his.sePublications
Change search
Link to record
Permanent link

Direct link
BETA
Jeusfeld, Manfred A.ORCID iD iconorcid.org/0000-0002-9421-8566
Alternative names
Biography [eng]

anfred Jeusfeld studied computer science (minor Operations Research) from 1980 to 1986 at the University of Technology Aachen (RWTH), Germany.  He worked on development support for database applications and on foundations of deductive & object-oriented databases. In 1992 he received his Doctoral degree in Natural Sciences from the University of Passau.


Dr. Jeusfeld has published more than 20 journal articles (Information Systems, DSS, JIIS, SoSYM etc.) and numerous conference articles. He is area editor for the Requirements Engineering Journal. He was co-PC-chair of KRDB-94 to KRDB-97, DMDW-99, DMDW-2000, DMDW-2001, DMDW-2003, ER-2011, and PoEM-2016. He is or has been reviewer for international journals like ACM TOIS, REJ, SoSYM, and conferences including ICIS, ECIS, VLDB, CAiSE, ER and others. He is also the founder of CEUR Workshop Proceedings, a publication service for open-access proceedings of scientific workshops and conferences.

Publications (10 of 26) Show all publications
Jiang, Y., Jeusfeld, M. A., Atif, Y., Ding, J., Brax, C. & Nero, E. (2018). A Language and Repository for Cyber Security of Smart Grids. In: Selmin Nurcan, Pontus Johnson (Ed.), 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018): . Paper presented at 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC), Stockholm, Sweden, October 16-19, 2018 (pp. 164-170). Los Alamitos, CA: IEEE
Open this publication in new window or tab >>A Language and Repository for Cyber Security of Smart Grids
Show others...
2018 (English)In: 2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC 2018) / [ed] Selmin Nurcan, Pontus Johnson, Los Alamitos, CA: IEEE, 2018, p. 164-170Conference paper, Published paper (Refereed)
Abstract [en]

Power grids form the central critical infrastructure in all developed economies. Disruptions of power supply can cause major effects on the economy and the livelihood of citizens. At the same time, power grids are being targeted by sophisticated cyber attacks. To counter these threats, we propose a domain-specific language and a repository to represent power grids and related IT components that control the power grid. We apply our tool to a standard example used in the literature to assess its expressiveness.

Place, publisher, year, edition, pages
Los Alamitos, CA: IEEE, 2018
Series
Proceedings (IEEE International Enterprise Distributed Object Computing Conference), ISSN 2325-6354, E-ISSN 2325-6362
Keywords
cyber security, enterprise architecture, domain-specific language, taxonomy
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-16403 (URN)10.1109/EDOC.2018.00029 (DOI)2-s2.0-85059076918 (Scopus ID)978-1-5386-4139-2 (ISBN)
Conference
2018 IEEE 22nd International Enterprise Distributed Object Computing Conference (EDOC), Stockholm, Sweden, October 16-19, 2018
Projects
EU ISF Project A431.678/2016 ELVIRA
Note

Funded by EU Internal Security Funds

Available from: 2018-11-16 Created: 2018-11-16 Last updated: 2019-02-08Bibliographically approved
Jiang, Y., Ding, J., Atif, Y., Jeusfeld, M., Andler, S., Lindström, B., . . . Haglund, D. (2018). Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project. Skövde: University of Skövde
Open this publication in new window or tab >>Complex Dependencies Analysis: Technical Description of Complex Dependencies in Critical Infrastructures, i.e. Smart Grids. Work Package 2.1 of the ELVIRA Project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work-package 2.1 entitled “Complex Dependencies Analysis”. In this technical report, we review attempts in recent researches where connections are regarded as influencing factors to  IT systems monitoring critical infrastructure, based on which potential dependencies and resulting disturbances are identified and categorized. Each kind of dependence has been discussed based on our own entity based model. Among those dependencies, logical and functional connections have been analysed with more details on modelling and simulation techniques.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 22
Series
IIT Technical Reports ; HS-IIT-TR-18-003
Keywords
Dependencies, Interdependencies, Modelling and Simulation, Influence Factors
National Category
Computer and Information Sciences Embedded Systems
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15114 (URN)
Projects
ELVIRA
Note

HS-IIT-TR-18-003 This is a technical report related to the ELVIRA project www.his.se/elvira

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2019-03-05Bibliographically approved
Atif, Y., Jiang, Y., Jeusfeld, M. A., Ding, J., Lindström, B., Andler, S. F., . . . Lindström, B. (2018). Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Cyber-threat analysis for Cyber-Physical Systems: Technical report for Package 4, Activity 3 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

Smart grid employs ICT infrastructure and network connectivity to optimize efficiency and deliver new functionalities. This evolu- tion is associated with an increased risk for cybersecurity threats that may hamper smart grid operations. Power utility providers need tools for assessing risk of prevailing cyberthreats over ICT infrastructures. The need for frameworks to guide the develop- ment of these tools is essential to define and reveal vulnerability analysis indicators. We propose a data-driven approach for design- ing testbeds to evaluate the vulnerability of cyberphysical systems against cyberthreats. The proposed framework uses data reported from multiple components of cyberphysical system architecture layers, including physical, control, and cyber layers. At the phys- ical layer, we consider component inventory and related physi- cal flows. At the control level, we consider control data, such as SCADA data flows in industrial and critical infrastructure control systems. Finally, at the cyber layer level, we consider existing secu- rity and monitoring data from cyber-incident event management tools, which are increasingly embedded into the control fabrics of cyberphysical systems.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 18
Series
IIT Technical Reports ; HS-IIT-TR-18-004
Keywords
vulnerability analysis, cyber-threats, cyberphysical systems, clustering, multiagent systems
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-16092 (URN)
Projects
This research has been supported in part by the EU ISF Project A431.678/2016 ELVIRA (Threat modeling and resilience of critical infrastructures), coordinated by Polismyndigheten/Sweden
Note

I publikationen: HS-IIT-18-004

Available from: 2018-08-29 Created: 2018-08-29 Last updated: 2019-02-18Bibliographically approved
Neumayr, B., Schuetz, C. G., Jeusfeld, M. A. & Schrefl, M. (2018). Dual deep modeling: multi-level modeling with dual potencies and its formalization in F-Logic. Journal of Software and Systems Modeling (online), 17(1), 233-268
Open this publication in new window or tab >>Dual deep modeling: multi-level modeling with dual potencies and its formalization in F-Logic
2018 (English)In: Journal of Software and Systems Modeling (online), ISSN 1619-1366, E-ISSN 1619-1374, Vol. 17, no 1, p. 233-268Article in journal (Refereed) Published
Abstract [en]

An enterprise database contains a global, integrated, and consistent representation of a company’s data. Multi-level modeling facilitates the definition and maintenance of such an integrated conceptual data model in a dynamic environment of changing data requirements of diverse applications. Multi-level models transcend the traditional separation of class and object with clabjects as the central modeling primitive, which allows for a more flexible and natural representation of many real-world use cases. In deep instantiation, the number of instantiation levels of a clabject or property is indicated by a single potency. Dual deep modeling (DDM) differentiates between source potency and target potency of a property or association and supports the flexible instantiation and refinement of the property by statements connecting clabjects at different modeling levels. DDM comes with multiple generalization of clabjects, subsetting/specialization of properties, and multi-level cardinality constraints. Examples are presented using a UML-style notation for DDM together with UML class and object diagrams for the representation of two-level user views derived from the multi-level model. Syntax and semantics of DDM are formalized and implemented in F-Logic, supporting the modeler with integrity checks and rich query facilities.

Place, publisher, year, edition, pages
Berlin, Germany: Springer Berlin/Heidelberg, 2018
Keywords
data modeling, multi-level modeling, f-logic
National Category
Information Systems
Research subject
Natural sciences; Technology; Information Systems
Identifiers
urn:nbn:se:his:diva-12138 (URN)10.1007/s10270-016-0519-z (DOI)000424654100013 ()2-s2.0-84964054274 (Scopus ID)
Note

The paper was published online on 2016-04-07 by Springer. The article is open-access with license "Creative Commons Attribution 4.0 International License"

Available from: 2016-04-14 Created: 2016-04-14 Last updated: 2019-03-06Bibliographically approved
Horkoff, J., Jeusfeld, M. A., Ralyté, J. & Karagiannis, D. (2018). Enterprise Modeling for Business Agility. Business & Information Systems Engineering, 60(1), 1-2
Open this publication in new window or tab >>Enterprise Modeling for Business Agility
2018 (English)In: Business & Information Systems Engineering, ISSN 1867-0202, Vol. 60, no 1, p. 1-2Article in journal, Editorial material (Refereed) Published
National Category
Computer and Information Sciences Information Systems
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-14984 (URN)10.1007/s12599-017-0515-z (DOI)000423605600001 ()2-s2.0-85041375726 (Scopus ID)
Note

Editorial; Correspondence Address: Horkoff, J.; University of Gothenburg, Kunskapsgatan 3, Sweden; email: jenho@chalmers.se

Available from: 2018-03-28 Created: 2018-03-28 Last updated: 2018-03-28Bibliographically approved
Horkoff, J., Jeusfeld, M. A. & Ralyté, J. (2018). Interview with Anne Persson on the Practice of Enterprise Modeling. Business & Information Systems Engineering, 60(1), 87-89
Open this publication in new window or tab >>Interview with Anne Persson on the Practice of Enterprise Modeling
2018 (English)In: Business & Information Systems Engineering, ISSN 1867-0202, Vol. 60, no 1, p. 87-89Article in journal, Editorial material (Other (popular science, discussion, etc.)) Published
Abstract [en]

We conducted the interview iteratively via email correspondence over the summer of 2017. Anne had been the general chair of PoEM 2017 in Skövde 2016 and, given her history with PoEM, we thus were very keen to learn about her views on enterprise modeling.

Place, publisher, year, edition, pages
Springer Berlin/Heidelberg, 2018
Keywords
enterprise modeling, enterprise architecture
National Category
Computer and Information Sciences
Research subject
Information Systems
Identifiers
urn:nbn:se:his:diva-14514 (URN)10.1007/s12599-017-0508-y (DOI)000423605600008 ()2-s2.0-85041319364 (Scopus ID)
Available from: 2017-11-28 Created: 2017-11-28 Last updated: 2018-09-11Bibliographically approved
Atif, Y., Jiang, Y., Lindström, B., Ding, J., Jeusfeld, M., Andler, S., . . . Haglund, D. (2018). Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project. Skövde: University of Skövde
Open this publication in new window or tab >>Multi-agent Systems for Power Grid Monitoring: Technical report for Package 4.1 of ELVIRA project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work- package 4.1 entitled “Multi-agent systems for power Grid monitoring”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity. This report outlines intelligent approaches that continuously analyze data flows generated by Supervisory Control And Data Acquisition (SCADA) systems, which monitor contemporary power grid infrastructures. However, cybersecurity threats and security mechanisms cannot be analyzed and tested on actual systems, and thus testbed simulators are necessary to assess vulnerabilities and evaluate the infrastructure resilience against cyberattacks. This report suggests an agent-based model to simulate SCADA- like cyber-components behaviour when facing cyber-infection in order to experiment and test intelligent mitigation mechanisms. 

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 16
Series
IIT Technical Reports ; HS-IIT-TR-18-002
Keywords
Smart grid security, Agent model, Multi-agent system
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-15111 (URN)
Projects
Elvira project funded by EU Internal Security Fund (ISF) A431.678-2016
Note

HS-IIT-TR-18-002

Available from: 2018-05-02 Created: 2018-05-02 Last updated: 2019-03-05Bibliographically approved
Morshedzadeh, I., Oscarsson, J., Ng, A. H. C., Jeusfeld, M. A. & Sillanpaa, J. (2018). Product lifecycle management with provenance management and virtual models: an industrial use-case study. Paper presented at 51st CIRP Conference on Manufacturing Systems (CIRP CMS 2018), 16-18 May 2018, Stockholm, Sweden. Procedia CIRP, 72, 1190-1195
Open this publication in new window or tab >>Product lifecycle management with provenance management and virtual models: an industrial use-case study
Show others...
2018 (English)In: Procedia CIRP, ISSN 2212-8271, E-ISSN 2212-8271, Vol. 72, p. 6p. 1190-1195Article in journal (Refereed) Published
Abstract [en]

Saving and managing virtual models’ provenance information (models’ history) can increase the level of reusability of those models. This paper describes a provenance management system (PMS) that has been developed based on an industrial case study.

The product lifecycle management (PLM) system, as a main data management system, is responsible for receiving virtual models and their related data from Computer-Aided technologies (CAx) and providing this information for the PMS. In this paper, the management of discrete event simulation data with the PLM system will be demonstrated as the first link of provenance data management chain (CAx-PLM-PMS).

Place, publisher, year, edition, pages
Elsevier, 2018. p. 6
Keywords
Discrete event simulation, Provenance, Product lifecycle
National Category
Other Engineering and Technologies not elsewhere specified
Research subject
Production and Automation Engineering; Information Systems
Identifiers
urn:nbn:se:his:diva-15920 (URN)10.1016/j.procir.2018.03.157 (DOI)2-s2.0-85049581305 (Scopus ID)
Conference
51st CIRP Conference on Manufacturing Systems (CIRP CMS 2018), 16-18 May 2018, Stockholm, Sweden
Available from: 2018-07-03 Created: 2018-07-03 Last updated: 2018-10-31Bibliographically approved
Jeusfeld, M. A., Jiang, Y., Ding, J., Atif, Y., Haglund, D. & Brax, C. (2018). Taxonomy of Events and Components in the Power Grid: Technical description for work packages 3.1 and 3.2 of the ELVIRA Project. Skövde: University of Skövde
Open this publication in new window or tab >>Taxonomy of Events and Components in the Power Grid: Technical description for work packages 3.1 and 3.2 of the ELVIRA Project
Show others...
2018 (English)Report (Other academic)
Abstract [en]

This document reports a technical description of ELVIRA project results obtained as part of Work-package 3.1&3.2 entitled “Taxonomy of Critical Infrastructure (Taxonomy of events + Taxonomy of CI component and relationship)”. ELVIRA project is a collaboration between researchers in School of IT at University of Skövde and Combitech Technical Consulting Company in Sweden, with the aim to design, develop and test a testbed simulator for critical infrastructures cybersecurity.

Place, publisher, year, edition, pages
Skövde: University of Skövde, 2018. p. 25
Series
IIT Technical Reports ; HS-IIT-TR-18-001
Keywords
taxonomy, cyber-security, power grid, events, Nordic32
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems
Identifiers
urn:nbn:se:his:diva-14699 (URN)
Projects
ELVIRA
Note

HS-IIT-TR-18-001 This is a technical report related to the ELVIRA project www.his.se/elvira

Available from: 2018-01-31 Created: 2018-01-31 Last updated: 2019-03-05Bibliographically approved
Ding, J., Atif, Y., Andler, S. F., Lindström, B. & Jeusfeld, M. (2017). CPS-based Threat Modeling for Critical Infrastructure Protection. Performance Evaluation Review, 45(2), 129-132
Open this publication in new window or tab >>CPS-based Threat Modeling for Critical Infrastructure Protection
Show others...
2017 (English)In: Performance Evaluation Review, ISSN 0163-5999, E-ISSN 1557-9484, Vol. 45, no 2, p. 129-132Article in journal (Refereed) Published
Abstract [en]

Cyber-Physical Systems (CPSs) are augmenting traditionalCritical Infrastructures (CIs) with data-rich operations. Thisintegration creates complex interdependencies that exposeCIs and their components to new threats. A systematicapproach to threat modeling is necessary to assess CIs’ vulnerabilityto cyber, physical, or social attacks. We suggest anew threat modeling approach to systematically synthesizeknowledge about the safety management of complex CIs andsituational awareness that helps understanding the nature ofa threat and its potential cascading-effects implications.

Place, publisher, year, edition, pages
ACM Publications, 2017
Keywords
CPS, threat modeling, Critical Infrastructure Protection
National Category
Computer and Information Sciences
Research subject
Distributed Real-Time Systems; Information Systems; INF303 Information Security
Identifiers
urn:nbn:se:his:diva-14245 (URN)10.1145/3152042.3152080 (DOI)2-s2.0-85041405430 (Scopus ID)
Projects
EU ISF project: Elvira
Funder
EU, European Research Council
Available from: 2017-10-23 Created: 2017-10-23 Last updated: 2018-06-01Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0002-9421-8566

Search in DiVA

Show all publications