| Preface | 6 |
|---|
| Acknowledgements | 8 |
| Contents | 9 |
|---|
| List of Contributors | 11 |
|---|
| Efficient Integration of Complex Information Systems in the ATM Domain with Explicit Expert Knowledge Models | 14 |
|---|
| Introduction and Motivation | 15 |
| Objectives and Contribution | 16 |
| Related Work | 18 |
| Semantic Data Integration | 18 |
| Ontologies for Semantic Integration | 20 |
| Making Integration Knowledge Explicit | 22 |
| Abstract Integration Scenario Ontology | 22 |
| Domain-Specific Ontology | 22 |
| Integration System Ontology | 23 |
| SEEK-ATM Process Description | 24 |
| Traditional Integration Approach | 24 |
| SEEK-ATM Integration Approach | 24 |
| Added Value from Explicit Knowledge | 26 |
| Automated Identification of Integration Partner Candidates | 26 |
| Generation of Transformation Instructions | 26 |
| Generation of System Integration Configuration | 27 |
| Evaluation | 27 |
| Integration Effort | 27 |
| QA Efficiency | 29 |
| Model Complexity | 29 |
| Level of Automation Support | 29 |
| Conclusion and Future Work | 30 |
| References | 31 |
| An Ontology-Based Approach for Supporting Business-IT Alignment | 33 |
|---|
| Introduction | 34 |
| Background | 34 |
| What is Business-IT Alignment? | 34 |
| The B-SCP Framework | 35 |
| Seven-Eleven Japan Example | 37 |
| Related Work | 38 |
| Objectives and Contributions | 43 |
| Adding Semantics to the B-SCP Framework | 43 |
| Why an Ontology Based Approach? | 44 |
| Business Motivation Model Ontology | 45 |
| Discussion and Results | 47 |
| Future Work | 51 |
| Conclusion | 51 |
| References | 52 |
| EPCIS-Based Supply Chain Event Management | 55 |
|---|
| Introduction | 56 |
| EPCglobal Network | 58 |
| EPCglobal Architecture Framework | 58 |
| Electronic Product Code | 60 |
| EPC Information Services | 60 |
| Business Application | 62 |
| Decentralized EPCIS-Based SCEM | 64 |
| Data Layer | 64 |
| Protocol Layer | 65 |
| Application Layer | 69 |
| Quantitative Comparison of Two Architecture Approaches | 70 |
| EPCIS-Based Event Sharing Using Event Pull | 70 |
| EPCIS-Based SCEM Using Event Push (Our Proposal) | 72 |
| Evaluation | 72 |
| Parameters | 73 |
| Efficient Use of Network Capacity | 73 |
| Efficient Use of Storage Capacity | 74 |
| Reliability | 75 |
| Results | 76 |
| Discussion | 77 |
| Conclusions and Future Work | 78 |
| References | 79 |
| Cost-Benefit Analysis to Hedge with Third-Party Producers in Demand-Driven Production | 81 |
|---|
| Introduction | 81 |
| Related Work | 82 |
| Cost-Benefit Analysis to Hedge with Third-Party Producers | 86 |
| Probabilistic Approach for Cost-Benefit Analysis to Hedge with Third-Party Producers | 89 |
| Conclusion | 92 |
| References | 93 |
| A Security Assurance Model to Holistically Assess the Information Security Posture | 94 |
|---|
| Why Is Information Security Assessment a Complex Task? | 94 |
| Traditional Assessment Procedures | 95 |
| New Challenges Regarding the Assessment of InfoSec | 96 |
| A New Multidimensional InfoSec Assessment Framework | 97 |
| Assurance Analysis for an Effective and Efficient InfoSec Assessment Framework | 99 |
| Security Assurance Principles | 99 |
| An Assurance Related Concept: The Trust | 100 |
| An Holistic InfoSec Assurance Assessment Model (ISAAM) | 102 |
| The Structure | 102 |
| Lessons Learned from the Current Methodologies Related to the InfoSec Assurance Structure | 102 |
| The Holistic InfoSec Assurance Assessment Model (ISAAM) Structure | 105 |
| The Security Quality | 107 |
| State of the Art Related to the Quality Issues | 107 |
| Quality Aspects within the Holistic InfoSec Assurance Assessment Model (ISAAM) | 109 |
| The Requirements Side (Maturity Levels) | 110 |
| State of the Art Regarding the InfoSec Maturity Levels | 110 |
| The Holistic InfoSec Assurance Assessment Model (ISAAM) Maturity Level | 112 |
| Level 1: Fortuitous | 112 |
| <