements for developing interoperable e-government solutions in other developing economies

    Informatiekunde : exacte vaagheid

    Get PDF
    Contains fulltext : 30154_info.pdf (publisher's version ) (Open Access)With bibliogr., inaugural address University of Nijmegen39 p

    Group Decision Making in Collaborative Modeling: Aggregating Individual Preferences with AHP

    Get PDF
    Contains fulltext : 75300.pdf (preprint version ) (Open Access)4th SIKS/BENAIS Conference on Enterprise Information Systems, 23 oktober 200

    Towards a Language to Support Value Cocreation: An Extension to the ArchiMate Modeling Framework

    Get PDF
    Contains fulltext : 197729.pdf (publisher's version ) (Open Access
    corecore