Automating Enterprise Architecture Documentation using an Enterprise Service Bus
|
|
|
- Ashlie Lang
- 10 years ago
- Views:
Transcription
1 Automating Enterprise Architecture Documentation using an Enterprise Service Bus Journal: 8th Americas Conference on Information Systems Manuscript ID: AMCIS R Submission Type: Paper Track: Enterprise Architecture and Organizational Success < Enterprise Systems (SIGEntSys)
2 Page of 4 Americas Conference on Information Systems Automating Enterprise Architecture Documentation using an Enterprise Service Bus Markus Buschle Industrial Information and Control Systems KTH Royal Institute of Technology Osquldas v. 2, SE-0044 Stockholm, Sweden [email protected] Sebastian Grunow Chair for Informatics 9 (sebis) Technische Universität München [email protected] Florian Matthes Chair for Informatics 9 (sebis) Technische Universität München [email protected] Mathias Ekstedt Industrial Information and Control Systems KTH Royal Institute of Technology Osquldas v. 2, SE-0044 Stockholm, Sweden [email protected] Matheus Hauder Chair for Informatics 9 (sebis) Technische Universität München [email protected] Sascha Roth Chair for Informatics 9 (sebis) Technische Universität München [email protected] ABSTRACT Currently the documentation of Enterprise Architectures (EA) requires manual collection of data resulting in an error prone, expensive, and time consuming process. Recent approaches seek to automate and improve EA documentation by employing the productive system environment of organizations. In this paper, we investigate a specific Enterprise Service Bus (ESB) considered as the nervous system of an enterprise interconnecting business applications and processes as an information source. We evaluate the degree of coverage to which data of a productive system can be used for EA documentation. A vendor-specific ESB data model is reverse-engineered and transformation rules for three representative EA information models are derived. These transformation rules are employed to perform automated model transformations making the first step towards an automated EA documentation. We evaluate our approach using a productive ESB system from a leading enterprise of the fashion industry. Keywords Enterprise Architecture (EA) management, model transformation, automated EA documentation, Enterprise Service Bus, SAP Process Integration. INTRODUCTION Trends such as globalization and frequent changing market requirements challenge an enterprise to reduce costs in order to gain profit. The management discipline of Enterprise Architecture (EA) is finding acceptance as an approach to align business and IT to gain strategic advantages over competitors by increasing flexibility of IT, identifying and realizing costsaving potentials, increasing availability and failure tolerance, etc. (Weill and Ross 2009; Ross, Weill, and Robertson 2006; Zachman 987). While classical software engineering approaches focus on details, EA management tries to convey a holistic view of the entire enterprise (Buckl, Matthes, Roth, Schulz, and Schweda 200). Starting point of an EA endeavor commonly embraces the documentation of the current EA (Kurpjuweit and Winter 2007). As Enterprise Architecture commonly includes a large variety of business and IT artifacts as well as artifacts about their alignment, such documentation processes typically are regarded as time consuming and cost intensive (Farwick, Agreiter, Breu, Ryll, Voges, and Hanschke 20; Farwick, Agreiter, Ryll, Voges, Hanschke, and Breu 20; Department of Defense Architecture Framework Working Group & others 2007; Kaisler, Armour, and Valivullah 2005). Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2, 202.
3 Page 2 of 4 Business Capabilities Visions & Goals Questions & KPIs Strategies & Projects Principles & Standards Compliance Security Organization & Processes Business Services Applications & Information Infrastructure Services Infrastructure & Databases Figure. Holistic view on an Enterprise Architecture Consequently, to document the EA, most enterprises are first concerned with the creation of a (formal) model specifying the information about the EA to be documented. These models also referred to as information models (Lee 999) embrace concepts, relationships, constraints, rules, and operations to describe the EA formally. An analysis of literature reveals a considerable number of information models aimed at describing the EA information demand, e.g., ArchiMate (The Open Group 2009a, 202), CySeMoL (Sommestad, Ekstedt, and Johnson. 200), and planningit (Alfabet AG 202). Attempting to consolidate the different views (Buckl et al. 200) on the EA information demands Figure illustrates a compendious view on an EA. It starts from bottom-up with infrastructure & databases, e.g. networks, routers, server farms, etc. Those infrastructure elements are provided as infrastructure services to an upper layer, where applications & information are employed to realize business services. Business services are cross-grained services that build business processes executed by the organization. Services can be rearranged in order to create new business processes. Business capabilities describe core competencies enterprises offer, whereas the organizational structure is organized to efficiently execute business processes and function most effectively. So-called cross-cutting aspects influence afore introduced layers. A common vision is used to derive goals that are measured in KPIs answering questions. On all introduced levels, strategies and projects drive change that is guided by corporate principles and standards with respect to external factors like compliance and security. In EA management, a primary goal is to meet the right information demands of involved stakeholders. Those are manifold and could embrace the entire EA or parts thereof (cf. Figure ). An analysis of approaches for gathering the EA information, e.g. the current state of the application landscape, reveals a high degree of manual effort, e.g. interviews with information stewards, resulting in an errorprone and time consuming task. With increasing requirements on flexibility, agility, etc. recent approaches are not able to meet current challenges, in particular since there is a constantly growing information volume and no chance to determine the right information at the right quality. Recently, approaches for automating information gathering processes are proposed. Allowing for the existence of a lot necessary information in the operative IT, (Buschle, Holm, Sommestad, Ekstedt, and Shahzad 20) and (Farwick, Agreiter, Ryll et al. 20) propose to employ the IT of the infrastructure and database layer as an information source in order to avoid the expensive task of manual information collection. Nevertheless, even though these authors address this problem, only little research is done on the analysis of a potential information source. An Enterprise Service Bus (ESB), as the nervous system of an enterprise, coordinating interactions between business applications and processes could contain suitable information. Our research approach shown in Figure 2 envisions a productive ESB for the automated EA documentation. The approach is evaluated at an enterprise in the fashion industry using SAP PI as ESB. After revisiting related work, we follow the previously outlined approach starting with reverse-engineering the data model of SAP PI. We then compare this model with existing EA information models namely ArchiMate as a general approach, CySeMoL as an approach focusing on the infrastructure & database layer as well as planningit, a widespread EA tool developed by alphabet. The model coverage for ArchiMate that can be automatically extracted from an existing SAP PI instance is highlighted next. The automatic EA documentation of information is realized with transformation rules using the Atlas Transformation Language (ATL). Finally, we briefly compare the ArchiMate model coverage with the achieved coverage of CySeMoL and planningit. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
4 Page 3 of 4 Americas Conference on Information Systems ArchiMate information model ArchiMate coverage ArchiMate transformation rules SAP PI model SAP PI data model CySeMol information model CySeMol coverage CySeMol transformation rules planningit information model planningit coverage planningit transformation rules Reverse engineering Conceptual mapping Model coverage analysis Formal transformation existing artifact new design artifact RELATED WORK Figure 2. Approach for model transformations towards automated EA documentation Despite the existence of several EA frameworks including inter alia The Open Group Architecture Framework (TOGAF) (The Open Group 2009b), The Integrated Architecture Framework (Wout, Waage, Hartman, Stahlecker, and Hofman 200), and Enterprise Architecture Planning (EAP) (Spewak and Hill 993) commonly the frameworks abstract from details on how to acquire and incorporate Enterprise Architecture knowledge from other sources (Buckl and Schweda 2009). Only few approaches addressing the documentation of the status quo can be found. However, the suggestions made are usually at a high abstraction level and limited to giving a few advices rather than concrete task descriptions. For instance, TOGAF suggests the usage of existing architecture definitions as a starting point, which, if necessary, can be updated and verified. In case such descriptions do not exist TOGAF advices to gather data in whatever format comes to hand (The Open Group 2009b) not providing guidelines for dealing adequately with information on Enterprise Architecture level. A first idea for an automated tool-aided processes can be found in (Moser, Junginger, Brückmann, and Schöne 2009) proposing a set of EA process patterns, one of which is called Automatic Data Acquisitions/Maintenance. The authors present a process to automatically collect data from various sources subsequently converted into an EA information model instance. However, the considerations remain at a high abstraction level not detailing the mapping of collected data onto EA information. This also applies to (Farwick, Agreiter, Ryll et al. 20). Apart from identifying requirements on a potential automated process, they develop a basic structure of an automated maintenance process comprising the collection of data as well as the propagation of changes. The introduced process is composed out of four different sub-processes including the addition of new information sources, the propagation of changes, the integration and consolidation of different data flows and finally the evaluation of the data by stakeholders. When it comes to the conversion of the extracted data to the internal EA information model (Farwick, Agreiter, Ryll et al. 20) refer to a semantic mapping between the provided data, and the internal data structure without going further in-depth. Up till now one publication could only be identified dealing with the transformation of extracted data to EA information. Buschle et al. (Buschle et al. 20) use NeXpose (Rapid7 202), a vulnerability scanner, aimed at determining weaknesses within a network automatically. Apart from security risks, the scanner collects information about the system landscape with focus on technology and application aspects subsequently converted into EA information. The transformation is extracting elements from the NeXpose reports stored in XML files and mapping them to the corresponding CySeMoL elements in the second step. For instance, the data provided by NeXpose allow the authors to gather a great deal of information comprising inter alia the determination of services, installed software, and used operating systems. However, gaps exist above all in business fields, e.g., the determination of business objects and business processes as well as in application aspects, e.g., the collection of provided services and exchanged information. With regard to an application of ESB as an information source for EA documentation no publication, both in practice as well as in research, could be found tackling this subject. Accordingly, this is the first contribution in this area. ANALYSIS AND FORMAL DESCRIPTION OF SAP PI DATA Main purpose of an Enterprise Service Bus (ESB) is to manage the interaction between different software applications within an enterprise. Since we use SAP PI from our industry partner as a concrete implementation of an ESB, its main software components are shown in Figure 3. Based on SAP PI s database schema a data model is reverse-engineered in the first step. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
5 Page 4 of 4 In a second step, a study of the SAP documentation revealed the main elements of the system. Both steps are necessary to obtain the model coverage of the EA information models and derive a transformation method in order to automatically document the EA. Subsequently these components are investigated in detail along with the data model shown in Figure 4. The data model only shows the most relevant entities while less important details are omitted from the figure. System Landscape Directory This component is the central source of information for the entire system landscape. Within the system landscape directory there is a distinction between software products and software components. The software product is, according to the official definition, a unit that can be delivered, is visible to the customer, is installable and can be renewed. A software component in turn represents the reusable and not directly installable components of a software product. While software component and software product represent installable software in its original state, installed software product and installed software component version model concrete installations which can be updated and altered with patches. A separation is made between technical systems representing application systems and business systems which are logical elements functioning as senders, receivers or both. In this context a business system is exactly one technical system, so that changes to the technical infrastructure has no effect on the design elements but only the relationship between both types of systems (Nicolescu 2009). Enterprise Service Builder The enterprise service builder serves as central environment to design, create and maintain the interactions between applications (Nicolescu 2009). This includes the description of service interfaces in an independent design time representation of a service. In case the service is provided or expected from the environment a distinction is made between inbound (receiving messages) and outbound interfaces (sending messages). These services are composed of one or more operations. The structure of an operation is described, inter alia, by data types allowing the description of input and output messages. While the simple message processing is stateless, the enterprise service builder allows the definition of integration processes that are able to use the knowledge of messages that already have been preceded. Integration Builder The integration builder specifies the configuration of communication relationships at runtime by mapping the design information stored in the enterprise service builder to the actual execution environment (Nicolescu 2009). Messages are processed by communication components that are specialized to integration processes, business systems and business components. A business component describes an abstract unit which is usually used in business to business communication relationships in order to hide details of the system landscape. In addition, sender as well as receiver agreements contain a reference to communication channels specifying the configuration of an adapter for a specific communication relation. Routing rules are determined by receiver determinations defining which receivers a message is sent to as well as interface determinations providing information about which interfaces a message is sent to. In both cases the source interface and source communication component are taken into account for the identification of the target elements. Party is a larger unit, especially involved in cross company processes (SAP 2009). RELATING SAP PI DATA WITH EA INFORMATION DEMAND The challenge of using existing IT runtime systems for EA documentation is to be able to extract useful Enterprise Architecture information. For that, the extent to which the EA information demand set up by selected information models is met by SAP PI is analyzed below. The aim is not only to compare SAP PI with a set of information models, but also to draw representative conclusions about the application potential of SAP PI in general. Consequently, the selection attempts to achieve a representative overview, including ArchiMate, CySeMoL, and planningit. Despite differences with regard to ESB architectures, they offer similar functionality leading to conformity of the data content. Accordingly, the following considerations are supposed to provide a starting point for other ESB systems. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
6 Page 5 of 4 Americas Conference on Information Systems Integration Repository Monitoring (Runtime Workbench) SAP Application Enterprise Service Builder Integration Builder Integration Server Third Party Application Marketplace/ Business Partner Third Party Middleware System Landscape Directory Figure 3. Overview of the different software components in the Enterprise Service Bus system SAP PI ArchiMate is an independent modeling language maintained by The Open Group. Conforming with the general view of EA information content (Fischer, Aier, and Winter 2007), ArchiMate foc on conveying a holistic view of the enterprise while intentionally abstracting from details. This global, comprehensive way of viewing demonstrates yet a first difference compared to SAP PI whose data are intended to detail the interactions and communications to allow automated processing. The mapping of SAP PI data content onto EA information models must therefore follow two principles, abstraction from details and combination of data leading to data on higher granularity levels. Within ArchiMate the architecture of an organization is divided into three main layers (business, application, and technology) and categorized into three concepts (structural, behavioral, informational). The ArchiMate information model is shown in Figure 5 and is compared with the previously outlined SAP PI data model in Figure 4. Business Layer The previous, detailed analysis of SAP PI s data content already leads to the presumption that SAP PI as a productive system is only of limited value to determine business information. However, when considering business aspects of SAP PI, it emphasizes the idea of business information that is implicitly contained in its data. Reconstruction thereof is answered below. The informational concepts, intended to link the operational side with business goals, are made up of information carriers (business objects, products, and contracts), information representation (representation), and elements describing their commutative goals (meaning and value). Considering the formal SAP PI data model, information about underlying, pursued goals is completely absent. In contrast, even though business objects, understood as a unit of information relevant from a business perspective (The Open Group 202), are not directly included in SAP PI, data types can be seen as first indications on their existence. Following the SAP PI best practice data naming conventions data types are named after the corresponding business object they are supposed to implement (SAP 2009). In this connection, SAP PI adapters provide first glance about their representation, including technologies such as . Finally, products, a collection of application and business services, are one of ArchiMate s elements about which clues are included in SAP PI but the strong technical focus does not allow to reconstruct them unequivocally. On the one hand, SAP PI does not directly describe the provided services but only their way of access. On the other hand, an automated aggregation of services going together into products remains questionable. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
7 Page 6 of 4 Product Software Component Computer System Product Version Software Component Version -runson Service Interface Abstract Interface -installedon Technical System Installed Software Product Installed Software Component Version Business System Business Component Integration Process Outbound Interface -sender Inbound Interface -receivers Party -ownedby -receivers Communication Component Receiver Determination 0.. -Sender Interface Determination Figure 4. Reverse-engineered data model of the SAP PI Enterprise Service Bus The point of access of provided functionality is modeled as business interfaces ranging from technologies such as mail to complex structure such as departments receiving and forwarding requests. While SAP PI is entirely suited regarding the former, information about complex business connections is obsolete. In contrast, business actors represent organizational units with the capability of performing behavior. Even though the corresponding SAP PI element, party, commonly refers to an organization and thus appears to be too coarse grained, it can be advantageous to interpret the definition of business actor more broadly, especially, when analyzing cross-company relationships. With regard to behavioral elements a distinction is drawn between external (business services) and internal visible functionality (business processes and business functions). Defined as a piece of functionality offering added values to the environment, business services are not considered in SAP PI only describing the way of access in the form of technologies (see business interfaces) abstracting from functionality information. The description of internal behavior in ArchiMate ranges from a process view (business process) to a functional view (business function). A business process is understood as a unit of internal behavior or collection of causally-related units of internal behavior intended to produce a defined set of products and services (The Open Group 202). The definition of integration processes comes closest differing, however, in the technical focus neglecting the aspect to follow an overall goal. Similar conclusions can be drawn for the other behavior elements. To sum up, although SAP PIs elements are meant to implement business functionality a reconstruction of business information is commonly hindered by the strong technology focus. Even at this early stage the hypothesis can be proposed that this also applies to other productive systems to be used for an automated process. For instance, (Buschle et al. 20) came to the same conclusion regarding NeXpose, primary providing technology information. Application Layer Central to the application layer is the application component specified as a modular, deployable, and replaceable part of a system (The Open Group 202). While SAP PI introduces two similar concepts, software components and software products, software components are not meant to be deployable in contrast to software products. A temporary configuration of two or more application components aimed at performing a higher functionality is modeled as an application collaboration. A similar objective occurs at integration processes describing the coordinated message exchange between several software products. Accordingly, the products involved in the message exchange processes form an application collaboration. Access to the underlying services provided by application components as well as their groupings is modeled by application interfaces, broadly equivalent to SAP PI s enterprise service interface. The determination of which application component Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
8 Page 7 of 4 Americas Conference on Information Systems invokes which interface is implicitly included in SAP PI s routing information (receiver determination and interface determination) defining the message exchange between enterprise service interfaces and software products. Similar to the business layer, the behavioral concept makes a distinction between internal and external visible functionality. While internal functionality of application components remains invisible to an ESB, first indications on external visible functionality (application services) exist. In SAP PI no specific elements are intended to be used for describing behavioral information. Instead, such information is available rather indirectly in interfaces and the included descriptions of operations. However, even though the operations contain all service information, it is questionable whether the operations can be automatically aggregated to specify the service forming the combined functionality. The informational concepts are made up by only one element, the data object, a coherent, self-contained piece of information suitable for automated processing. All of these requirements are met by SAP PIs data types. Value Product Meaning Business Interface Contract Business Object Business Service realized composed of Business Layer Representation Business Behavior Element composes Business Role Business Process Business Event Business Actor Business Function Business Interaction Business Collaboration Application Service Application Interface composed of Data Object Application Layer Application Function composes Application Component Application Collaboration Infrastructure Service Infrastructure Interface composed of composes Technology Layer Node Communication Path Artifact System Software Device Network Figure 5. ArchiMate information model according to (The Open Group 202) Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
9 Page 8 of 4 Technology Layer The technology layer comprises information about the underlying infrastructure. This begins with node, modeling a computational resource and thus corresponds to SAP PI s computer system. In contrast to the application layer, as the provided and needed interfaces of infrastructure components are not of importance for the coordination of applications, no information appears from the available data. Besides components, two types of relationships on different level of abstraction exist, communication paths, modeling a logical exchange relationship and networks referring to physical communicational medium. While the underlying physical mediums are abstracted in SAP PI each invocation of a service comprises two communication paths, one between the service client and SAP PI and the other one between SAP PI and the service provider. Value Product Meaning Business Interface Contract Business Object Business Service realized composed of Business Layer Representation Business Behavior Element composes Business Role Business Process Business Event Business Actor Business Function Business Interaction Business Collaboration Application Service Application Interface composed of Data Object Application Layer Application Function composes Application Component Application Collaboration Infrastructure Service Infrastructure Interface composed of composes Technology Layer Node Communication Path Artifact System Software Device Network Elements which can be completely reconstructed based on SAP PI Elements whereby first hints on them can be determined but a complete reconstruction is not possible, e.g., as the data are too fine-grained Elements no information is provided about Figure 6. ArchiMate information model elements covered by SAP PI In contrast to the application layer, attention is only paid to external visible functionality (infrastructure services), which similar to the interfaces, are not stored in SAP PI. As a special feature of ArchiMate, system software ( software environment for specific types of components and objects (The Open Group 202) belongs to the behavioral concepts. In SAP PI, a Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
10 Page 9 of 4 Americas Conference on Information Systems subset of installed system software is registered at the System Landscape Directory, including the following elements: operating systems, database systems and technical systems. Finally, artifact, the sole informational element, represents a physical piece of information (The Open Group 202). With the exception of files imported by the SAP PI components such as WSDL files for specifying interfaces, information about existing artifacts especially the artifacts the application components are is not available. Cross-cutting Aspects Aimed at providing a better alignment with TOGAF, ArchiMate, in its newest version, provides two extensions including motivation aspects, e.g., stakeholders, drivers and changes as well as implementation and migration extensions ranging from portfolio management to gap analysis (The Open Group 202). However, such organizational background information is not directly stored in SAP PI. Summary of ArchiMate model coverage The detailed comparison of SAP PI with the EA information demand of ArchiMate reveals differences in the support for the layers. Primarily, structural application and technology aspects can be determined which is mainly attributed to the operative system characteristics of SAP PI. The information model elements of ArchiMate covered by SAP PI are shown in Figure 6. Nevertheless, some behavioral information is implicitly contained in the structural elements, ranging from the description of operations in interfaces to naming conventions. While SAP PI provides indications on business objects, behavioral and hierarchical information are missing to a large extent. For some business related aspects first technical hints could help to identify and accelerate subsequent manual data collection steps. Evaluation of other information models Apart from ArchiMate an evaluation of CySeMoL and planningit is performed. In contrast to ArchiMate composed out of aggregated information within and across the enterprise layers, CySeMoL is focused on a specific area IT security (Sommestad et al. 200). Thereby, business aspects are neglected to a large extent and only considered indirectly in one attribute expected loss representing the expected loss e.g., in the case of an attack. The modeling language is more focused towards application and technology information making the strong technical view of SAP PI of slight disadvantage. However, gaps exist in the area of possible attacks and existing countermeasures which can only be partly gained. PlanningIT is an integrated software suite aimed at supporting different tasks of Business IT management provided by alfabet (Alfabet AG 202). Compared to planningit the scope of ArchiMate as well as of CySeMoL is lower, which is mainly due to the fact that both frameworks merely outline a starting point and require concretization. While ArchiMate defines the entities on a very general level, CySeMoL proposes only an abstract information model expecting the definition of a concrete one. The information model has a similar structure to ArchiMate suffering from similar problems: While application and technology architecture are well covered business information is abstracted to a large extent. To sum up, SAP PI covers the EA information demand only partly with focus on application and technology information making additional sources necessary to completely meet the EA information demand. FORMAL TRANSFORMATION OF SAP PI TO EA INFORMATION MODELS Subsequently, we completed the theoretical comparison of SAP PI and selected EA information models by a prototypical implementation. To allow an automated creation of an EA information model instance and to achieve consistency between both models, a model transformation approach is pursued. For this purpose, all involved models need to be formally described, leading to the use of Ecore (Eclipse 202b), the de-facto modeling standard within the Eclipse community. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
11 Page 0 of 4 Ecore M2 Information Model ArchiMate Data Model SAP PI ATL Information Model CySeMoL M Information Model planningit SAPPI2ArchiMate SAPPI2CySeMoL SAPPI2planningIT Model SAP PI <<transformation>> <<transformation>> Model planningit Model CySeMoL M0 <<transformation>> Model ArchiMate Figure 7. Different abstraction layers of the SAP PI data model and EA information model transformations For selecting a transformation language several requirements should be taken into account, including appropriate tool support, expressiveness, and an appropriate documentation. An analysis of various transformation technologies revealed that ATL (Eclipse 202a) meets the requirements best. Deficits exist only regarding the sparse documentation which is compensated by the enormous amount of code samples. Within the implementation, the previous defined, informal transformation rules expressed in natural language are formally specified in ATL to be processed automatically. Figure 7 provides an overview of the ATL transformation enabling to transform the SAP PI data content (left-hand side) to EA information models (right-hand side). We implemented the transformation rules for three information models: ArchiMate, CySeMoL, and planningit. Each rule set requires an Ecore instance describing the corresponding information model and an ATL script. The initial target was a complete declarative solution deviated in some cases due to complex processes making imperative constructs necessary. Figure 8 exemplifies model transformations (dashed lines) on the basis of practical data provided by a German fashion enterprise. Visible is the business system MOL converted into one application collaboration on the ArchiMate side. The corresponding sub-software products MI and PI are mapped onto application components. These allow determining the subcomponents of the Application Collaboration MOL. The last example transformation relates the provided inbound interface to an application interface offered to the environment by application component MI. As an example, Figure 8 further illustrates a simplified, declarative ATL matched rule generating an Application Component (to) out of an Installed Software Product (from). The rule is composed of a source pattern specifying the source object (Installed Software Product) in the SAP PI information model which is transformed into a target object (Application Component) whereby the name is taken over. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
12 Page of 4 Americas Conference on Information Systems MOL : Business System <<transformation>> MOL : Application Collaboration MI : Installed Software Product PI : Installed Software Product <<transformation>> PI : Application Component MI : Application Component <<transformation>> MI : Installed Software Component Version MI : Software Component Version 204 : Inbound Interface Practical data subset rule InstalledSoftwareProduct2ApplicationComponent { from installedsoftwareproduct : SAPPI!InstalledSoftwareProduct to applicationcomponent : ARCHIMATE!ApplicationComponent ( name <- installedsoftwareproduct.name,. ) } <<transformation>> ArchiMate subset 204 : Application Interface Figure 8. Transformation example with an ATL rule CONCLUSION AND OUTLOOK In this paper we showed EA documentation highly benefits from an automated collection of existing information using a productive system as an information source. Figure 9 illustrates the model coverage of the EA information models in our approach. The majority of EA relevant information in an SAP PI system is located on the infrastructure & database layer and the application & information layer. Deviances in the degree of model coverage between the EA information models can be explained by their different purpose and nature. While CySeMol foc on infrastructure aspects, ArchiMate in turn seeks to capture a holistic view on enterprise aspects. Except for the organization & processes layer planningit had the lowest model coverage. Business Capabilities Legend Visions & Goals Questions & KPIs 0% 0% 0% Strategies & Projects 0% 0% 0% Principles & Standards 0% 0% 0% Compliance Security 0% 0% 0% Organization & Processes 20% 0% 0% Business Services Applications & Information 75% 00% 0% Infrastructure Services Infrastructure & Databases 50% 40% 25% ArchiMate CySeMoL planningit 0% average coverage ~0% average coverage ~40% average coverage ~80% average coverage Figure 9. Model coverage of EA information automatically extracted from SAP PI The extraction of EA information from a data source requires formal model transformations to automate documentation. This model transformation requires information models from both, source and target. In our example, we reverse-engineered an information model of SAP PI as a prominent example of an ESB system. The information is extracted from productive systems from a leading enterprise of the fashion industry and is automatically mapped with a transformation language. The retrieved SAP PI information does not cover business aspects of all analyzed EA models. Additional data sources could provide organization & processes layer information to improve model coverage. Further research is necessary to reveal possible data sources in enterprises to extract EA information. Our research endeavor targets to automate large parts of the EA documentation. We expect to reduce documentation costs and improve data quality for decision makers. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2, 202.
13 Page 2 of 4 REFERENCES. Alfabet AG (202) alfabet. Available at: [accessed Feb. 28 th, 202]. 2. Buckl, S. and Schweda, C.M. (2009) Future Research Topics in Enterprise Architecture Management - A Knowledge Management Perspective, Trends in Enterprise Architecture Research, Stockholm, Sweden. 3. Buckl, S., Matthes, F., Roth, S., Schulz, C., and Schweda, C.M. (200) A conceptual framework for enterprise architecture design. Trends in Enterprise Architecture Research, Delft, Netherlands. 4. Buschle, M., Holm, H., Sommestad, T., Ekstedt, M., and Shahzad, K. (20) A Tool for automatic Enterprise Architecture modeling, Conference on Advanced Information Systems Engineering Forum. 5. Department of Defense Architecture Framework Working Group & others (2007) DoD Architecture Framework, version.5. Department of Defense, USA. 6. Eclipse (202a) Atlas Transformation Language. Available at: [accessed February 29, 202]. 7. Eclipse (202b) Eclipse Modeling Framework. Available at: [accessed Feb. 29 th, 202]. 8. Farwick, M., Agreiter, B., Breu, R., Ryll, S., Voges, K., and Hanschke, I. (20) Requirements for automated Enterprise Architecture Model Maintenance, 3th International Conference on Enterprise Information Systems, Beijing, China. 9. Farwick, M., Agreiter, B., Ryll, S., Voges, K., Hanschke, I., and Breu, R. (20) Automation Processes for Enterprise Architecture Management, Trends in Enterprise Architecture Research, Helsinki, Finland. 0. Fischer, R., Aier, S., and Winter, R. (2007) A Federated Approach to Enterprise Architecture Model Maintenance, Enterprise Modelling and Information Systems Architectures Concepts and Applications, 2nd Int l Workshop EMISA. Bonn, Germany.. Kaisler, S., Armour, F., and Valivullah, M. (2005) Enterprise architecting: Critical problems, 38th Hawaii International Conference on System Sciences. 2. Kurpjuweit, S. and Winter, R. (2007) Viewpoint-based meta model engineering, Enterprise Modeling and Information Systems Architectures-Concepts and Applications, pp Lee, Y.T. (999) Information modeling: From design to implementation, Second World Manufacturing Congress, pp Moser, C., Junginger, S., Brückmann, M., and Schöne, K.-M. (2009). Some Process Patterns for Enterprise Architecture Management, Strategy, pp Available at: [Accessed February 29 th, 202]. 5. Nicolescu, V. (2009) Praxishandbuch SAP NetWeaver PI Entwicklung. SAP Press. 6. Rapid7 (202) NeXpose. Available at: [Accessed February 29 th, 202]. 7. Ross, J.W., Weill, P., and Robertson, D. (2006) Enterprise architecture as strategy: Creating a foundation for business execution, Harvard Business Press. 8. SAP (2009) SAP PI Best Practices: Naming Conventions. Available at: prtroot/docs/library/uuid/40a66d0e-fe5e-2c0-8a85-e48b59ab36a [Accessed February 29 th, 202]. 9. Sommestad, T., Ekstedt, M., and Johnson, P. (200) A probabilistic relational model for security risk analysis, Computers & Security, 29, p Spewak, S. and Hill, S.C. (993) Enterprise Architecture Planning: Developing a Blueprint for Data, Applications, and Technology, Second Edition, John Wiley & Sons, London. 2. The Open Group (2009a) ArchiMate.0 Specification, Van Haren Publishing. 22. The Open Group (2009b). TOGAF Version 9 A Manual, Van Haren Publishing. 23. The Open Group (202). ArchiMate 2.0, Available at: [Accessed February 28th, 202]. 24. Weill, P. and Ross J. W. (2009). IT Savvy What Top Executives Must Know to Go from Pain to Gain, Harvard Business Press. Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
14 Page 3 of 4 Americas Conference on Information Systems 25. Wout, J., Waage, M., Hartman, H., Stahlecker, M., and Hofman, A. (200) The Integrated Architecture Framework Explained: Why, What, How First. Springer, Berlin. 26. Zachman, J.A., 987. A framework for information systems architecture. IBM systems journal, 26(3), p APPENDIX Objective Business-Process Model Market Product Management Objective Organizational Objective Strategic Objetive Compliance Business Architecture Business Process Business Information Flow Business-Service-Request Business Support Virtual ICT Object Organization Sub-Organisation Strategy Risk Management Business Object Application Architecture «refines» Business Data Informationflow External System Business Function «bind» Functional Module Business Service Application ICT Object Layer Platform Tier Component Virtual Organization Party Product Party... Cost Management History Cross-architecture elements Infrastructure Architecture Location Logical Device Device Physical Device Project Management Elements which can be completely reconstructed based on SAP PI Elements whereby first hints on them can be determined but a complete reconstruction is not possible, e.g., as the data are too fine-grained Elements no information is provided about Figure 0. PlanningIT information model elements covered by SAP PI Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
15 Page 4 of 4 IDSSensor <<DC Functioning << PC Legend Class << Superclass Countermeasures that have an association to this class and whose cardinality is 0.. PerimeterIDS Attribute << PC Attribute << DC Attribute << RC PC = PreventiveCountermeasure DC = DetectiveCountermeasure RC = ReactiveCountermeasure AC = AccountabiliyCountermeasure CC = Contingency Countermeasure Attribute << AC ZoneManagementProcess <<Asset UntrustedZoneNetworkInterface <<Asset StaticARPTables << PC Firewall Firewall << PC Functioning << PC Attribute << CC Attribute<<AS Attack steps that target this class. AS = AttackStep IncidentHandlingProcedures << RC HostHardeningProcedures << PC ARPSpoof << AS [Domain] [Range] FormalPatchAndUpdatingProcess << PC RegularLogReviews << PC TrustedZone DenialOfService << AS BypassRuleSet << AS ReferenceSlot RegularSecurityAudits << PC FormalChangeManagentProcess << PC Allows IPS HIDS IPS << PC Functioning << PC HasAllLowSeverityPatches << PC OperatingSystem <<Software HasAllMediumSeverityPatches << PC InternalIDS NetworkZone <<Asset DNSsec << PC HasAllHighSeverityPatches << PC AutorunDisabled << PC StaticARPTables << PC ManagementProcess PortSecurity << PC ModemGateway HostFirewall << PC AddressSpaceLayoutRandomization << PC PhysicalZone DenialOfService << AS FindUnknownEntryPoint << AS VPN Gateway Proxy Service <<Software Executable space protection << PC Access << AS ObtainOwnAddress << AS HasAllLowSeverityPatches << PC DenialOfService << AS HasAllMediumSeverityPatches << PC FindLowSeverityVulnerability << AS Protocol <<Asset FreshnessIndicator << PC CryptographicAuthentication << PC Protocol Medium Client Server Data Flow <<Asset HasAllHighSeverityPatches << PC Access << AS DenialOfService << AS FindMediumSeverityVulnerability << AS FindHighSeverityVulnerability << AS ConnectToFromSameZone << AS ExecutionOfArbitaryCodeInUnknownServicesFromSameZone << AS CryptographicObufuscation << PC FindLowSeverityVulnerability << AS ExecutionOfArbitaryCodeInOSServicesFromSameZone << AS Disrupt << AS Replay << AS Zone ControlledBy SoftwareInstallation <<Asset FindMediumSeverityVulnerability << AS FindHighSeverityVulnerability << AS AccessFromSameZone << Access << AS AccessThroughPortableMedia << Access << AS Write Eavesdrop << AS Client HasAllLowSeverityPatches << PC ConnectToFromSameZone << AS ConnectToFromOtherZone << AS DataStore<<Asset Read ManInTheMiddle << AS ProduceRequest << AS ProduceResponse << AS Server HasAllMediumSeverityPatches << PC HasAllHighSeverityPatches << PC ExecutionOfArbitaryCodeFromSameZone << AS ConnectToFromOtherZone << AS ExecutionOfArbitaryCodeFromOtherZone << AS ExecutionOfArbitaryCodeInUnknownServicesFromOtherZone << AS ExecutionOfArbitaryCodeInOSServicesFromOtherZone << AS AccessFromOtherZone << Access << AS ARPSpoof << AS CryptographicObufuscation << PC ReadData << AS Owner Access << AS DenialOfService << AS FindLowSeverityVulnerability << AS Operates<<Control ProxyGateway ApplicationClient << SoftwareInstallation WriteData << AS PhysicalZone FindMediumSeverityVulnerability << AS HasAllLowSeverityPatches << PC DeleteData << AS FindHighSeverityVulnerability << AS ACL HasAllMediumSeverityPatches << PC ProductOf HasAllHighSeverityPatches << PC Access << AS SoftwareProduct <<Asset AccessControlPoint <<Asset DenialOfService << AS FindLowSeverityVulnerability << AS OnlyUsesSafeLibraries << AS ObtainSourceCode << AS ObtainBinaryCode << AS User FindMediumSeverityVulnerability << AS FindHighSeverityVulnerability << AS PhysicalZone <<Asset FindPublicPatchableExploitForHighSeverityVuln << AS FindPublicPatchableExploitForMediumSeverityVuln << AS AuthenticationMechanism ExecutionOfArbitaryCodeFromSameZone << AS ExecutionOfArbitaryCodeFromOtherZone << AS Access << AS FindPublicPatchableExploitForLowSeverityVuln << AS MakeUserInstallTrojanHorse << AS FindPublicUnpatchableExploitForHighSeverityVuln << AS FindPublicUnpatchableExploitForMediumSeverityVuln << AS FindPublicUnpatchableExploitForLowSeverityVuln << AS PasswordAuthenticationMechanism <<AuthenticationMechanism User DevelopPatchableExploitForHighSeverityVuln << AS Functioning << PC DevelopPatchableExploitForMediumSeverityVuln << AS AutomatedPolicyEnforcer << AS DevelopPatchableExploitForLowSeverityVuln << AS HashedRepository << AS DevelopUnpatchableExploitForHighSeverityVuln << AS DevelopPublicUnpatchableExploitForMediumSeverityVuln << AS DevelopUnpatchableExploitForLowSeverityVuln << AS AuthenticationMechanism <<PC Functioning << PC HashedRepositorySalted << AS DefaultPasswordsRemoved << AS BackoffTechnique << PC BackoffTechnique << PC ExtractPasswordRepository << AS Account <<Asset PasswordAccount <<Account GuessAuthenticationCodesOffline << AS GuessAuthenticationCodesOffline << AS OwnedBy SocialEngineerAuthenticationCode << AS SocialEngineerAuthenticationCode << AS GuessAuthenticationCodeOnline << AS GuessAuthenticationCodeOnline << AS SecurityAwarenessProgram <<Asset Person <<Asset Functioning AwarenessProgram Elements which can be completely reconstructed based on SAP PI Elements whereby first hints on them can be determined but a complete reconstruction is not possible, e.g., as the data are too finegrained Elements no information is provided about Figure. CySeMoL information model elements covered by SAP PI Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, Washington, August 9-2,
Automated Enterprise Service Bus based Enterprise Architecture-Documentation. Sebastian Grunow. Degree project. Second Level,
Automated Enterprise Service Bus based Enterprise Architecture-Documentation Sebastian Grunow Degree project Second Level, Stockholm, Sweden 2011 Automated Enterprise Service Bus based Enterprise Architecture-Documentation
Towards Automation of Enterprise Architecture Model Maintenance
Towards Automation of Enterprise Architecture Model Maintenance Matthias Farwick (Supervisor: Ruth Breu) University of Innsbruck, Institute of Computer Science [email protected] http://www.q-e.at
DEPARTMENT OF INFORMATICS. Scenario-based Analysis of Collaborative Enterprise Architecture Management Tools
DEPARTMENT OF INFORMATICS TECHNISCHE UNIVERSITÄT MÜNCHEN Master s Thesis in Information Systems Scenario-based Analysis of Collaborative Enterprise Architecture Management Tools Nikolaus Katinszky DEPARTMENT
A Tool for Automatic Enterprise Architecture Modeling
A Tool for Automatic Enterprise Architecture Modeling Markus Buschle, Hannes Holm, Teodor Sommestad, Mathias Ekstedt, and Khurram Shahzad Industrial Information and Control Systems, KTH Royal Institute
Modelling, Analysing and Improving an ERP Architecture with ArchiMate
Modelling, Analysing and Improving an ERP Architecture with ArchiMate June 25th, 2014 Heinz-Juergen Scherer, TransWare Tim Vehof, BiZZdesign Agenda Introduction Enterprise Architecture ERP systems and
A Practical Perspective on the Design and Implementation of Enterprise Integration Solution to improve QoS using SAP NetWeaver Platform
A Practical Perspective on the Design and Implementation of Enterprise Integration Solution to improve QoS using SAP NetWeaver Platform K.KRISHNA MOHAN 1, A.K.VERMA 1, A.SRIVIDYA 1, 1 Reliability Engineering
Enterprise Architecture
Fakultät für Informatik Technische Universität München Enterprise Architecture Management Tool Survey 2008 Iteratec IT-Management Workshop 8.10.2008 Florian Matthes Software Engineering for Business Information
SOA: The missing link between Enterprise Architecture and Solution Architecture
SOA: The missing link between Enterprise Architecture and Solution Architecture Jaidip Banerjee and Sohel Aziz Enterprise Architecture (EA) is increasingly being acknowledged as the way to maximize existing
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS
SERVICE-ORIENTED MODELING FRAMEWORK (SOMF ) VERSION 2.1 SERVICE-ORIENTED SOFTWARE ARCHITECTURE MODEL LANGUAGE SPECIFICATIONS 1 TABLE OF CONTENTS INTRODUCTION... 3 About The Service-Oriented Modeling Framework
ArchiMate Extension for Modeling the TOGAF Implementation and Migration Phases
ArchiMate Extension for Modeling the TOGAF Implementation and Migration Phases A White Paper by: Henk Jonkers, Harmen van den Berg, Maria-Eugenia Iacob, and Dick Quartel December 2010 Copyright 2010 The
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures
The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures Teodor Sommestad, Mathias Ekstedt, and Hannes Holm Abstract The Cyber Security Modeling Language
Semantic Enterprise Architecture Management
Semantic Enterprise Architecture Management Chen, Willy 1, Hess, Claudia 1, Langermeier, Melanie 2, Stuelpnagel, Janno 1 and Diefenthaler, Philipp 1,2 1 Softplant GmbH, Munich, Germany 2 Department of
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Sebis Study: Cloud Adoption and Strategy 2013
This publication can be cited as: Monahov, Ivan; Shumaiev, Klym; Matthes, Florian: Sebis Study: Cloud Adoption and Strategy 2013, version 0.9, December, 2013. Ivan Monahov, Klym Shumaiev, Florian Matthes
Five best practices for deploying a successful service-oriented architecture
IBM Global Services April 2008 Five best practices for deploying a successful service-oriented architecture Leveraging lessons learned from the IBM Academy of Technology Executive Summary Today s innovative
NASCIO EA Development Tool-Kit Solution Architecture. Version 3.0
NASCIO EA Development Tool-Kit Solution Architecture Version 3.0 October 2004 TABLE OF CONTENTS SOLUTION ARCHITECTURE...1 Introduction...1 Benefits...3 Link to Implementation Planning...4 Definitions...5
Examining Adaptive Case Management to Support Processes for Enterprise Architecture Management
Examining Adaptive Case Management to Support Processes for Enterprise Architecture Management Matheus Hauder, Dominik Münch, Felix Michel, Alexej Utz, Florian Matthes Technische Universität München (TUM)
Service-Oriented Architectures
Architectures Computing & 2009-11-06 Architectures Computing & SERVICE-ORIENTED COMPUTING (SOC) A new computing paradigm revolving around the concept of software as a service Assumes that entire systems
Developing SOA solutions using IBM SOA Foundation
Developing SOA solutions using IBM SOA Foundation Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 4.0.3 4.0.3 Unit objectives After completing this
A Comparison of SOA Methodologies Analysis & Design Phases
202 A Comparison of SOA Methodologies Analysis & Design Phases Sandra SVANIDZAITĖ Institute of Mathematics and Informatics, Vilnius University Abstract. Service oriented computing is a new software engineering
Portable Cloud Services Using TOSCA
Institute of Architecture of Application Systems Portable Cloud Services Using TOSCA Tobias Binz, Gerd Breiter, Frank Leymann, and Thomas Spatzier Institute of Architecture of Application Systems, University
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
A Methodology for Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB 76131 Karlsruhe,
DOCUMENTOS DE TRABAJO Serie Gestión
Nº 130 A Lightweight Approach for Designing Enterprise Architectures Using BPMN: an Application in Hospitals O.Barros, R.Seguel, and A. Quezada DOCUMENTOS DE TRABAJO Serie Gestión Aceptado para presentacion
Realizing business flexibility through integrated SOA policy management.
SOA policy management White paper April 2009 Realizing business flexibility through integrated How integrated management supports business flexibility, consistency and accountability John Falkl, distinguished
ArchiMate and TOGAF. What is the added value?
ArchiMate and TOGAF What is the added value? Why use TOGAF next to ArchiMate? ArchiMate provides a (visual) language ArchiMate provides a content framework TOGAF provides a process TOGAF provides a way
Service Oriented Architecture 1 COMPILED BY BJ
Service Oriented Architecture 1 COMPILED BY BJ CHAPTER 9 Service Oriented architecture(soa) Defining SOA. Business value of SOA SOA characteristics. Concept of a service, Enterprise Service Bus (ESB) SOA
Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert
Int'l Conf. Software Eng. Research and Practice SERP'15 225 Development of Enterprise Architecture of PPDR Organisations W. Müller, F. Reinert Fraunhofer Institute of Optronics, System Technologies and
MODELING UNIVERSITY METROPOLITAN ONLINE LEARNING SYSTEM ARCHITECTURE - THE TOGAF/ ARCHIMATE WAY
The Fourth International Conference on e-learning (elearning-2013), 26-27 September 2013, Belgrade, Serbia MODELING UNIVERSITY METROPOLITAN ONLINE LEARNING SYSTEM ARCHITECTURE - THE TOGAF/ ARCHIMATE WAY
Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA. Hong-lv Wang, Yong Cen
Implementation of Information Integration Platform in Chinese Tobacco Industry Enterprise Based on SOA Hong-lv Wang, Yong Cen Information Center, China Tobacco Zhejiang Industrial Co., Ltd Hangzhou, China,
Enterprise Architecture Management Tool Survey 2008
Enterprise Architecture Management Tool Survey 2008 Prof. Dr. Florian Matthes, Sabine Buckl, Jana Leitel, Christian M. Schweda Software Engineering for Business Information Systems (sebis) Ernst Denert-Stiftungslehrstuhl
A standards-based approach to application integration
A standards-based approach to application integration An introduction to IBM s WebSphere ESB product Jim MacNair Senior Consulting IT Specialist [email protected] Copyright IBM Corporation 2005. All rights
A Tool for Enterprise Architecture Analysis using the PRM formalism
A Tool for Enterprise Architecture Analysis using the PRM formalism Markus Buschle, Johan Ullberg, Ulrik Franke, Robert Lagerström, and Teodor Sommestad Industrial Information and Control Systems, KTH
A DESIGN SCIENCE APPROACH TO DEVELOP A NEW COMPREHENSIVE SOA GOVERNANCE FRAMEWORK
A DESIGN SCIENCE APPROACH TO DEVELOP A NEW COMPREHENSIVE SOA GOVERNANCE FRAMEWORK Fazilat Hojaji 1 and Mohammad Reza Ayatollahzadeh Shirazi 2 1 Amirkabir University of Technology, Computer Engineering
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models?
Linking BPMN, ArchiMate, and BWW: Perfect Match for Complete and Lawful Business Process Models? Ludmila Penicina Institute of Applied Computer Systems, Riga Technical University, 1 Kalku, Riga, LV-1658,
A Manual for the Cyber Security Modeling Language (simplified version)
A Manual for the Cyber Security Modeling Language (simplified version) Hannes Holm, Mathias Ekstedt, Teodor Sommestad, Matus Korman Department of Industrial Information and Control Systems, Royal Institute
Methods and tools for data and software integration Enterprise Service Bus
Methods and tools for data and software integration Enterprise Service Bus Roman Hauptvogl Cleverlance Enterprise Solutions a.s Czech Republic [email protected] Abstract Enterprise Service Bus (ESB)
XML Signatures in an Enterprise Service Bus Environment
XML Signatures in an Enterprise Bus Environment Eckehard Hermann Research & Development XML Integration Uhlandstraße 12 64297 Darmstadt, Germany [email protected] Dieter Kessler Research
TOGAF usage in outsourcing of software development
Acta Informatica Pragensia 2(2), 2013, 68 76, DOI: 10.18267/j.aip.25 Section: Online: aip.vse.cz Peer-reviewed papers TOGAF usage in outsourcing of software development Aziz Ahmad Rais 1, Rudolf Pecinovsky
Enterprise Architecture (EA) is the blueprint
SETLabs Briefings VOL 6 NO 4 2008 Building Blocks for Enterprise Business Architecture By Eswar Ganesan and Ramesh Paturi A unified meta-model of elements can lead to effective business analysis Enterprise
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
Building Business Capabilities
Building Business Capabilities using BiZZdesign Architect and ArchiMate October 17 th, 2013 Your presenter today Business and IT majors, University of Twente, Netherlands Experience in application, business
Background: Business Value of Enterprise Architecture TOGAF Architectures and the Business Services Architecture
Business Business Services Services and Enterprise and Enterprise This Workshop Two parts Background: Business Value of Enterprise TOGAF s and the Business Services We will use the key steps, methods and
Unifying IT Vision Through Enterprise Architecture
Unifying IT Vision Through Enterprise Architecture A model for Strategic Alignment Northeast Ohio Information Technology & Enterprise Architects (NEO-ITEA) Presentation To: Integrate 2010: Uniting the
SOA Planning Guide. 2015 The Value Enablement Group, LLC. All rights reserved.
SOA Planning Guide 1 Agenda q SOA Introduction q SOA Benefits q SOA Principles q SOA Framework q Governance q Measurement q Tools q Strategic (long term) View 2 Introduction to SOA q Service-oriented architecture
How to bridge the gap between business, IT and networks
ericsson White paper Uen 284 23-3272 October 2015 How to bridge the gap between business, IT and networks APPLYING ENTERPRISE ARCHITECTURE PRINCIPLES TO ICT TRANSFORMATION A digital telco approach can
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
A guide for enterprise-specific design of EA models
A guide for enterprise-specific design of EA models Master s Thesis Markus Bauer Kickoff Presentation sebis Advanced Seminar 2013-07-08 Set-Up Organizational issues Title Supervisor Advisors A guide for
Service Oriented Architecture (SOA) An Introduction
Oriented Architecture (SOA) An Introduction Application Evolution Time Oriented Applications Monolithic Applications Mainframe Client / Server Distributed Applications DCE/RPC CORBA DCOM EJB s Messages
VOL. 2, NO. 3, March 2012 ISSN 2222-9833 ARPN Journal of Systems and Software 2009-2011 AJSS Journal. All rights reserved
Five Aspects of Application Integration Requirements Fazilat Hojaji MS of Information Technology Engineering, Amirkabir University of Technology Computer Engineering & IT Department Hafez ST,Tehran, Iran
The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies
The Role of Cisco SONA in Enterprise Architecture Frameworks and Strategies A White Paper by: Ian Foo Technical Lead, Cisco Systems, Inc. April 2008 Copyright 2008 The Open Group All rights reserved. No
Transform Your Bank in Measurable Steps
Banking Transformation Framework Transform Your Bank in Measurable Steps Table of Contents 2 Establish a Platform for Transformation 3 Transform Your Business 3 Use the Reference Architecture As a Foundation
Introduction to Service Oriented Architectures (SOA)
Introduction to Service Oriented Architectures (SOA) Responsible Institutions: ETHZ (Concept) ETHZ (Overall) ETHZ (Revision) http://www.eu-orchestra.org - Version from: 26.10.2007 1 Content 1. Introduction
Setting Up an AS4 System
INT0697_150625 Setting up an AS4 system V1r0 1 Setting Up an AS4 System 2 Version 1r0 ENTSOG AISBL; Av. de Cortenbergh 100, 1000-Brussels; Tel: +32 2 894 5100; Fax: +32 2 894 5101; [email protected], www.entsog.eu,
see >analyze >control >align < WhitePaper > planningit: alfabet s Logical IT Inventory
see >analyze >control >align < WhitePaper > planningit: alfabet s Logical IT Inventory planningit: alfabet s Logical IT Inventory 2 A transparent IT Landscape IT planning takes place in a rapidly changing
SOA GOVERNANCE MODEL
SOA GOVERNANCE MODEL Matjaz B. Juric University of Ljubljana, Slovenia [email protected] Eva Zupancic University of Ljubljana, Slovenia Abstract: Service Oriented Architecture (SOA) has become
POLAR IT SERVICES. Business Intelligence Project Methodology
POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...
How service-oriented architecture (SOA) impacts your IT infrastructure
IBM Global Technology Services January 2008 How service-oriented architecture (SOA) impacts your IT infrastructure Satisfying the demands of dynamic business processes Page No.2 Contents 2 Introduction
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7 No. 7, September-October 2008 Applications At Your Service Mahesh H. Dodani, IBM,
Developing the Corporate Security Architecture. www.avient.ca Alex Woda July 22, 2009
Developing the Corporate Security Architecture www.avient.ca Alex Woda July 22, 2009 Avient Solutions Group Avient Solutions Group is based in Markham and is a professional services firm specializing in
Service Oriented Architecture: A driving force for paperless healthcare system
2012 International Conference on Computer Technology and Science (ICCTS 2012) IPCSIT vol. 47 (2012) (2012) IACSIT Press, Singapore DOI: 10.7763/IPCSIT.2012.V47.16 Service Oriented Architecture: A driving
A Closer Look at BPM. January 2005
A Closer Look at BPM January 2005 15000 Weston Parkway Cary, NC 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected] http://www.ultimus.com The Information contained in this document
Successful Enterprise Architecture. Aligning Business and IT
Successful Enterprise Architecture Aligning Business and IT 1 Business process SOLUTIONS WHITE PAPER Executive Summary...3 An Integrated Business & IT Infrastructure...3 Benefits to Business and IT Go
Oracle Service Bus. Situation. Oracle Service Bus Primer. Product History and Evolution. Positioning. Usage Scenario
Oracle Service Bus Situation A service oriented architecture must be flexible for changing interfaces, transport protocols and server locations - service clients have to be decoupled from their implementation.
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus
A Unified Messaging-Based Architectural Pattern for Building Scalable Enterprise Service Bus Karim M. Mahmoud 1,2 1 IBM, Egypt Branch Pyramids Heights Office Park, Giza, Egypt [email protected] 2 Computer
Component visualization methods for large legacy software in C/C++
Annales Mathematicae et Informaticae 44 (2015) pp. 23 33 http://ami.ektf.hu Component visualization methods for large legacy software in C/C++ Máté Cserép a, Dániel Krupp b a Eötvös Loránd University [email protected]
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies
Service Oriented Architecture (SOA) Architecture, Governance, Standards and Technologies 3-day seminar Give Your Business the Competitive Edge SOA has rapidly seized the momentum and center stage because
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
Solution Documentation for Custom Development
Version: 1.0 August 2008 Solution Documentation for Custom Development Active Global Support SAP AG 2008 SAP AGS SAP Standard Solution Documentation for Custom Page 1 of 53 1 MANAGEMENT SUMMARY... 4 2
LEADing Practice: Artifact Description: Business, Information & Data Object Modelling. Relating Objects
LEADing Practice: Artifact Description: Business, Information & Data Object Modelling Relating Objects 1 Table of Contents 1.1 The Way of Thinking with Objects... 3 1.2 The Way of Working with Objects...
Business-Driven Software Engineering Lecture 3 Foundations of Processes
Business-Driven Software Engineering Lecture 3 Foundations of Processes Jochen Küster [email protected] Agenda Introduction and Background Process Modeling Foundations Activities and Process Models Summary
Federal Enterprise Architecture and Service-Oriented Architecture
Federal Enterprise Architecture and Service-Oriented Architecture Concepts and Synergies Melvin Greer Chief Strategist, SOA / Cloud Computing Certified Enterprise Architect Copyright August 19, 2010 2010
Approach to Service Management
Approach to Service Management In SOA Space Gopala Krishna Behara & Srikanth Inaganti Abstract SOA Management covers the Management and Monitoring of applications, services, processes, middleware, infrastructure,
Document Engineering: Analyzing and Designing the Semantics of Business Service Networks
Document Engineering: Analyzing and Designing the Semantics of Business Service Networks Dr. Robert J. Glushko University of California Berkeley [email protected] Tim McGrath Universal Business
Visualizing the Business Impact of Technical Cyber Risks
Visualizing the Business Impact of Technical Cyber Risks May 21, 2014 Henk Jonkers Senior Research Consultant, BiZZdesign Agenda Introduction and problem statement Enterprise Architecture with ArchiMate
Viewpoint Modeling. Agenda. 1. Viewpoint Modeling 2. ODS, Enterprise Architecture, Viewpoints, Models 3. Modeling approaches and standards
Viewpoint Modeling Antonio Vallecillo Universidad de Málaga Dpto. Lenguajes y Ciencias de la Computación [email protected] http://www.lcc.uma.es/~av Master en Ingeniería del Software e Inteligencia Artificial
One Manufacturer : Harmonization Strategies for Global Companies
Manufacturing the way we see it One Manufacturer : Harmonization Strategies for Global Companies How to Align Enterprise Architecture with Corporate Strategy Recently we have seen many global manufacturers
SOA Myth or Reality??
IBM TRAINING S04 SOA Myth or Reality Jaqui Lynch IBM Corporation 2007 SOA Myth or Reality?? Jaqui Lynch Mainline Information Systems Email [email protected] Session S04 http://www.circle4.com/papers/s04soa.pdf
CONDIS. IT Service Management and CMDB
CONDIS IT Service and CMDB 2/17 Table of contents 1. Executive Summary... 3 2. ITIL Overview... 4 2.1 How CONDIS supports ITIL processes... 5 2.1.1 Incident... 5 2.1.2 Problem... 5 2.1.3 Configuration...
So far in the first three chapters of this book we have studied an overview of SAP
4 CHAPTER SAP ERP Integration Overview with Other Systems So far in the first three chapters of this book we have studied an overview of SAP business suite applications and the NetWeaver Application Server
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+
Business Object Document (BOD) Message Architecture for OAGIS Release 9.+ an OAGi White Paper Document #20110408V1.0 Open standards that open markets TM Open Applications Group, Incorporated OAGi A consortium
Enterprise Application Designs In Relation to ERP and SOA
Enterprise Application Designs In Relation to ERP and SOA DESIGNING ENTERPRICE APPLICATIONS HASITH D. YAGGAHAVITA 20 th MAY 2009 Table of Content 1 Introduction... 3 2 Patterns for Service Integration...
zen Platform technical white paper
zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant
Enterprise Architecture Modeling PowerDesigner 16.1
Enterprise Architecture Modeling PowerDesigner 16.1 Windows DOCUMENT ID: DC00816-01-1610-01 LAST REVISED: November 2011 Copyright 2011 by Sybase, Inc. All rights reserved. This publication pertains to
BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2
BCS THE CHARTERED INSTITUTE FOR IT BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 6 Professional Graduate Diploma in IT SOFTWARE ENGINEERING 2 EXAMINERS REPORT Friday 2 nd October 2015 Answer any THREE
Table of Contents. 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8
Table of Contents 1 Executive Summary... 2 2. SOA Overview... 3 2.1 Technology... 4 2.2 Processes and Governance... 8 3 SOA in Verizon The IT Workbench Platform... 10 3.1 Technology... 10 3.2 Processes
salesforce Integration with SAP NetWeaver PI/PO
salesforce Integration with SAP NetWeaver PI/PO Scenario More and more companies are opting for software-as-a-service (SaaS) and managing a subset of their business processes and applications in the cloud.
HEC Security & Compliance
HEC Security & Compliance SAP Security, Risk & Compliance Office November, 2014 Public Version 2.0 Details Introduction Overview Security Offering Approach Certifications Introduction Dear Customer, Information
Enterprise Architecture at Work
Marc Lankhorst et al. Enterprise Architecture at Work Modelling, Communication and Analysis Third Edition 4y Springer Contents 1 Introduction to Enterprise Architecture 1 1.1 Architecture 1 1.2 Enterprise
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
Service Oriented Architecture Based Integration. Mike Rosen CTO, AZORA Technologies, Inc. [email protected]
Service Oriented Architecture Based Integration Mike Rosen CTO, AZORA Technologies, Inc. [email protected] Mike Rosen ACCESS TO THE EXPERTS Consultant Chief Enterprise Architect for service and
