Goettelmann, E., et al., 2013; Poolsappasit, N., et al.,
2012).
In (Rocchetta, R., et al., 2015), and in the system
engineering field, the authors discuss the problem of
cost-risk optimization in the context of risk
assessment of distributed energy systems consider-
ing extreme weather conditions. In this context, a
framework for probabilistic risk assessment and a
framework for cost-risk optimization using the
evolutionary algorithm NSGAII (Deb, K., et al.,
2002) were developed.
In the field of industry, many mathematical and
heuristic models have been developed with the aim
of optimizing the supply chain using the Just In
Time (JIT) approach but without taking into
consideration the potential risks that may occur
during its implementation and cause significant
disruption to all members of the supply chain.
In (El Dabee, F., et al., 2014), the genetic algorithm
is developed to find the optimal solution of the
mathematical model proposed in (Medical
laboratories AT, 2012), thus reducing the cost-risk
of the final product in the JIT production system.
In (Goettelmann, E., et al., 2013) it is to optimize
the quality of service (and its cost) to the security
risk, helping to choose the right cloud service
broker. They used a heuristic approach, based on the
Tabu-search algorithm (Glover, F., 1997). Here the
approach includes a pre-partitioning of the data.
In (Poolsappasit, N., et al., 2012), inspired by
"attack-tree" (Dewri, R., 2007), the authors propose
a version based on Bayesian networks to model the
probabilities of risk (these are used to reduce
optimizing the risk-cost in a system whose resources
are limited). Probabilities come from different
sources. In addition, they propose the use of a
genetic algorithm in order to propose different
solutions for mono optimizations (e.g., reduce only
the cost) and multi-objectives.
In (Špačková, O., and Straub, D., 2015), the cost-
benefit analysis method was studied in the
framework of cost-risk optimization under budgetary
constraints. This study has been developed within
the framework of natural hazard management, but it
can be applied to various risk management domains.
This method was used to identify risk mitigation
strategies by ensuring equivalence between control
costs and the reduced value of risks.
In the MDE community a very few work
addressed the combination of metamodels and
optimization. For instance, in (Dougherty, B., et al.,
2012), they use optimisation cloud computing
consumption and resources using model-driven
configurations – including constraints – and relying
on a constraint solver. Early works, focusing on
code generation addressed optimization of the
generated code but not use optimization and models
in a decision process.
3 MULTI-MODELS:
ENTERPRISE RISK BASED
REGULATION
Risk assessment is one of the mandatory tasks a
service provider (i.e., a regulated enterprise) has to
do in order to show its compliance with given
regulations. The regulation institutes are responsible
of the stability are to assess the compliance reports
of the enterprises. Regulation institutes are asking
regulated enterprises to establish of a homogeneous
risk assessment following regulation rules.
Then, as the risk assessment covers all the
enterprise assets that are of different nature: people,
IT infrastructure, products, services, data, etc. We
use Enterprise Architecture Model (Lankhorst, Marc
M., 2004; M. Op’t Land, et al., 2008) (EAM) for
modelling the enterprise assets. EAM provides the
necessary abstraction to avoid setting too much
modelling element whilst keeping the essence of
enterprise business, technical assets and processes.
In addition, risk assessment is provided by different
information source concerning threats (e.g., threat
database, standard threats in a given domain,
vulnerability, etc.), controls (i.e, threat mitigation),
actual incidents, etc. The regulation institutes are
also dealing with models and they need an holistic
view on the level of compliance aggregating and
consequently comparing the models coming from
the regulated enterprise”.
In this context, we need to support the various
models used in enterprise risk-assessment and relate
them together (e.g., vulnerability represents a
relation between a threat an EAM element).
Technically, we based our approach on a model
environment we developed (Sottet, J. S. and Biri, N.
(2016). This modelling environment allows for more
flexibility when dealing with uncertainty in
modelling notably when linking modelling elements.
3.1 Enterprise Architecture Model
EAM (Lankhorst, Marc M., 2004; M. Op’t Land, et
al., 2008) have been developed to support
enterprises governance tasks. They help mastering
the complexity of organisation, changes in
organisations, facing crisis, etc. They are used in
Cost-Risk Optimization Applied in the Context of Regulation
537