Reference Hub1
SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks

SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks

Surya B. Yadav
Copyright: © 2008 |Volume: 2 |Issue: 1 |Pages: 25
ISSN: 1930-1650|EISSN: 1930-1669|ISSN: 1930-1650|EISBN13: 9781615203277|EISSN: 1930-1669|DOI: 10.4018/jisp.2008010101
Cite Article Cite Article

MLA

Yadav, Surya B. "SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks." IJISP vol.2, no.1 2008: pp.1-25. http://doi.org/10.4018/jisp.2008010101

APA

Yadav, S. B. (2008). SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks. International Journal of Information Security and Privacy (IJISP), 2(1), 1-25. http://doi.org/10.4018/jisp.2008010101

Chicago

Yadav, Surya B. "SEACON: An Integrated Approach to the Analysis and Design of Secure Enterprise Architecture-Based Computer Networks," International Journal of Information Security and Privacy (IJISP) 2, no.1: 1-25. http://doi.org/10.4018/jisp.2008010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The extent methods largely ignore the importance of integrating security requirements with business requirements and providing built-in steps for dealing with these requirements seamlessly. To address this problem, a new approach to secure network analysis and design is presented. The proposed method, called the SEACON method, provides an integrated approach to use existing principles of information systems analysis and design with the unique requirements of distributed secure network systems. We introduce several concepts including security adequacy level, process-location-security matrix, data-location- security matrix, and secure location model to provide built-in mechanisms to capture security needs and use them seamlessly throughout the steps of analyzing and designing secure networks. This method is illustrated and compared to other secure network design methods. The SEACON method is found to be a useful and effective method.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.