{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:27:48Z","timestamp":1729621668940,"version":"3.28.0"},"reference-count":57,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,10]]},"DOI":"10.1109\/edoc.2007.39","type":"proceedings-article","created":{"date-parts":[[2008,4,28]],"date-time":"2008-04-28T17:01:51Z","timestamp":1209402111000},"page":"130-130","source":"Crossref","is-referenced-by-count":25,"title":["Enterprise Architecture: A Framework Supporting System Quality Analysis"],"prefix":"10.1109","author":[{"given":"Per","family":"Narman","sequence":"first","affiliation":[]},{"given":"Pontus","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Lars","family":"Nordstrom","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Proceedings of the 29th EUROMICRO Conference New Waves in System Architecture","article-title":"The Impact of Maintainability on Component-based Software Systems","year":"2003","author":"matinlassi","key":"35"},{"journal-title":"Underlying Technical Models for Information Technology Security","year":"2001","author":"stoneburner","key":"36"},{"key":"33","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1002\/(SICI)1096-908X(199705)9:3<161::AID-SMR148>3.0.CO;2-8","article-title":"A Method for Estimating Maintenance Cost in a Software Project: A case study","volume":"9","author":"granja-alvarez","year":"1997","journal-title":"Software Maintenance Research and Practice"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/RAMS.2002.981648"},{"journal-title":"Computing Systems Reliability Models and Analysis","year":"2004","author":"xie","key":"39"},{"year":"2005","key":"37","article-title":"Information technology -Security techniques - Code of practice for information security management, ISO\/IEC"},{"journal-title":"Assessment of Enterprise Information Security","year":"2005","author":"johansson","key":"38"},{"journal-title":"High Availability Design Techniques and Processes","year":"2001","author":"hawkins","key":"43"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/2.84898"},{"year":"0","key":"41"},{"journal-title":"Systems Reliability and Failure Prevention","year":"2004","author":"hecht","key":"40"},{"key":"22","first-page":"31","article-title":"Analyzing System Maintainability Using Enterprise Architecture Models","author":"lagerstro?m","year":"2007","journal-title":"Proceedings of the 2nd Workshop on Trends in Enterprise Architecture Research (TEAR'07)"},{"journal-title":"Characteristics of Software Quality","year":"1978","author":"boehm","key":"23"},{"volume":"i iii","journal-title":"Factors in Software Quality","year":"1978","author":"mccall","key":"24"},{"journal-title":"Software Metrics Establishing a Company-Wide Program","year":"1987","author":"grady","key":"25"},{"journal-title":"ISO\/IEC TR 9126-2 Technical Report - Software Engineering -Product Quality - Part 2 External Metrics","year":"2003","key":"26"},{"journal-title":"ISO\/IEC TR 9126-3 Technical Report - Software Engineering -Product Quality - Part 3 Internal Metrics","year":"2003","key":"27"},{"journal-title":"ISO\/IEC TR 9126-43 Technical Report - Software Engineering -Product Quality - Part 4 Quality in use metrics","year":"2004","key":"28"},{"journal-title":"Enterprise Architecture - Models and Analyses for Information System Decision Making","year":"2007","author":"johnson","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"},{"year":"0","key":"2"},{"year":"0","key":"1"},{"journal-title":"The Integrated Energy and Communication Systems Architecture","year":"2004","author":"hughes","key":"7"},{"journal-title":"Standard Glossary of Software Engineering Terminology 610 12-1990","year":"1990","key":"30"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(94)90017-5"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/0166-3615(95)00016-9"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/32.536958"},{"year":"0","key":"4"},{"year":"0","key":"31"},{"year":"0","key":"9"},{"journal-title":"Business Process Engineering Reference Models for Industrial Enterprises","year":"1994","author":"scheer","key":"8"},{"key":"57","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0053581","article-title":"Specifying and Analyzing Dynamic Software Architectures","author":"allen","year":"1998","journal-title":"Proceedings of the 1998 Conference on Fundamental Approaches to Software Engineering"},{"key":"56","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302410"},{"key":"19","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008731200105"},{"article-title":"Detecting Architectural Mismatch During System Composition","year":"1998","author":"gacek","key":"55"},{"journal-title":"Learning Bayesian Networks","year":"2003","author":"neapolitan","key":"17"},{"year":"0","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1287\/opre.34.6.871"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1287\/deca.1050.0050"},{"year":"0","key":"13"},{"key":"14","first-page":"599","article-title":"Extended Influence Diagram Generation","author":"johnson","year":"2007","journal-title":"Enterprise Interoperability II - New Challenges and Approaches"},{"journal-title":"NIST Special Publication 800-33 Underlying Technical Models for Information Technology Security - Recommendations of the National Institute of Standards and Technology","year":"2001","author":"stoneburner","key":"11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.SP.800-33"},{"journal-title":"ISO\/IEC 9126-1 International Standard - Software Engineering-Product Quality - Part 1 Quality Model","year":"2001","key":"12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1287\/opre.36.4.589"},{"journal-title":"Autonomous Agents 2000 Workshop on Deception Fraud and Trust in Agent Societies","article-title":"Towards improved trust and security in fipa agent platforms","year":"2000","author":"poslad","key":"20"},{"journal-title":"Enterprise Software System Integration - An Architectural Perspective","year":"2002","author":"johnson","key":"49"},{"journal-title":"Current Perspectives on Interoperability","year":"2004","author":"brownsword","key":"48","doi-asserted-by":"crossref","DOI":"10.21236\/ADA421613"},{"journal-title":"Ten usability heuristics","year":"0","author":"nielsen","key":"45"},{"journal-title":"Usability Engineering","year":"1993","author":"nielsen","key":"44"},{"journal-title":"Measuring Systems Interoperability Challenges and Opportunities Technical Note CMU\/SEI-2004-TN-003","year":"2004","author":"kasunic","key":"47"},{"journal-title":"Performance Solutions A Practical Guide to Creating Responsive Scalable Software","year":"2001","author":"smith","key":"46"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF02223258"},{"journal-title":"Data Quality for the Information Age","year":"1996","author":"redman","key":"51"},{"journal-title":"Metis Architect - Datasheet","year":"0","key":"52"},{"journal-title":"Decision System Laboratories About GeNIe and SMILE University of Pittsburgh","year":"0","key":"53"},{"journal-title":"Evaluating Software Architectures Methods and Case Studies","year":"2001","author":"clements","key":"54"},{"journal-title":"Requirements Engineering","year":"2004","author":"sommeville","key":"50"}],"event":{"name":"11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007)","start":{"date-parts":[[2007,10,15]]},"location":"Annapolis, MD, USA","end":{"date-parts":[[2007,10,19]]}},"container-title":["11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4383963\/4383964\/04383988.pdf?arnumber=4383988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,10]],"date-time":"2019-05-10T19:49:37Z","timestamp":1557517777000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4383988\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10]]},"references-count":57,"URL":"https:\/\/doi.org\/10.1109\/edoc.2007.39","relation":{},"subject":[],"published":{"date-parts":[[2007,10]]}}}