Back to Search
Start Over
S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
- Source :
- 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, Jun 2008, Trondheim, Norway. pp.27-39, ⟨10.1016/j.entcs.2009.07.036⟩, Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008), 27-30, STARTPAGE=27;ENDPAGE=30;TITLE=Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008)
- Publication Year :
- 2008
- Publisher :
- HAL CCSD, 2008.
-
Abstract
- International audience; The analysis of security incidents and frauds has shown that several vulnerabilities of IT systems are due to loopholes in the policies and procedures adopted by organizations as well as in their structure. Organizations have thus to address security and dependability issues by analyzing their organizational setting. In this paper, we present a methodology to support the deployment of Security & Dependability patterns according to their position in the Enterprise Architecture and the underlying system infrastructures. The methodology discriminates the pattern deployment process between recommendations and guidelines. Recommendations concretize the deployment with refined software and/or hardware related patterns, whereas guidelines specify the organizational patterns in terms of the system-to-be, proposing human-resource and/or policy solutions. To make the discussion more concrete, we illustrate the framework with a case study on an emergency scenario within a remote healthcare system.
- Subjects :
- Process management
General Computer Science
Computer science
Process (engineering)
Healthcare System
Vulnerability
Enterprise architecture
02 engineering and technology
Computer security
computer.software_genre
SDG 3 – Goede gezondheid en welzijn
Theoretical Computer Science
Software
SDG 3 - Good Health and Well-being
020204 information systems
0202 electrical engineering, electronic engineering, information engineering
Dependability
[INFO]Computer Science [cs]
Structure (mathematical logic)
business.industry
Information technology
020207 software engineering
Security & Dependability Patterns
Software deployment
Pattern Deployment
business
computer
Organization
Computer Science(all)
Subjects
Details
- Language :
- English
- Database :
- OpenAIRE
- Journal :
- 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, 4th International Workshop on Security and Trust Management. In Conjunction with IFIPTM, joint iTrust and PST Conferences on Privacy, Trust Management and Security, Jun 2008, Trondheim, Norway. pp.27-39, ⟨10.1016/j.entcs.2009.07.036⟩, Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008), 27-30, STARTPAGE=27;ENDPAGE=30;TITLE=Proceedings of the 4th International Workshop on Security and Trust Management (STM'08, Trondheim, Norway, June 16-17, 2008)
- Accession number :
- edsair.doi.dedup.....104da0e95fbada8b62e582e9a7a43224
- Full Text :
- https://doi.org/10.1016/j.entcs.2009.07.036⟩