Back to Search Start Over

S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System

Authors :
Busnel, P.
El Khoury, P.
Li, K.
Saidane, A.
Zannone, N.
Dimitrakos, T.
Martinelli, F.
DOmotique et informatique Mobile à l'Université de Sherbrooke (DOMUS)
Département d'informatique [Sherbrooke] (UdeS)
Faculté des sciences [Sherbrooke] (UdeS)
Université de Sherbrooke (UdeS)-Université de Sherbrooke (UdeS)-Faculté des sciences [Sherbrooke] (UdeS)
Université de Sherbrooke (UdeS)-Université de Sherbrooke (UdeS)
Base de Données (BD)
Laboratoire d'InfoRmatique en Image et Systèmes d'information (LIRIS)
Institut National des Sciences Appliquées de Lyon (INSA Lyon)
Université de Lyon-Institut National des Sciences Appliquées (INSA)-Université de Lyon-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)-Université Claude Bernard Lyon 1 (UCBL)
Université de Lyon-École Centrale de Lyon (ECL)
Université de Lyon-Université Lumière - Lyon 2 (UL2)-Institut National des Sciences Appliquées de Lyon (INSA Lyon)
Université de Lyon-Université Lumière - Lyon 2 (UL2)
SAP Research (SAP Research)
University of Trento [Trento]
Mathematics and Computer Science
Source :
4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, Jun 2008, Trondheim, Norway. pp.27-39, ⟨10.1016/j.entcs.2009.07.036⟩, Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008), 27-30, STARTPAGE=27;ENDPAGE=30;TITLE=Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008)
Publication Year :
2008
Publisher :
HAL CCSD, 2008.

Abstract

International audience; The analysis of security incidents and frauds has shown that several vulnerabilities of IT systems are due to loopholes in the policies and procedures adopted by organizations as well as in their structure. Organizations have thus to address security and dependability issues by analyzing their organizational setting. In this paper, we present a methodology to support the deployment of Security & Dependability patterns according to their position in the Enterprise Architecture and the underlying system infrastructures. The methodology discriminates the pattern deployment process between recommendations and guidelines. Recommendations concretize the deployment with refined software and/or hardware related patterns, whereas guidelines specify the organizational patterns in terms of the system-to-be, proposing human-resource and/or policy solutions. To make the discussion more concrete, we illustrate the framework with a case study on an emergency scenario within a remote healthcare system.

Details

Language :
English
Database :
OpenAIRE
Journal :
4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, Jun 2008, Trondheim, Norway. pp.27-39, ⟨10.1016/j.entcs.2009.07.036⟩, Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008), 27-30, STARTPAGE=27;ENDPAGE=30;TITLE=Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008)
Accession number :
edsair.doi.dedup.....104da0e95fbada8b62e582e9a7a43224
Full Text :
https://doi.org/10.1016/j.entcs.2009.07.036⟩