Conceptualizing the organizational structure domain requires considering multiple levels of classification, with both types and types of types included in the domain of enquiry (e.g., Types of organizational units and particular organizational units). In this paper we propose a semantic foundation for the organizational structure domain that is capable to address the multi-level modeling issues. We present a core organizational structure ontology built with the combination of a foundational ontology (UFO) and a multi-level modeling theory (MLT). This ontology serves to provide semantic foundations for enterprise modeling languages but also as a basis for the development of enterprise-specific ontologies. We discuss our contributions with respect to existing multi-level modeling approaches and with respect to a number of prominent enterprise modeling frameworks, languages and enterprise ontologies.
{"title":"A Semantic Foundation for Organizational Structures: A Multi-level Approach","authors":"V. Carvalho, J. P. Almeida","doi":"10.1109/EDOC.2015.18","DOIUrl":"https://doi.org/10.1109/EDOC.2015.18","url":null,"abstract":"Conceptualizing the organizational structure domain requires considering multiple levels of classification, with both types and types of types included in the domain of enquiry (e.g., Types of organizational units and particular organizational units). In this paper we propose a semantic foundation for the organizational structure domain that is capable to address the multi-level modeling issues. We present a core organizational structure ontology built with the combination of a foundational ontology (UFO) and a multi-level modeling theory (MLT). This ontology serves to provide semantic foundations for enterprise modeling languages but also as a basis for the development of enterprise-specific ontologies. We discuss our contributions with respect to existing multi-level modeling approaches and with respect to a number of prominent enterprise modeling frameworks, languages and enterprise ontologies.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126319653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Joshua C. Nwokeji, T. Clark, B. Barn, V. Kulkarni, Sheena O. Anum
Enterprise agility, generally defined as the ability of an enterprise to detect and respond to changes timely and effectively, is a core imperative for effective change management and optimal performance in contemporary enterprises. It can improve operational efficiency, and enhance competitive ability. At the same time, it is elusive, challenging, and difficult to achieve. A data centric approach can support change management process by providing an avenue to capture, store, and manage information, activities, and knowledge relating to changes. In addition, it can provide an avenue for re-using previous (successful) change management strategies to adapt to similar changes in the future. In this paper, we examine change management concepts and requirements, integrate them into a conceptual data model. To demonstrate utility of this data model, we apply it to real world industry case study. Results show that this approach can be useful to enterprise change management by providing information and intelligence to support change management decisions.
{"title":"A Data-centric Approach to Change Management","authors":"Joshua C. Nwokeji, T. Clark, B. Barn, V. Kulkarni, Sheena O. Anum","doi":"10.1109/EDOC.2015.34","DOIUrl":"https://doi.org/10.1109/EDOC.2015.34","url":null,"abstract":"Enterprise agility, generally defined as the ability of an enterprise to detect and respond to changes timely and effectively, is a core imperative for effective change management and optimal performance in contemporary enterprises. It can improve operational efficiency, and enhance competitive ability. At the same time, it is elusive, challenging, and difficult to achieve. A data centric approach can support change management process by providing an avenue to capture, store, and manage information, activities, and knowledge relating to changes. In addition, it can provide an avenue for re-using previous (successful) change management strategies to adapt to similar changes in the future. In this paper, we examine change management concepts and requirements, integrate them into a conceptual data model. To demonstrate utility of this data model, we apply it to real world industry case study. Results show that this approach can be useful to enterprise change management by providing information and intelligence to support change management decisions.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134022602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the past few years several business process compliance frameworks based on temporal logic have been proposed. In this paper we investigate whether the use of temporal logic is suitable for the task at hand: namely to check whether the specifications of a business process are compatible with the formalisation of the norms regulating the business process. We provide an example inspired by real life norms where the use of linear temporal logic produces a result that is not compatible with the legal understanding of the norms in the example.
{"title":"No Time for Compliance","authors":"Guido Governatori, M. Hashmi","doi":"10.1109/EDOC.2015.12","DOIUrl":"https://doi.org/10.1109/EDOC.2015.12","url":null,"abstract":"In the past few years several business process compliance frameworks based on temporal logic have been proposed. In this paper we investigate whether the use of temporal logic is suitable for the task at hand: namely to check whether the specifications of a business process are compatible with the formalisation of the norms regulating the business process. We provide an example inspired by real life norms where the use of linear temporal logic produces a result that is not compatible with the legal understanding of the norms in the example.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133276232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data visualizations play a prominent role in enterprise information systems in various flavors. Traditional bar, line, or pie charts, or timelines, heat maps, geographical maps, dashboard gauges, and complex relationship mappings are examples of visualizations that are frequently used in business application scenarios. Despite their extensive use, however, there is only few theoretic reflection on how characteristics of data visualizations can be described on an abstract level independent from concrete graphical rendering. This is an obstacle when it comes to consciously reflecting about the use of visualizations for communicating information, because in order to gain a justified understanding of what "good" and "appropriate" visualizations for specific use cases are, at least a common terminology for characteristics of different visualization types is required. This paper introduces a description mechanism for conceptual and perceptual characteristics of data visualizations, which abstracts from concrete visual characteristics, but incorporates a joint notion of the underlying conceptual information displayed by visualizations, together with perceptual qualities of the way visualizations are cognitively processed by the human mind. The suggested solution describes each visualization type as a multidimensional abstract space, with specific scale characteristics attached to each of its axes.
{"title":"A Description Framework for Data Visualizations in Enterprise Information Systems","authors":"J. Gulden","doi":"10.1109/EDOC.2015.20","DOIUrl":"https://doi.org/10.1109/EDOC.2015.20","url":null,"abstract":"Data visualizations play a prominent role in enterprise information systems in various flavors. Traditional bar, line, or pie charts, or timelines, heat maps, geographical maps, dashboard gauges, and complex relationship mappings are examples of visualizations that are frequently used in business application scenarios. Despite their extensive use, however, there is only few theoretic reflection on how characteristics of data visualizations can be described on an abstract level independent from concrete graphical rendering. This is an obstacle when it comes to consciously reflecting about the use of visualizations for communicating information, because in order to gain a justified understanding of what \"good\" and \"appropriate\" visualizations for specific use cases are, at least a common terminology for characteristics of different visualization types is required. This paper introduces a description mechanism for conceptual and perceptual characteristics of data visualizations, which abstracts from concrete visual characteristics, but incorporates a joint notion of the underlying conceptual information displayed by visualizations, together with perceptual qualities of the way visualizations are cognitively processed by the human mind. The suggested solution describes each visualization type as a multidimensional abstract space, with specific scale characteristics attached to each of its axes.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131333381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They offer limited support for secure outsourcing of computation of large datasets in cloud computing environments. This paper presents a model driven approach to define then coordinate the execution of secure outsourcing protocols. First we present the details of our Outsourcing Protocol Definition Language (OPDL) used to define a machine-process able protocols in an abstract and declarative way while leaving the implementation details to the underlying runtime components. The proposed language aims to simplify the design of these protocols while allowing their verification and the generation of cloud services composition to coordinate the protocol execution. We evaluated the expressiveness of OPDL by using it to define a set of representative secure outsourcing protocols from the literature.
{"title":"A Domain Specific Language for Secure Outsourcing of Computation to the Cloud","authors":"M. Nassar, A. Erradi, Q. Malluhi","doi":"10.1109/EDOC.2015.28","DOIUrl":"https://doi.org/10.1109/EDOC.2015.28","url":null,"abstract":"Secure outsourcing of computation has gained importance with the proliferation of cloud services. However, existing outsourcing protocol specification languages are mainly suitable for secure multi-party computation. They offer limited support for secure outsourcing of computation of large datasets in cloud computing environments. This paper presents a model driven approach to define then coordinate the execution of secure outsourcing protocols. First we present the details of our Outsourcing Protocol Definition Language (OPDL) used to define a machine-process able protocols in an abstract and declarative way while leaving the implementation details to the underlying runtime components. The proposed language aims to simplify the design of these protocols while allowing their verification and the generation of cloud services composition to coordinate the protocol execution. We evaluated the expressiveness of OPDL by using it to define a set of representative secure outsourcing protocols from the literature.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115534493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the development of complex and large scale software systems, it is important to detect and fix the deviations of systems' behaviors at different abstraction levels in early phases. Our main focus here is the containment checking-a special type of consistency checking-that verifies whether the behavior (or functions) described by a low-level behavior model encompasses those specified in the high-level counterpart. As shown in our previous work, containment checking can be realized based on model checking, but not always the costly exhaustive searches employed by model checking are necessary for addressing the containment checking problem, leading to potentials for optimization. In addition, model checking and similar techniques often yield the checking results as true (satisfied) or false (unsatisfied) with error traces (e.g., Counter-examples). Unfortunately, such feedback is rather not helpful for users with limited background on the underlying formal methods to analyze and understand the causes of consistency violations. In this paper, we propose a lightweight graph-based approach for addressing the aforementioned problems of containment checking. The theoretical complexity of our approach is a cubic polynomial of the number of elements of the input behavior models. Additionally, we aim at generating feedbacks that are relevant and easy-to-understand for the stakeholders. Our approach is illustrated and evaluated on UML activity diagrams-that are widely used for modeling behaviors of software systems-using use cases derived from industrial scenarios.
{"title":"A Graph-Based Approach for Containment Checking of Behavior Models of Software Systems","authors":"Huy Tran, Faiz ul Muram, Uwe Zdun","doi":"10.1109/EDOC.2015.22","DOIUrl":"https://doi.org/10.1109/EDOC.2015.22","url":null,"abstract":"In the development of complex and large scale software systems, it is important to detect and fix the deviations of systems' behaviors at different abstraction levels in early phases. Our main focus here is the containment checking-a special type of consistency checking-that verifies whether the behavior (or functions) described by a low-level behavior model encompasses those specified in the high-level counterpart. As shown in our previous work, containment checking can be realized based on model checking, but not always the costly exhaustive searches employed by model checking are necessary for addressing the containment checking problem, leading to potentials for optimization. In addition, model checking and similar techniques often yield the checking results as true (satisfied) or false (unsatisfied) with error traces (e.g., Counter-examples). Unfortunately, such feedback is rather not helpful for users with limited background on the underlying formal methods to analyze and understand the causes of consistency violations. In this paper, we propose a lightweight graph-based approach for addressing the aforementioned problems of containment checking. The theoretical complexity of our approach is a cubic polynomial of the number of elements of the input behavior models. Additionally, we aim at generating feedbacks that are relevant and easy-to-understand for the stakeholders. Our approach is illustrated and evaluated on UML activity diagrams-that are widely used for modeling behaviors of software systems-using use cases derived from industrial scenarios.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114463645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdullah Alfazi, Quan Z. Sheng, Yongrui Qin, Talal H. Noor
Over the past few years, cloud computing has been more and more attractive as a new computing paradigm due to high flexibility for provisioning on-demand computing resources that are used as services through the Internet. In cloud computing, the unique characteristics in cloud services such as dynamic and diverse services offered at different levels, together with the lack of standardized description languages pose significant challenges for effective cloud service discovery. In this paper, we propose a cloud service search engine that exploits a novel ontology-based technique for identifying cloud service categories to improve the accuracy of cloud services searching in real environments. Our approach has the capability to automatically identify and categorize cloud services by detecting cloud service concepts from cloud service sources. Initially, we focus on building the cloud service ontology by using NIST (US National Institute of Standards and Technology). Then, we utilize our cloud service categorization method to investigate cloud service ontology's concepts in a real-world cloud services dataset which contains the metadata of 5,883 real cloud services. After that, we generate cloud service clusters by using cosine similarity to build the cloud service categorization. Our cloud service categorization is helpful in determining whether a given web source is a cloud service. Furthermore, the new web resource which has been categorized as a cloud service can be used to boost knowledge of cloud service categorization cumulatively. The proposed approach is validated by using real-world cloud services available on the World Wide Web and the experimental results show the effectiveness of the approach in cloud service discovery.
{"title":"Ontology-Based Automatic Cloud Service Categorization for Enhancing Cloud Service Discovery","authors":"Abdullah Alfazi, Quan Z. Sheng, Yongrui Qin, Talal H. Noor","doi":"10.1109/EDOC.2015.30","DOIUrl":"https://doi.org/10.1109/EDOC.2015.30","url":null,"abstract":"Over the past few years, cloud computing has been more and more attractive as a new computing paradigm due to high flexibility for provisioning on-demand computing resources that are used as services through the Internet. In cloud computing, the unique characteristics in cloud services such as dynamic and diverse services offered at different levels, together with the lack of standardized description languages pose significant challenges for effective cloud service discovery. In this paper, we propose a cloud service search engine that exploits a novel ontology-based technique for identifying cloud service categories to improve the accuracy of cloud services searching in real environments. Our approach has the capability to automatically identify and categorize cloud services by detecting cloud service concepts from cloud service sources. Initially, we focus on building the cloud service ontology by using NIST (US National Institute of Standards and Technology). Then, we utilize our cloud service categorization method to investigate cloud service ontology's concepts in a real-world cloud services dataset which contains the metadata of 5,883 real cloud services. After that, we generate cloud service clusters by using cosine similarity to build the cloud service categorization. Our cloud service categorization is helpful in determining whether a given web source is a cloud service. Furthermore, the new web resource which has been categorized as a cloud service can be used to boost knowledge of cloud service categorization cumulatively. The proposed approach is validated by using real-world cloud services available on the World Wide Web and the experimental results show the effectiveness of the approach in cloud service discovery.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126738665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The operational support of knowledge-intensive business processes constitutes a big challenge. In particular, these processes are driven by knowledge workers utilizing their skills, experiences, and expertise. Regarding coordination and synchronization, in turn, knowledge workers still rely on simple task lists (e.g., To-do lists or checklists) and established communication software (e.g., email). While these means are prevalent and intuitive, they are ineffective and error-prone as well. Neither tasks are made explicit, synchronized, personalized, nor are they independent from media breaks. Most important, a task management lifecycle is not provided, i.e., The efforts and knowledge invested by the knowledge workers in task management are not preserved for comparable future endeavors. This work introduces the pro Collab approach proposing a systematic and lifecycle-based task management support for knowledge workers. To establish a sound task management lifecycle, in particular, we apply process mining to analyze knowledge workers' changes applied to task lists in order to derive optimizations task list templates. To demonstrate feasibility and benefits, a proof-of-concept prototype was developed and applied. Overall, the integrated, systematic and lifecycle-based task management support is prerequisite for the effective IT support of KiBPs.
{"title":"Supporting Knowledge-Intensive Processes through Integrated Task Lifecycle Support","authors":"Nicolas Mundbrod, Florian Beuter, M. Reichert","doi":"10.1109/EDOC.2015.13","DOIUrl":"https://doi.org/10.1109/EDOC.2015.13","url":null,"abstract":"The operational support of knowledge-intensive business processes constitutes a big challenge. In particular, these processes are driven by knowledge workers utilizing their skills, experiences, and expertise. Regarding coordination and synchronization, in turn, knowledge workers still rely on simple task lists (e.g., To-do lists or checklists) and established communication software (e.g., email). While these means are prevalent and intuitive, they are ineffective and error-prone as well. Neither tasks are made explicit, synchronized, personalized, nor are they independent from media breaks. Most important, a task management lifecycle is not provided, i.e., The efforts and knowledge invested by the knowledge workers in task management are not preserved for comparable future endeavors. This work introduces the pro Collab approach proposing a systematic and lifecycle-based task management support for knowledge workers. To establish a sound task management lifecycle, in particular, we apply process mining to analyze knowledge workers' changes applied to task lists in order to derive optimizations task list templates. To demonstrate feasibility and benefits, a proof-of-concept prototype was developed and applied. Overall, the integrated, systematic and lifecycle-based task management support is prerequisite for the effective IT support of KiBPs.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"12 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Summary form only given. Model-driven engineering has gained popularity in recent years offering a way to abstractly specify complex computational models and algorithms and generate both configurations and code to achieve their realisation. Often domain-specific languages are used as way to express these model structures enabling end users to better specify their target system needs. We have been applying MDE and Domain-Specific Visual Languages (DSVLs) to the domain of Big Data analytics systems to better support end users in realising solutions for the enterprise as well as individual needs. In this talk I discuss key requirements of Big Data social enterprise systems, including those for health, transport and finance domains. I discuss approaches to utilising MDE and DSVLs to achieve desired solutions, including interface and architectures. I report on our and others progress to date and outline ways increasing personal and social data from the emerging Internet of Things with further transform this space.
{"title":"Model-Driven Engineering for the Social Enterprise","authors":"J. Grundy","doi":"10.1109/EDOC.2015.16","DOIUrl":"https://doi.org/10.1109/EDOC.2015.16","url":null,"abstract":"Summary form only given. Model-driven engineering has gained popularity in recent years offering a way to abstractly specify complex computational models and algorithms and generate both configurations and code to achieve their realisation. Often domain-specific languages are used as way to express these model structures enabling end users to better specify their target system needs. We have been applying MDE and Domain-Specific Visual Languages (DSVLs) to the domain of Big Data analytics systems to better support end users in realising solutions for the enterprise as well as individual needs. In this talk I discuss key requirements of Big Data social enterprise systems, including those for health, transport and finance domains. I discuss approaches to utilising MDE and DSVLs to achieve desired solutions, including interface and architectures. I report on our and others progress to date and outline ways increasing personal and social data from the emerging Internet of Things with further transform this space.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129247748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
All Enterprise Architecture Modeling (EAM) approaches revolve around the use of multiple, inter-related views to describe the properties of a system and its surrounding environment - that is, they are multi-view specification (MVS) approaches. However, there is still little consensus on how such modeling environments should be realized and on the pros and cons of the different fundamental design choices involved in building them. In this paper we identify the different design choices put forward in the literature, evaluate their mutual compatibility, and discuss the extent to which they scale up to large enterprise systems. Finally we present some additional choices and outline some of the key features that future multi-view modeling environments should ideally support.
{"title":"Fundamental Realization Strategies for Multi-view Specification Environments","authors":"C. Atkinson, Christian Tunjic, Torben Moller","doi":"10.1109/EDOC.2015.17","DOIUrl":"https://doi.org/10.1109/EDOC.2015.17","url":null,"abstract":"All Enterprise Architecture Modeling (EAM) approaches revolve around the use of multiple, inter-related views to describe the properties of a system and its surrounding environment - that is, they are multi-view specification (MVS) approaches. However, there is still little consensus on how such modeling environments should be realized and on the pros and cons of the different fundamental design choices involved in building them. In this paper we identify the different design choices put forward in the literature, evaluate their mutual compatibility, and discuss the extent to which they scale up to large enterprise systems. Finally we present some additional choices and outline some of the key features that future multi-view modeling environments should ideally support.","PeriodicalId":112281,"journal":{"name":"2015 IEEE 19th International Enterprise Distributed Object Computing Conference","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}