Enterprise architecture analysis with extended influence diagrams

Pontus Johnson1, Robert Lagerström1, Per Närman1, Mårten Simonsson1
1Royal Institute of Technology, Stockholm, Sweden

Tóm tắt

Từ khóa


Tài liệu tham khảo

Department of Defense (2004). The Department of Defense architecture framework.

Druzdzel, M. J., & van der Gaag, L. C. (2000). Building probabilistic networks: Where do the numbers come from? Guest editors’ introduction. IEEE Transactions on Knowledge and Data Engineering, 12(4), 481–486.

D. S. Laboratory (2006). Genie On-Line Help.

Fowler, M., & Scott, K. (1997). UML distilled: Applying the standard object modeling language. Reading, MA: Addison-Wesley.

Howard, R. A. (1988). Decision analysis: Practice and promise. Management Science, 34(6), 679–695.

Howard, R. A., & Matheson, J. E. (2005). Influence diagrams. Decision Analysis, 2(3), 127–143.

Hughes, J. (2004). The integrated energy and communication systems architecture. Electric Power Research Institute.

Hugin Expert A/S (2004). HUGIN API Reference Manual, version 6.3.

IFAC-IFIP (1999). Geram: Generalized enterprise reference architecture and methodology, version 1.6.3.

International Organization for Standardization (2000). ISO/IEC International Standard 17799:2000 Information Technology – Security Techniques – Code of Practice for Information Security Management.

Jensen, F. V. (2001). Bayesian networks and decision graphs. Berlin Heidelberg New York: Springer.

Johnson, P.,  & Ekstedt, M. (2007). Enterprise architecture – models and analyses for information systems decision making. Studentlitteratur. (to appear)

Johnson, P., Ekstedt, M., Silva, E., & Plazaola, L. (2004). Using enterprise architecture for cio decision-making: On the importance of theory. In Proceedings of the Second Annual Conference on Systems Engineering Research.

Kosanke, K. (1995). Cimosa overview and status. Computers in Industry, 27(2), 101–109.

Lagerstrom, R., Johnson, P., & Narman, P. (2007). Extended influence diagram generation for interoperability analysis. In Proceedings of the Third International Conference on Interoperability for Enterprise Software and Applications.

Lindstrom, A., Johnson, P., Johansson, E., Ekstedt, M., & Simonsson, M. (2006). A survey on cio concerns: Do enterprise architecture frameworks support them? Information Systems Frontiers, 8(2), 81–90.

Liu, P., Ammann, P., & Jajodia, S. (2000). Rewriting histories: Recovering from malicious transactions. Distributed and Paralell Databases, 8, 7–40.

Neapolitan, R. (2004). Learning Bayesian Networks. Englewood Cliffs, NJ: Pearson Education (Prentice Hall).

The Open Group (2005). The Open Group Architecture Framework, Version 8.

Poslad, S., & Calisti, M. (2000). Towards improved trust and security in fipa agent platforms. In Autonomous Agents 2000 Workshop on Deception, Fraud and Trust in Agent Societies.

Rubenstein, A. (1998). Modeling bounded rationality. Cambridge, MA: MIT Press.

Scriven, M. (1954). Definitions in analytical philosophy. Philosophical Studies, 5(3), 36–40.

Shachter, R. (1986). Evaluating influence diagrams. Operations Research, 34(6), 871–882.

Shachter, R. (1988). Probabilistic inference and influence diagrams. Operations Research, 36(4), 89–604.

Shafer, G. (1976). A mathematical theory of evidence. Princeton, NJ: Princeton University Press.

Williams, T. J. (1994). The purdue enterprise reference architecture. Computers in Industry, 24(2–3), 141–158.

Yang, J.-B. (2001). Rule and utility based evidential reasoning approach for multiattribute decision analysis under uncertainties. European Journal of Operational Research, 133, 31–61.

Yu, E. S. K., Mylopoulos, J., & Lesp, Y. (1996). Ai models for business process reengineering. IEEE Expert: Intelligent Systems and Their Applications, 11(4), 16–23.

Zachman, J. (1987). A framework for information systems architecture. IBM Systems Journal, 26(3), 276–292.