institution of global catalogue which collects all
objects but only with some subset of attributes.
Multiplication of data about clients and servers is
achieved by partitioning and replicating objects into
other cells. Replication topology and schedule
should be designed carefully to optimize network
traffic.
Cell architecture also supports efficient network
traffic management, based on data replication as
well as multiplication and distribution of functions.
Network cell manages and monitors traffic,
sends massages to computers and group of
computers, measures and allocates bandwidth, etc.
System cell replicates system and server data, and
distributes control and administrative jobs. Business
cell redirects network traffic, based on information
in registration databases, internally or towards other
cells.
While majority of connection and traffic
management functions are performed by network
and system cells, fundamental business cell purpose
is to provide support to information system By
executing many of monitoring, security and
administrative functions, business cell simplifies
server and client operation and makes their
connection efficient.
7 CONCLUSIONS
Key goals in assuring information system quality are
continual improvement of IT performance, to deliver
optimum business value and ensure regulatory
compliance. Multilevel cell distributed computer
architecture is capable of supporting these goals with
functions built into information system as its integral
part. It is not technology or platform dependent. It
could be implemented in existing computing
environment with minimal impact on physical
configuration of systems, as a set of middleware.
Improvements in information system quality
should be expected due to:
- Unified identity management;
- High security level;
- Implementation of “application as service”
paradigm;
- Platform independence; and
- Efficient system management.
It is possible, and recommendable, to use of-the-
shelf software products for implementation of
certain functions.
ACKNOWLEDGEMENTS
"Publication of this paper was supported by grant #
036-0361983-3137 by the Croatian Ministry of
science, education and sports."
REFERENCES
Al-Hakim, L., 2007, Information Quality Management:
Theory and Applications, Idea Group Publishing,
London
Bloem, J., Van Doorn, M., Mittal, P., 2006., Making IT
governance work in a Sarbanes-Oxley world, John
Wiley & Sons, Hoboken, New Jersey
Khadraoui, D., Herrmann, F., 2007, Advances in
Enterprise Information Technology Security,
Information Science Reference, New York
Lerner, M. Vanecek, G., Vidovic, N., Vrsalovic, D., 2002,
Middleware networks: Concept, Design and
Deployment of Internet Infrastructure, Kluwer
Academic Publishers, New York
ITGI/ISACA COBIT, 2007,. - Control Objectives for
Information and Related Technologies, ITGI/ISACA
(IT Governance Institute / Information Systems Audit
and Control Association)
ITGI/ISACA ValIT, 2007, - Enterprise Value:
Governance of IT Investments, The Val IT Framework,
ITGI/ISACA (IT Governance Institute / Information
Systems Audit and Control Association)
ISO 9001:2000, Quality management systems --
Requirements (ISO 9001:2000; EN ISO 9001:2000)
ISO/IEC 27001:2005, Information technology -- Security
techniques -- Information security management
systems -- Requirements (ISO/IEC 27001:2005)
ISO/IEC 17799:2005, Information technology -- Security
techniques -- Code of practice for information security
management (ISO/IEC 17799:2005)
ISO/IEC 20000-1:2005, Information technology -- Service
management -- Part 1: Specification
ISO/IEC 20000-2:2005, Information technology -- Service
management -- Part 2: Code of practice
ISO/TR 13569:2005 - Financial services -- Information
security guidelines
ICSOFT 2008 - International Conference on Software and Data Technologies
360