<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">A Tool for Automatic Enterprise Architecture Modeling</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Markus</forename><surname>Buschle</surname></persName>
							<email>markusb@ics.kth.se</email>
							<affiliation key="aff0">
								<orgName type="department">Industrial Information and Control Systems</orgName>
								<orgName type="institution">KTH Royal Institute of Technology</orgName>
								<address>
									<addrLine>Osquldas v. 12</addrLine>
									<postCode>SE-10044</postCode>
									<settlement>Stockholm</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Hannes</forename><surname>Holm</surname></persName>
							<email>hannesh@ics.kth.se</email>
							<affiliation key="aff0">
								<orgName type="department">Industrial Information and Control Systems</orgName>
								<orgName type="institution">KTH Royal Institute of Technology</orgName>
								<address>
									<addrLine>Osquldas v. 12</addrLine>
									<postCode>SE-10044</postCode>
									<settlement>Stockholm</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Teodor</forename><surname>Sommestad</surname></persName>
							<email>teodors@ics.kth.se</email>
							<affiliation key="aff0">
								<orgName type="department">Industrial Information and Control Systems</orgName>
								<orgName type="institution">KTH Royal Institute of Technology</orgName>
								<address>
									<addrLine>Osquldas v. 12</addrLine>
									<postCode>SE-10044</postCode>
									<settlement>Stockholm</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Mathias</forename><surname>Ekstedt</surname></persName>
							<email>mathiase@ics.kth.se</email>
							<affiliation key="aff0">
								<orgName type="department">Industrial Information and Control Systems</orgName>
								<orgName type="institution">KTH Royal Institute of Technology</orgName>
								<address>
									<addrLine>Osquldas v. 12</addrLine>
									<postCode>SE-10044</postCode>
									<settlement>Stockholm</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Khurram</forename><surname>Shahzad</surname></persName>
							<email>khurrams@ics.kth.se</email>
							<affiliation key="aff0">
								<orgName type="department">Industrial Information and Control Systems</orgName>
								<orgName type="institution">KTH Royal Institute of Technology</orgName>
								<address>
									<addrLine>Osquldas v. 12</addrLine>
									<postCode>SE-10044</postCode>
									<settlement>Stockholm</settlement>
									<country key="SE">Sweden</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">A Tool for Automatic Enterprise Architecture Modeling</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">C1B994FC70FB87932DAFA9DE129574F6</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T03:23+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Enterprise Architecture</term>
					<term>Automatic data collection</term>
					<term>Automatic instantiation</term>
					<term>Software tool</term>
					<term>Security Analysis</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Enterprise architecture is an approach which aim to provide decision support based on organization-wide models. The creation of these models is however cumbersome as multiple aspects of an organization need to be considered. The Enterprise Architecture approach would be signicantly less demanding if data used to create the models could be collected automatically. This paper illustrates how a vulnerability scanner can be utilized for data collection in order to automatically create enterprise architecture models. We show how this approach can be realized by extending an earlier presented Enterprise Architecture tool. An example is provided through a case study applying the tool on a real network.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Enterprise Architecture (EA) is a comprehensive approach for management and decision-making based on models of the organization and its information systems. An enterprise is typically described through dimensions such as Business, Application, Technology and Information. <ref type="bibr" target="#b6">[7]</ref>. These pictographic descriptions are used for system-quality analysis to provide valuable support for IT and business decision-making <ref type="bibr" target="#b2">[3]</ref>.</p><p>As these models are intended to provide reliable decision support it is imperative that they capture all the aspects of an organization which are of relevance. Thus, they often grow very large and contain several thousands of entities and an even larger number of relationships in between them. The creation of such large models is both time and cost consuming, as lots of stakeholders are involved and many dierent pieces of information have to be gathered. During the creation process the EA models are also likely to become (partly) outdated <ref type="bibr" target="#b0">[1]</ref>. Thus, in order to provide the best possible decision support it needs to be ensured that EA models both are holistic and reect the organizations current state.</p><p>Automatic data collection and model creation would be preferable as this would mean a reduced modeling eort and an increased quality of the collected data. In current EA tools two approaches addressing automatic data collection can be found. The most common way is to import models that are made in 3rd party software. For example, BizzDesign Architect <ref type="bibr" target="#b1">[2]</ref> can import from oce applications. Thereby the automation aspect is the fact that data is reused and does not need to be manually entered if it is already available. The interpretation of data documented in the third-party software can however be resource-and time consuming, thus contradicting parts of the purpose with automatic data collection. Other tools such as for example Troux <ref type="bibr" target="#b10">[11]</ref> allow the usage of SQL queries in order to load information from available data bases. This approach focuses on the extraction of the data-model and thereby the automatic creation of the information architecture as well as the business architecture based on process descriptions and similar documents.</p><p>In this paper we present how the Enterprise Architecture Analysis Tool <ref type="bibr" target="#b2">[3]</ref> has been extended in order to automatically instantiate elements in EA models based on results from network scans. In comparison to the previously described approaches of other tools our implementation focuses on the Application and Technology layer of the organization. This information is gathered through an application of a vulnerability scanner that evaluates the network structure of an enterprise. Thereby attached network hosts and the functionality they provide can be discovered. Another dierence is that the presented tool uses EA models for system-quality analysis, whereas commercial applications focus on modeling. As a running example we illustrate how a meta-model designed for cyber security analysis <ref type="bibr" target="#b8">[9]</ref> can be (partly) automatically instantiated. The presented implementation is generic and can be used to support any kind of EA analysis.</p><p>The remainder of this paper is structured as follows. Section two describes the components used to realize the implementation and introduces into the metamodel that is used as running example. Section three describes how the information, which was automatically collected, is used to instantiate the meta-model for security evaluation. Section four exemplies the tool application on real data collected by scanning a computer network used for security exercises. In section ve the presented tool and the underlying approach are discusses as well as future work is described. Finally section six concludes the paper.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Preliminaries</head><p>This section describes the three components that we combined in order to automatically create EA models that can be used for security analysis. In subsection 2.1 the vulnerability scanner NeXpose <ref type="bibr" target="#b7">[8]</ref>, which is used for data collection, is explained. Subsection 2.2 describes the Enterprise Architecture Analysis Tool that is used to generate the models and evaluate them with regards to security aspects. Subsection 2.3 briey introduces CySeMoL, the used meta-model which is partly instantiated using the automated data collection. The overall architecture can be seen in gure 1.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Conforms to Conforms to</head><p>Enterprise Architecture Analysis Tool NeXpose The vulnerability scanner NeXpose was chosen in this project as it has demonstrated good results in previous tests <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>EA analysis CySeMol meta model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>NeXpose-XML Schema</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>EA analysis CySeMol model</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>NeXpose-XML</head><note type="other">Instantiates Mapped to</note><p>NeXpose <ref type="bibr" target="#b7">[8]</ref> is an active (i.e. it queries remote hosts for data) vulnerability scanner capable of both authenticated and unauthenticated scans. Authenticated scans involve providing the scanner with user accounts to hosts. They are typically less disturbing to normal operations and providing a higher degree of accuracy. However, it is not always the case that credentials are readily available for the individual(s) performing a scan.</p><p>NeXpose provides information regarding the network architecture in terms of all devices which are communicating over TCP or UDP, e.g. computers, rewalls and printers. The scanner identies the operating systems or rmware that is running on the scanned devices and any services that are running. If the scanner is given credentials it is also able to assess all applications (and versions thereof) installed on a device and all user/administrator accounts on that device.</p><p>More security related functions of the scanner include that it can check for both software aws and conguration errors. It is also capable of performing web application scans. NeXpose has approximately 53000 current signatures in its engine, with every signature corresponding to a certain vulnerability. NeXpose is also SCAP-compliant <ref type="bibr" target="#b5">[6]</ref> and thus compliant with a suite of six commonly used protocols developed by the National Institute of Standards and Technology (NIST): i) Extensible Conguration Checklist Description Format (XCCDF), ii) Open Vulnerability and Assessment Language (OVAL), iii) Common Platform Enumeration (CPE), iv) Common Conguration Enumeration (CCE), v) Common Vulnerabilities and Exposures (CVE) and vi) Common Vulnerability Scoring System (CVSS).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>2.2</head><p>Enterprise Architecture Analysis Tool</p><p>In <ref type="bibr" target="#b2">[3]</ref> we presented a tool for EA analysis. This tool consists of two parts to be used in succession. The rst component allows the denition of meta-models to describe a certain system quality of interest (1 in Figure <ref type="figure" target="#fig_0">1</ref>). This is done according to the PRM formalism <ref type="bibr" target="#b3">[4]</ref> in terms of classes, attributes, and relations between them. Thereafter an execution of the second component is performed in order to describe an enterprise as an instantiated model (2 in Figure <ref type="figure" target="#fig_0">1</ref>), which is compliant to the previously dened meta-model. As the PRM formalism supports the expression of quantied theory the described enterprise can be evaluated with regards to the considered system quality described in the rst component.</p><p>To use the results gained from NeXpose scans an extension of the tool was necessary. The result of NeXpose's scans can be exported to XML les (4 in Figure <ref type="figure" target="#fig_0">1</ref>), which are structured according to a schema denition le (XSD)<ref type="foot" target="#foot_0">1</ref> (3 in Figure <ref type="figure" target="#fig_0">1</ref>). We added the possibility to create mappings between XSD les and meta-models (5 in Figure <ref type="figure" target="#fig_0">1</ref>) in order to automatically instantiate the metamodel based on NeXpose's XML les (6 in Figure <ref type="figure" target="#fig_0">1</ref>). The used mapping is discussed in section 3.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">CySeMoL</head><p>This paper exemplies the mapping functionality by instantiating a subset of the meta-model of the CySeMoL (Cyber Security Modeling Language) <ref type="bibr" target="#b9">[10]</ref>. This modeling language follows the abstract model presented in <ref type="bibr" target="#b8">[9]</ref> and uses the PRM formalism to estimate the value of security attributes from an architecture model. Its meta-model covers both technical and organizational aspects of security and does in total contain 20 entities, 30 entity-relationships and a number of interdependent attributes. Four of these entities and three of its relationships can be mapped to elements produced by NeXpose. This subset of CySeMoL is depicted in the left part of Figure <ref type="figure" target="#fig_2">2</ref>. While only a subset of the total number of entities and relations could be instantiated, this subset includes entities and relations which are of high multiplicity in enterprises, and thus require lots of eort to model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">The mapping</head><p>In this section we describe how we matched the structure of NeXpose's results to entities of the CySeMol language in order to instantiate the language based on scans. As described earlier, this was done based on the XSD le that describes the structure of the reports.</p><p>For our implementation we used four elements that a NeXpose result contains. At rst we mapped ngerprintsType and osType to the OperatingSystem class of CySeMol, visualized as Mapping 1 in gure 2. This allows us to determine the used operating system of a computer identied by NeXpose. The second mapping (Mapping 2 in gure 2) relates softwareType and ngerprint-Type to SoftwareProduct in order to identify the software that is executed on the considered system. Thirdly (Mapping 3) we mapped endpointsType and endpointType to Service in order to identify at which ports services are provided by a machine. Finally a mapping between service_ngerprints_Type and ser-vice_ngerprint_Type to SoftwareProduct was made (Mapping 4) in order to describe software that provide services on the machine of interest.</p><p>Additionally we considered the hierarchical structure of the XSD le in order to derive relationships. This made it possible to add the relationships Operates, ControlledBy, and ProductOf as they are shown in Figure <ref type="figure" target="#fig_2">2</ref>. The used subset of CySeMol</p><p>The structure of NeXpose's reports In this section we describe how we tested the implementation on a real network. We give a brief introduction to the background of the collected data. Afterwards we depict how the resulting auto-generated model looks like.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.1</head><p>The setup</p><p>The main experimental setup was designed by the Swedish Defence Research Agency (FOI) in Linköping, Sweden with the support of the Swedish National Defence College (SNDC). Also, a group of computer security specialists and computer security researchers originating from various northern-European governments, military, private sectors and academic institutions were part of designing the network architecture.</p><p>The environment was set to describe a simplied critical information infrastructure at a small electrical power utility. The environment was composed of 20 physical PC servers running a total of 28 virtual machines, divided into four VLAN segments. Various operating systems and versions thereof were used in the network, e.g. Windows XP SP2, Debian 5.0 and Windows Server 2003 SP1. Each host had several dierent network services operating, e.g. web-, mail-, media-, remote connection-and le sharing services. Furthermore, every host was more or less vulnerable through software aws and/or poor congurations.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4.2</head><p>The result</p><p>We performed a NeXpose scan on the setup environment and thereafter applied the mapping as presented in chapter 3. The resulting auto generated model consists of 28 instances of CySeMol's OperatingSystem class. Furthermore 225 instances of the Service class and 141 instantiations of the SoftwareProduct class were automatically generated. The generated components were related based on the relations that are specied in CySeMol. Figure <ref type="figure">3</ref> shows the resulting model exemplary for one computer of the environment as the full model is to big to be shown here.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Discussion and future work</head><p>This paper demonstrates that vulnerability scanners can provide useful support for the creation of EA models. As mentioned earlier, the results of a scan do not deliver a complete EA model, but require some completion work. The application of an automated scan however signicantly reduces modeling eort and provides an EA analyst with a model stub which he or she can complement with other types of data.</p><p>The validity and reliability of the proposed approach can be discussed from two dierent viewpoints: i) how much of the meta-model that can be captured, both in scope (i.e. how much of the meta-model that can be instantiated) and context (i.e. if the scanner provides all the information needed to accurately capture the context of a variable), and ii) how accurate a vulnerability scanner is at assessing the instantiated variables. Regarding i), most of the more modeling intensive concepts of CySeMoL are captured and all context are accurate. That is, the scanner provides e.g. all the information regarding vulnerabilities that CySeMoL requires. Regarding ii), the scanning accuracy in terms of assessing vulnerabilities is studied in <ref type="bibr" target="#b4">[5]</ref>. The accuracy in terms of assessing software, operating systems and such is something that will be examined in future works.</p><p>It would also be interesting to look at other variables provided by automated vulnerability scanning, e.g. user accounts of systems. Furthermore, automated Fig. <ref type="figure">3</ref>. The implemented mapping scanning could be mapped to more commonly used EA frameworks such as ArchiMate <ref type="bibr" target="#b6">[7]</ref> to increase the usage of the method.</p><p>Additionally in future work it might be investigated how other data sources can be used in order to provide input to automatic model creation and further reduce the manual tasks necessary. Examples of such sources are access control lists, ERP systems, accounting systems and UDDI registries. Especially how automatic data collection for the domains that so far not have been considered (the Business Layer and the information architecture) can be carried out, needs to be investigated. The long-term goal is to minimize the manual eort required to generate EA models.</p><p>The fact that enterprises are changing in the course of time is an important aspect too. The support for periodic scans leading to an automatic model update might therefore be implemented in the present tool as well.</p><p>It is also possible to collect information on vulnerabilities of services and software. This is something that we aim to incorporate in a future project in order to improve the analysis functionality.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="6">Conclusion</head><p>In this paper we presented an extension of our previously developed tool that allows the automatic generation of elements for Enterprise Architecture models. The input for these models is provided by a vulnerability scanner, which was used to identify infrastructure elements and applications that were part of a computer network. Our implementation is generic even though CySeMol, a meta-model for security analysis, was used as a running example. The data gained from the vulnerability scanner can be used to instantiate any meta-model, as soon as a mapping has been dened. The scan with NeXpose took less than an hour and the creation of the EA model using that data was next to instantaneous. Thus, it should be a viable option for EA architects. We have also illustrated the architecture of our implementation and described used components in detail. Finally, we have presented a practical application based on real data of our implementation. Thereby we have shown the feasibility of our approach.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. The used architecture</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The implemented mapping</figDesc><graphic coords="5,251.18,281.01,203.37,197.53" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0"><head></head><label></label><figDesc></figDesc><graphic coords="7,152.06,115.84,311.25,315.80" type="bitmap" /></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">The XSD le (Report_XML_Export_Schema.xsd) is part of the NeXpose Community Edition that can be downloaded from http://www.rapid7.com</note>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">A survival analysis of application life spans based on enterprise architecture models</title>
		<author>
			<persName><forename type="first">S</forename><surname>Aier</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Buckl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Franke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Gleichauf</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Närman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Schweda</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ullberg</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">3rd International Workshop on Enterprise Modelling and Information Systems Architectures</title>
				<meeting><address><addrLine>Ulm, Germany</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2009">2009</date>
			<biblScope unit="page">141154</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<author>
			<persName><surname>Bizzdesign</surname></persName>
		</author>
		<ptr target="http://www.bizzdesign.com" />
		<title level="m">BiZZdesign Architect</title>
				<imprint>
			<date type="published" when="2011-03">Mar 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">A tool for enterprise architecture analysis using the prm formalism</title>
		<author>
			<persName><forename type="first">M</forename><surname>Buschle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ullberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">U</forename><surname>Franke</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Lagerström</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sommestad</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">CAiSE2010 Forum PostProceedings</title>
				<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Learning probabilistic relational models</title>
		<author>
			<persName><forename type="first">N</forename><surname>Friedman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Getoor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Koller</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pfeer</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 16th International Joint Conference on Articial Intelligence</title>
				<meeting>of the 16th International Joint Conference on Articial Intelligence</meeting>
		<imprint>
			<publisher>Morgan Kaufman</publisher>
			<date type="published" when="1999">1999</date>
			<biblScope unit="page">13001309</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<title level="m" type="main">A quantitative evaluation of vulnerability scanning</title>
		<author>
			<persName><forename type="first">H</forename><surname>Holm</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Sommestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Almroth</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Persson</surname></persName>
		</author>
		<imprint/>
		<respStmt>
			<orgName>Information Management &amp; Computer Security</orgName>
		</respStmt>
	</monogr>
	<note>to be published</note>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">The technical specication for the security content automation protocol (SCAP)</title>
		<author>
			<persName><forename type="first">C</forename><surname>Johnson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Quinn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Scarfone</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Waltermire</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">NIST Special Publication</title>
		<imprint>
			<biblScope unit="volume">800</biblScope>
			<biblScope unit="page">126</biblScope>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Enterprise Architecture at Work: Modelling, Communication and Analysis</title>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">M</forename><surname>Lankhorst</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
			<publisher>Springer</publisher>
			<pubPlace>Berlin, Heidelberg, Germany</pubPlace>
		</imprint>
	</monogr>
	<note>2 nd edn</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<ptr target="http://www.rapid7.com/" />
		<title level="m">Rapid7: NeXpose</title>
				<imprint>
			<date type="published" when="2011-03">Mar 2011</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">A probabilistic relational model for security risk analysis</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sommestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ekstedt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Johnson</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Computers &amp; Security</title>
		<imprint>
			<biblScope unit="volume">29</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page">659679</biblScope>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<title level="m" type="main">A case study applying the Cyber Security Modeling Language</title>
		<author>
			<persName><forename type="first">T</forename><surname>Sommestad</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Ekstedt</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Nordström</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="http://www.troux.com/products/" />
		<title level="m">Troux Technologies</title>
				<imprint>
			<publisher>Metis</publisher>
			<date type="published" when="2011-03">Mar 2011</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
