Skip to main content
Till KTH:s startsida Till KTH:s startsida

Publications by Pontus Johnson

Refereegranskade

Artiklar

[1]
W. Widel et al., "The meta attack language-a formal description," Computers & security (Print), vol. 130, pp. 103284, 2023.
[2]
V. Engström et al., "Automated Security Assessments of Amazon Web Service Environments," ACM Transactions on Privacy and Security, vol. 26, no. 2, pp. 1-31, 2022.
[3]
S. Katsikeas et al., "Research communities in cyber security: A comprehensive literature review," Computer Science Review, vol. 42, pp. 100431-100431, 2021.
[4]
P. Johnson et al., "Can the Common Vulnerability Scoring System be Trusted? : A Bayesian Analysis," IEEE Transactions on Dependable and Secure Computing, vol. 15, no. 6, pp. 1002-1015, 2018.
[5]
R. Lagerström et al., "Automated Probabilistic System Architecture Analysis in the Multi-Attribute Prediction Language (MAPL) : Iteratively Developed using Multiple Case Studies," International Journal of Complex Systems Informatics and Modeling Quarterly (CSIMQ), vol. June/July, no. 11, pp. 38-68, 2017.
[6]
J. Ullberg and P. Johnson, "Empirical assessment of the accuracy of an interoperability prediction language," Information Systems Frontiers, pp. 1-15, 2016.
[7]
P. Johnson and M. Ekstedt, "The Tarpit - A general theory of software engineering," Information and Software Technology, vol. 70, pp. 181-203, 2016.
[8]
P. Johnson et al., "Time between vulnerability disclosures : A measure of software product vulnerability," Computers & security (Print), vol. 62, pp. 278-295, 2016.
[9]
P. Narman, P. Johnson and L. Gingnell, "Using enterprise architecture to analyse how organisational structure impact motivation and learning," Enterprise Information Systems, vol. 10, no. 5, pp. 523-562, 2016.
[10]
P. Johnson et al., "Towards general theories of software engineering," Science of Computer Programming, vol. 101, pp. 1-5, 2015.
[11]
P. Johnson et al., "A method for predicting the probability of business network profitability," Information Systems and E-Business Management, vol. 12, no. 4, pp. 567-593, 2014.
[12]
U. Franke, P. Johnson and J. König, "An architecture framework for enterprise IT service availability analysis," Software and Systems Modeling, vol. 13, no. 4, pp. 1417-1445, 2014.
[13]
P. Johnson et al., "An architecture modeling framework for probabilistic prediction," Information Systems and E-Business Management, vol. 12, no. 4, pp. 595-622, 2014.
[14]
J. Ullberg, P. Johnson and M. Buschle, "A language for interoperability modeling and prediction," Computers in industry (Print), vol. 63, no. 8, pp. 766-774, 2012.
[15]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian framework," Software quality journal, vol. 20, no. 2, pp. 369-394, 2012.
[16]
Q. Lambert et al., "Business models for an aggregator," Information Management & Computer Security, 2012.
[17]
P. Närman et al., "Using enterprise architecture and technology adoption models to predict application usage," Journal of Systems and Software, vol. 85, no. 8, pp. 1953-1967, 2012.
[18]
P. Johnson, M. Ekstedt and I. Jacobson, "Where's the theory for software engineering?," IEEE Software, vol. 29, no. 5, pp. 94-95, 2012.
[19]
P. Närman et al., "Data accuracy assessment using enterprise architecture," Enterprise Information Systems, vol. 5, no. 1, pp. 37-58, 2011.
[20]
M. Simonsson et al., "It governance decision support using the it organization modeling and assesment tool," International Journal of Innovation and Technology Management (IJITM), vol. 8, no. 2, pp. 167-189, 2011.
[21]
G. Grossmann, C. -. Chi and P. Johnson, "Message from the EDOC program co-chairs and workshops chair," 15th IEEE International EDOC Enterprise Computing Conference Workshops, EDOCW 2011, 2011.
[22]
C. -. Chi and P. Johnson, "Message from the program co-chairs," 15th IEEE International EDOC Enterprise Computing Conference, EDOC 2011, pp. ix-x, 2011.
[23]
T. Sommestad, M. Ekstedt and P. Johnson, "A probabilistic relational model for security risk analysis," Computers & security (Print), vol. 29, no. 6, pp. 659-679, 2010.
[24]
R. Lagerström, P. Johnson and M. Ekstedt, "Architecture analysis of enterprise systems modifiability - A metamodel for software change cost estimation," Software quality journal, vol. 18, no. 4, pp. 437-468, 2010.
[25]
R. Lagerström, P. Johnson and D. Höök, "Architecture analysis of enterprise systems modifiability - Models, analysis, and validation," Journal of Systems and Software, vol. 83, no. 8, pp. 1387-1403, 2010.
[26]
M. Simonsson, P. Johnson and M. Ekstedt, "The Effect of IT Governance Maturity on IT Governance Performance," Information systems management, vol. 27, no. 1, pp. 10-24, 2010.
[27]
R. Lagerström et al., "A method for creating entreprise architecture metamodels : applied to systems modifiability," International Journal of Computer Science and Applications, vol. 6, no. 5, pp. 89-120, 2009.
[28]
M. Van Sinderen, P. Johnson and L. Kutvonen, "Report on the IFIP WG5.8 International Workshop on Enterprise Interoperability : IWEI 2008," SIGMOD record, vol. 37, no. 4, pp. 112-114, 2008.
[29]
P. Johnson and E. Johansson, "Assessment of Business Process Information Security," International Journal of Business Process Integration and Management, vol. 3, no. 2, pp. 118-130, 2007.
[30]
P. Johnson et al., "Enterprise architecture analysis with extended influence diagrams," Information Systems Frontiers, vol. 9, no. 2-3, pp. 163-180, 2007.
[31]
P. Johnson et al., "Extended Influence Diagrams for System Quality Analysis," Journal of Software, vol. 2, no. 3, pp. 30-42, 2007.
[32]
Å. Lindstrom et al., "A survey on CIO concerns - do enterprise architecture frameworks support them?," Information Systems Frontiers, vol. 8, no. 2, pp. 81-90, 2006.
[33]
E. Johansson, M. Ekstedt and P. Johnson, "Assessment of Enterprise Information Security : The Importance of Information Search Cost," Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 9, pp. 219a, 2006.
[34]
J. Andersson and P. Johnson, "IT Infrastructure Architectures for Electric Utilities : A Comparative Analysis of Description Techniques," Proceedings of the Annual Hawaii International Conference on System Sciences, vol. 4, 2000.

Konferensbidrag

[35]
J. Nyberg, P. Johnson and A. Mehes, "Cyber threat response using reinforcement learning in graph-based attack simulations," in Proceedings of the IEEE/IFIP Network Operations and Management Symposium 2022 : Network and Service Management in the Era of Cloudification, Softwarization and Artificial Intelligence, NOMS 2022, 2022.
[36]
S. Katsikeas et al., "An Attack Simulation Language for the IT Domain," in Graphical Models for Security : 7th International Workshop, GraMSec 2020, Boston, MA, USA, June 22, 2020, Revised Selected Papers, 2020, pp. 67-86.
[37]
N. Kakouros, P. Johnson and R. Lagerström, "Detecting plagiarism in penetration testing education," in Nordsec 2020, The 25th Nordic Conference on Secure IT Systems, November 23-24, Online, 2020.
[38]
S. Katsikeas et al., "Probabilistic Modeling and Simulation of Vehicular Cyber Attacks : An Application of the Meta Attack Language," in Proceedings of the 5th international conference on information systems security and privacy (ICISSP), 2019, pp. 175-182.
[39]
P. Johnson, R. Lagerström and M. Ekstedt, "A Meta Language for Threat Modeling and Attack Simulations," in ACM International Conference Proceeding Series, 2018.
[40]
S. Nurcan and P. Johnson, "Message from the EDOC 2018 program chairs," in Proceedings - 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference, EDOC 2018, 2018.
[41]
R. Lagerström, P. Johnson and M. Ekstedt, "Automatic Design of Secure Enterprise Architecture," in Proceedings of the 2017 IEEE 21st International Enterprise Distributed Object Computing Conference Workshops and Demonstrations (EDOCW 2017), 2017, pp. 65-70.
[42]
A. Vernotte et al., "In-Depth Modeling of the UNIX Operating System for Architectural Cyber Security Analysis," in PROCEEDINGS OF THE 2017 IEEE 21ST INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS AND DEMONSTRATIONS (EDOCW 2017), 2017, pp. 127-136.
[43]
P. Närman and P. Johnson, "Analyzing Coordination and Flexibility in Organizations Using Enterprise Architecture," in 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, pp. 106-113.
[44]
P. Johnson, M. Ekstedt and R. Lagerström, "Automatic Probabilistic Enterprise IT Architecture Modeling : a Dynamic Bayesian Networks Approach," in 2016 IEEE 20TH INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING WORKSHOP (EDOCW), 2016, pp. 122-129.
[45]
P. Johnson et al., "Modeling and analyzing systems-of-systems in the Multi-Attribute Prediction Language (MAPL)," in Proceedings - 4th International Workshop on Software Engineering for Systems-of-Systems, SESoS 2016, 2016, pp. 1-7.
[46]
P. Johnson et al., "Quantitative Information Security Risk Estimation using Probabilistic Attack Graphs," in RISK: International Workshop on Risk Assessment and Risk-driven Testing : 4th International Workshop, RISK 2016, Held in Conjunction with ICTSS 2016, Graz, Austria, October 18, 2016, Revised Selected Papers, 2016, pp. 37-52.
[47]
P. Johnson et al., "pwnPr3d: an Attack Graph Driven Probabilistic Threat Modeling Approach," in Availability, Reliability and Security (ARES), 2016 11th International Conference on, 2016.
[48]
P. Johnson and M. Ekstedt, "Exploring theory of cognition for general theory of software engineering : Predicting the effort of programming language comprehension," in Proceedings - 4th SEMAT Workshop on General Theory of Software Engineering, GTSE 2015, 2015, pp. 15-24.
[49]
M. Välja et al., "Integrated metamodel for security analysis," in 2015 48TH HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2015, pp. 5192-5200.
[50]
R. Lagerström, P. Johnson and M. Ekstedt, "Search-Based Design of Large Software Systems-of-Systems," in Proceedings - 3rd International Workshop on Software Engineering for Systems-of-Systems, SESoS 2015, 2015, pp. 44-47.
[51]
M. Ekstedt et al., "securiCAD by foreseeti : A CAD tool for enterprise cyber security management," in Proceedings of the 2015 IEEE 19th International Enterprise Distributed Object Computing Conference Workshops and Demonstrations, EDOCW 2015, 2015.
[52]
P. Johnson et al., "2nd SEMAT workshop on a general theory of software engineering (GTSE 2013)," in 2013 35th International Conference on Software Engineering (ICSE), 2013, pp. 1525-1526.
[53]
J. Ullberg et al., "Architecture Modeling for Interoperability Analysis on the Future Internet," in Enterprise Interoperability: I-ESA'12 Proceedings, 2013, pp. 111-117.
[54]
P. Johnson et al., "Business model risk analysis : Predicting the probability of business network profitability," in Lecture Notes in Business Information Processing, 2013, pp. 118-130.
[55]
M. Österlind et al., "Enterprise Architecture Evaluation using Utility theory," in Proceedings 17th IEEE International Enterprise Distributed Object Computing Conference Workshops (EDOCW), 2013, pp. 347-351.
[56]
M. Välja et al., "Modeling and prediction of monetary and non-monetary business values," in 2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC), 2013, pp. 153-158.
[57]
P. Johnson et al., "P2AMF : Predictive, probabilistic architecture modeling framework," in Proceedings Enterprise Interoperability - 5th International IFIP Working Conference, IWEI 2013, 2013, pp. 104-117.
[58]
L. F. Pires and P. Johnson, "Report Workshop 5," in ENTERPRISE INTEROPERABILITY : RESEARCH AND APPLICATIONS IN THE SERVICE-ORIENTED ECOSYSTEM, 2013, pp. 181-183.
[59]
M. Buschle, P. Johnson and K. Shahzad, "The Enterprise Architecture Analysis Tool–Support for the Predictive, Probabilistic Architecture Modeling Framework," in 19th Americas Conference on Information Systems, AMCIS 2013 : Hyperconnected WorldAnything, Anywhere, Anytime, 2013, pp. 3350-3364.
[60]
M. Van Sinderen and P. Johnson, "Lecture Notes in Business Information Processing : Preface," in Lecture Notes in Business Information Processing: Preface, 2012, pp. V-VI.
[61]
J. Ullberg and P. Johnson, "Predicting Interoperability in an Environmental Assurance System," in Enterprise Interoperability V : Shaping Enterprise Interoperability in the Future Internet, 2012, pp. 25-35.
[62]
M. van Sinderen et al., "Preparing the Future Internet for ad-hoc business networks support," in Architecture Modeling for the Future Internet enabled Enterprise (AMFInE) workshop, 2012.
[63]
I. Jacobson et al., "Re-founding Software Engineering : SEMAT at the Age of Three (Keynote Abstract)," in Proceedings of the 27th IEEE/ACM International Conference on Automated Software Engineering, 2012, pp. 15-19.
[64]
J. Ullberg, P. Johnson and M. Buschle, "A Modeling Language for Interoperability Assessments," in ENTERPRISE INTEROPERABILITY, 2011, pp. 61-74.
[65]
S. Buckl et al., "A meta-language for Enterprise Architecture analysis," in 12th International Conference on Business Process Modeling, Development and Support, BPMDS 2011 and 16th International Conference on Exploring Modeling Methods for Systems Analysis and Design, 2011, pp. 511-525.
[66]
J. Ullberg et al., "A Tool for Interoperability Analysis of Enterprise Architecture Models using Pi-OCL," in Enterprise interoperability iv : making the internet of the future for the future of enterprise, 2010, pp. 81-90.
[67]
U. Franke et al., "Availability of enterprise IT systems : an expert-based Bayesian model," in Proc. Fourth International Workshop on Software Quality and Maintainability, 2010.
[68]
P. Närman et al., "Hybrid Probabilistic Relational Models for System Quality Analysis," in Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC, 2010, pp. 57-66.
[69]
U. Franke et al., "A Method for Choosing Software Assessment Measures using Bayesian Networks and Diagnosis : CSMR 2009, PROCEEDINGS," in 13TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING: CSMR 2009, PROCEEDINGS, 2009, pp. 241-245.
[70]
A. Källgren, J. Ullberg and P. Johnson, "A Method for Constructing a Company Specific Enterprise Architecture Model Framework," in 10th ACIS Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2009 : In conjunction with IWEA 2009 and WEACR 2009, 2009, pp. 346-351.
[71]
S. Aier et al., "A Survival Analysis of Application Life Spans based on Enterprise Architecture Models," in Proc. 3rd International Workshop on Enterprise Modelling and Information Systems Architectures, EMISA 2009, 2009, pp. 141-154.
[72]
M. Ekstedt et al., "A Tool for Enterprise Architecture Analysis of Maintainability : CSMR 2009, PROCEEDINGS," in EUR CON SFTWR MTNCE REENGR, 2009, pp. 327-328.
[73]
U. Franke et al., "A formal method for cost and accuracy trade-off analysis in software assessment measures," in RCIS 2009 : PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE, 2009, pp. 295-302.
[74]
D. Höök et al., "An Enterprise Architecture Based Method Enabling Quantified Analysis of IT Support System's Impact on Maintenance Management," in PROCEEDINGS OF PICMET 09 : TECHNOLOGY MANAGEMENT IN THE AGE OF FUNDAMENTAL CHANGE, 2009, pp. 3092-3105.
[75]
U. Franke and P. Johnson, "An Enterprise Architecture Framework for Application Consolidation in the Swedish Armed Forces," in 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, pp. 264-273.
[76]
R. Lagerström, P. Johnson and D. Höök, "An Enterprise Architecture Management Pattern for Software Change Project Cost Analysis," in Patterns in Enterprise Architecture Management (PEAM2009) workshop, 2009.
[77]
J. Ullberg, D. Chen and P. Johnson, "Barriers to Enterprise Interoperability," in ENTERPRISE INTEROPERABILITY, PROCEEDINGS, 2009, pp. 13-24.
[78]
T. Sommestad, M. Ekstedt and P. Johnson, "Cyber Security Risks Assessment with Bayesian Defense Graphs and Architectural Models," in Proceedings of the 42nd Annual Hawaii International Conference on System Sciences, HICSS, 2009.
[79]
P. Närman et al., "Data Collection Prioritization for System Quality Analysis," in Electronic Notes in Theoretical Computer Science, 2009, pp. 29-42.
[80]
U. Franke et al., "Decision Support oriented Enterprise Architecture Metamodel Management using Classification Trees," in 2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, pp. 328-335.
[81]
J. Ullberg, P. Johnson and R. Lagerström, "Education in Enterprise Architecture Analysis : Assessing interoperability of service oriented architectures," in The 5th China - Europe International Symposium on Software Industry Oriented Education (CEISIE 2009). Bordeaux, France. 25-26 May 2009, 2009.
[82]
P. Närman et al., "Enterprise Architecture Analysis for Data Accuracy Assessments," in 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, pp. 24-33.
[83]
U. Franke, W. Flores Rocha and P. Johnson, "Enterprise Architecture Dependency Analysis using Fault Trees and Bayesian Networks," in Proc. 42nd Annual Simulation Symposium, 2009, pp. 209-216.
[84]
U. Franke et al., "Enterprise Architecture analysis using Fault Trees and MODAF," in Proceedings of the Forum at the CAiSE 2009 Conference, 2009, pp. 61-66.
[85]
P. Gustafsson, P. Johnson and L. Nordström, "Enterprise architecture : A framework supporting organizational performance analysis," in IET Conference Publications : Issue 550 CP, 2009, 2009.
[86]
U. Franke, W. R. Flores and P. Johnson, "Enterprise architecture dependency analysis using fault trees and Bayesian networks," in Spring Simulation Multiconference 2009 - Co-located with the 2009 SISO Spring Simulation Interoperability Workshop, 2009.
[87]
W. R. Flores et al., "Indicators predicting similarities in maturity between processes : An empirical Analysis with 35 European organizations," in 1st Annual Pre-ICIS Workshop on Accounting Information Systems, 2009.
[88]
P. Gustafsson et al., "Modeling the IT Impact on Organizational Structure : 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE," in EDOC: 2009 IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, 2009, pp. 14-23.
[89]
R. Lagerström et al., "Software Change Project Cost Estimation - A Bayesian Network and a Method for Expert Elicitation," in Third International Workshop on Software Quality and Maintainability (SQM), 2009.
[90]
M. Simonsson, R. Lagerström and P. Johnson, "A Bayesian Network for IT Governance Performance Prediction," in Proceedings of the 10th International Con-ference on Electronic Commerce, 2008.
[91]
J. Ullberg, R. Lagerström and P. Johnson, "A Framework for Service Interoperability Analysis using Enterprise Architecture Models," in 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING, PROCEEDINGS, VOL 2, 2008, pp. 99-107.
[92]
T. Sommestad, M. Ekstedt and P. Johnson, "Combining defense graphs and enterprise architecture models for security analysis," in Proceedings - 12th IEEE International Enterprise Distributed Object Computing Conference, EDOC 2008, 2008, pp. 349-355.
[93]
U. Franke et al., "Defense graphs and Enterprise Architecture for Information Assurance analysis," in Proceedings of the 26th Army Science Conference, 2008.
[94]
J. Ullberg, R. Lagerström and P. Johnson, "Enterprise architecture - A service interoperability analysis framework," in ENTERPRISE INTEROPERABILITY III : NEW CHALLENGES AND INDUSTRIAL APPROACHES, 2008, pp. 611-623.
[95]
M. Simonsson, P. Johnson and M. Ekstedt, "IT Governance Decision Support using the IT Organization Modeling and Assessment Tool," in 2008 Portland International Center for Management of Engineering and Technology, Technology Management for a Sustainable Economy, PICMET '08, 2008, pp. 802-810.
[96]
P. Gustafsson et al., "Identifying IT impacts on organizational structure and business value," in Proceedings of the Third International Workshop on Business/IT Alignment and Interoperability, 2008, pp. 44-57.
[97]
M. Simonsson et al., "Modeling and Evaluating the Maturity of IT Governance," in Proceedings of the International Council on Large Electrical Systems, CIGRÉ, 2008, p. 8p.
[98]
L. Nordstrom, P. Närman and P. Johnson, "Modelling and evaluating non-functional aspects of integrated protection and control systems," in Int. Conf. Large High Voltage Electr. Syst., CIGRE, 2008.
[99]
R. Lagerström and P. Johnson, "Probabilistic Metamodel Merging," in CEUR Workshop Proceedings, 2008, pp. 25-28.
[100]
P. Gustafsson et al., "Quantifying IT Impacts on Organizational Structure and Business Value with Extended Influence Diagrams," in PRACTICE OF ENTERPRISE MODELING, 2008, pp. 138-152.
[101]
M. Simonsson and P. Johnson, "The IT Organization Modeling and Assessment Tool : Correlating IT Governance Maturity with the Effect of IT," in Proceedings of the 41st Hawaii International Conference on System Sciences, 2008.
[102]
M. Simonsson, P. Johnson and M. Ekstedt, "The IT Organization Modeling and Assessment Tool for IT governance decision support," in ADVANCED INFORMATION SYSTEMS ENGINEERING, PROCEEDINGS, 2008, pp. 258-261.
[103]
M. Simonsson, R. Lagerström and P. Johnson, "The Linear Conditional Probability Matrix Generator for IT governance performance prediction," in MSVVEIS 2008 : MODELLING, SIMULATION, VERIFICATION AND VALIDATION OF ENTERPRISE INFORMATION SYSTEMS, 2008, pp. 170-179.
[104]
P. Närman et al., "Using Enterprise Architecture Models for System Quality Analysis," in EDOC 2008: 12TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING, PROCEEDINGS, 2008, pp. 14-23.
[105]
R. Lagerström and P. Johnson, "Using architectural models to predict the maintainability of enterprise systems," in CSMR 2008 : 12TH EUROPEAN CONFERENCE ON SOFTWARE MAINTENANCE AND REENGINEERING - DEVELOPING EVOLVABLE SYSTEMS, 2008, pp. 248-252.
[106]
P. Johnson et al., "A tool for enterprise architecture analysis," in 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, pp. 142-153.
[107]
P. Närman, P. Johnson and L. Nordström, "Enterprise Architecture : A framework supporting system quality analysis," in 11TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE, PROCEEDINGS, 2007, pp. 130-141.
[108]
R. Lagerström, P. Johnson and P. Närman, "Extended influence diagram generation," in Enterprise Interoperability II : New Challenges and Approaches, 2007, pp. 599-602.
[109]
M. Chenine, L. Nordström and P. Johnson, "Factors in assessing performance of wide area communication networks for distributed control of power systems," in 2007 IEEE LAUSANNE POWERTECH, VOLS 1-5, 2007, pp. 1682-1687.
[110]
P. Johnson, L. Nordström and R. Lagerström, "Formalizing analysis of enterprise architecture," in Enterprise Interoperability : New Challenges and Approaches, 2007, pp. 35-44.
[111]
P. Johnson and M. Ekstedt, "In Search of a Unified Theory of Software Engineering," in 2nd International Conference on Software Engineering Advances - ICSEA 2007, 2007, p. 4299884.
[112]
M. Simonsson, P. Johnson and H. Wijkström, "Model-based it governance maturity assessments with cobit," in Proceedings of the 15th European Conference on Information Systems, ECIS 2007, 2007, pp. 1276-1287.
[113]
P. Johnson et al., "System Quality Analysis with Extended Influence Diagrams," in CSMR 2007 Workshop and Special Session papers, 2007.
[114]
E. Johansson, P. Johnson and T. Cegrell, "Assessment of Enterprise Information Security in Electric Utilities : The Importance of Prioritization," in Proceedings CIGRE Session 2006, 2006.
[115]
P. Johnson et al., "Extended influence diagrams for enterprise architecture analysis," in 10th IEEE International Enterprise Distributed Object Computing Conference, Proceedings, 2006, pp. 3-12.
[116]
E. Johansson and P. Johnson, "Assessment of Enterprise Information Security : An Architecture Theory Diagram Definition," in Proceedings CSER 2005, 2005, pp. 136-146.
[117]
E. Johansson and P. Johnson, "Assessment of Enterprise Information Security : The Importance of Prioritization," in Ninth IEEE International EDOC Enterprise Computing Conference, Proceedings, 2005, pp. 207-218.
[118]
M. Simonsson et al., "Scenario-based evaluation of Enterprise Architecture : A top-down approach for chief information officer decision making," in 7th International Conference on Enterprise Information Systems, ICEIS 2005, 2005, pp. 130-137.
[119]
M. Ekstedt et al., "Consistent enterprise software system architecture for the CIO : a utility-cost based approach," in Proceedings of the 37th Annual Hawaii International Conference on System Sciences, 2004, 2004.
[120]
P. Johnson et al., "Using Enterprise Architecture for CIO Decision-Making : On the Importance of Theory," in Proceedings of the Second Annual Conference on Systems Engineering Research, 2004.
[121]
M. Ekstedt et al., "Management of Enterprise Software System Architectures : Focusing on Information Economy and Model Consistency," in Proceedings of the 3rd Conference on Software Engineering Research and Practice in Sweden, 2003.
[122]
M. Ekstedt et al., "The architectural information view for the power electricity industry," in Proceedings of the CIGRE SC D2´s Colloquium, 2003.
[123]
M. Ekstedt and P. Johnson, "Exploring architectural analysis credibility from a developer perspective," in Proceedings of the Fourth Australian Workshop on Software and Systems Architecture, 2002.

Kapitel i böcker

[124]
M. Simonsson and P. Johnson, "6," in Assessment of IT Governance- A Prioritization of Cobit, Bandamutha, Ravi Kumar Jain Ed., : Icfai University Press, 2006, pp. 69-85.

Icke refereegranskade

Artiklar

[125]
M. Van Sinderen, P. Johnson and G. Doumeingts, "Computer in industry special issue on "interoperability and future internet for next-generation enterprises" editorial and state of the art," Computers in industry (Print), vol. 64, no. 8, pp. 881-886, 2013.
[126]
P. Johnson et al., "Report on the Second SEMAT Workshop on General Theory of Software Engineering : GTSE 2013," Software Engineering Notes : an Informal Newsletter of The Specia, 2013.
[127]
P. Ralph, P. Johnson and H. Jordan, "Report on the first SEMAT workshop on general theory of software engineering (GTSE 2012)," Software Engineering Notes : an Informal Newsletter of The Specia, vol. 38, no. 2, pp. 26-28, 2013.

Konferensbidrag

[128]
M. Ekstedt, P. Johnson and R. Lagerström, "Enterprise Architecture Modeling and Analysis of Quality Attributes : The Multi-Attribute Prediction Language (MAPL)," in Proceedings of the 1st Scandinavian Workshop on the Engineering of Systems-of-Systems (SWESoS 2015), 2015, pp. 10-12.
[129]
K. Pantazis et al., "The Enterprise Architecture Analysis Tool for Decision-Making : a case study," in 4th Nordic EASS 2013, Helsinki, Finland, 2013.
[130]
M. Simonsson and P. Johnson, "Assessement of IT governance : A prioritization of cobit," in Proceedings of the Conference on Systems Engineering Research, 2006.
[131]
E. Johansson and P. Johnson, "Assessment of Enterprise Information Security : Estimating the Credibility of the Results," in Proceedings of the Symposium on Requirements Engineering for Information Security (SREIS 05) at the 13th IEEE Requirements Engineering Conference (RE 05), 2005.
[132]
J. Andersson and P. Johnson, "Architectural integration styles for large scale enterprise software systems," in Proceedings of the 5th IEEE International Conference on Enterprise Distributed Object Computing, 2001.
[133]
J. Andersson and P. Johnson, "Extending attribute based architectural analysis to enterprise software systems," in Proceedings of the 3rd Australasian Workshop on Software and System Architectures, 2000.

Böcker

[134]
P. Johnson et al., IT Managment with Enterprise Architecture. Mathias Ekstedt, 2013.
[136]
P. Johnson and M. Ekstedt, The grand unified theory of software engineering. Stockholm : Industriella informations- och styrsystem, KTH Royal Institute of Technology, 2006.
[137]
E. Sandström et al., Enterprise Application Integration in the electric Power Industry. Electrical Engineering/Electronics, Computer, Communications and Information Technology Association, 2004.

Kapitel i böcker

[138]
P. Johnson, M. Ekstedt and J. Ullberg, "Assessing Goal Fulfillment," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 253-269.
[139]
P. Johnson, M. Ekstedt and E. Johansson, "Collecting evidence," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 213-252.
[140]
P. Johnson et al., "Enterprise Architecture at ACME Energy," in Enterprice Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 293-306.
[141]
P. Johnson, M. Ekstedt and R. Lagerström, "Enterprise Information System Management," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 54-71.
[142]
P. Johnson et al., "Introduction," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 11--36.
[143]
P. Johnson et al., "Organizing for Enterprise Architcture," in Enterprise Architcture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 253-268.
[144]
P. Johnson et al., "Organizing for enterprise architecture," in Enterprise Architcture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 270-291.
[145]
P. Johnson et al., "Selecting Enterprise Architecture Models," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 213-239.
[146]
P. Johnson et al., "Setting the Business Goals," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 73-91.
[147]
P. Johnson et al., "Setting the IT Organization Goals," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 153-212.
[148]
M. Ekstedt et al., "Setting the Information Systems Goals," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 92-152.
[149]
P. Johnson, M. Ekstedt and R. Lagerström, "The Enterprise and Its Information Systems," in Enterprise Architecture : Models and Analyses for Information Systems Decision Making, : Studentlitteratur, 2007, pp. 37-52.

Avhandlingar

[150]
P. Johnson, "Enterprise Software System Integration : An Architectural Perspective," Doctoral thesis Stockholm : KTH, Trita-ICS, 0202, 2002.

Rapporter

[151]
M. Simonsson and P. Johnson, "Defining IT governance - A consolidation of literature," KTH Royal Institute of Technology, Trita-EE, 2005:001, 2005.
[152]
P. Johnson and M. Ekstedt, "Predicting the effort of program language comprehension : The case of HLL vs. Assembly," KTH Royal Institute of Technology, 2005.
Senaste synkning med DiVA:
2024-05-05 00:43:14