期刊文献+

基于ITIL的跨域网络安防运维业务流程设计

ITIL-based Cross-Domain Cyber Security Operation and Maintenance Business Process Design
下载PDF
导出
摘要 随着网络安防系统规模的不断扩大,对运维管理的要求随之不断提高。为解决原有网络安防运维管理整体信息化手段不足、业务处置流程缺乏流程化的弊端,引入业务流程管理理念,构建基于ITIL的网络安防运维业务流程体系;采用以数据为中心的建模方法,设计构建以Artifact为中心的网络安防运维业务流程模型。最后,运用业务流程管理软件构建流程管理系统,验证了业务流程模型的功能作用。 With the continuous expansion of the cyber security system,the requirements for operation and maintenance management have been increased.In order to solve the shortcomings of the inadequate information technology of the original network security operation and maintenance management and the lack of processization of the business disposal process,the business process management concept was introduced to build an ITIL-based network security operation and maintenance business process system.A data-centric modeling method is used to design and build an Artifact-centric network security operation and maintenance business process model.Finally,the business process management software is used to build a process management system,which verified the functional role of the business process model.
作者 郑敏娇 严丽娜 张亮 ZHENG Min-jiao;YAN Li-na;ZHANG Liang(The Experimental and Training Base of College of Information and Communication,National University of Defense Technology,Xi’an Shaanxi 710106,China;Unit 69036 of PLA,Wulumuqi Xinjiang 841000,China)
出处 《通信技术》 2020年第1期101-108,共8页 Communications Technology
关键词 网络安防 业务流程管理 ITIL ARTIFACT cyber security business process management ITIL artifact
  • 相关文献

参考文献2

二级参考文献13

  • 1W M P van der Aalst, A H M ter Hofstede, Weske M. Business Process Management: A Survey[C]//Int Conf on Business Process Management (BPM) 2003. Eindhoven, 2003:3-5.
  • 2Nigam A , Caswell N S. Business Artifacts: An Approach to Operational Specification[J]. IBM Systems Journal, 2003,42(3) :428-445.
  • 3Liu R, Bhattacharya K, Wu F Y. Modeling Business Contexture and Behavior Using Business Artifacts[C]//Int Conf on Advanced Information Systems Engineering (CAiSE) 2007. Trondheim, 2007 : 324-339.
  • 4Gerede C E, Su J. Specification and Verification of Artifact Behaviors in Business Process Models[C]//Int Conf on Service Oriented Computing (ICSOC) 2007. Vienna, 2007:181-191.
  • 5Gerede C E, Bhattacharya K, Su J. Static Analysis of Business Artifact-Centric Operational Models[C]//IEEE Int Conf on Service-O- riented Computing and Applications(SOCA) 2007. Newport Beach, 2007:133-140.
  • 6Bhattacharya K, Gerede C E, Hull R, et al. Towards Formal Analysis of Artifact-Centric Business Process Models[C]//Int Conf on Business Process Management (BPM) 2007. Brisbane, 2007:292-299.
  • 7Liu Guohua, Liu Xi, Qin Haihuan, et al. Automated Realization of Business Workflow Specification[C]//1st International Workshop on SOA, Globalization, People, and Work (SG-PAW)2009. Stockholm, 2009:8-9.
  • 8DF Ferguson,ML Stockton.Service-oriented architecture: programming model and product architecture[].IBM Systems Journal.2005
  • 9Onyeka Ezenwoye,S Masoud Sadjadi.TRAP/BPEL: A Framework for Dynamic Adaptation of Composite Services. Florida International University Technical Report FIU-SCIS-2006-06-02 . 2006
  • 10J.W.Kim,,K.J.Lim.An approach to service-oriented architecture using web service and BPM in the telecom-OSS domain[].Internet Research Electronic Networking Applications and Policy.2007

共引文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部