@incollection{, FF66D5E239C92574BE523CE3A7CE3541 , author={{A.B.Ramadan} and {M.Hefnawi}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}19316 } @book{b0, , title={{Developing an enterprise architecture}} , author={{ PHarmon }} , year={2002} , note={Business Process Trends. Available at} } @incollection{b1, , title={{Applying security to an enterprise using the Zachman Framework}} , author={{ LLDelooze }} , journal={{SANSPublications. Available}} , year={2001} } @incollection{b2, , title={{An approach to a new network security architecture for research environments}} , author={{ MRMohajerani } and { AMoeini }} , booktitle={{Proc. Of the 21st International SAFECOMP Conference}} Of the 21st International SAFECOMP ConferenceItaly , year={2002} } @incollection{b3, , title={{Use of the Zachman architecture for security engineering}} , author={{ RHenning } and { HCorporation }} , booktitle={{Proc. of the 19 th National Information Systems Security Conference}} of the 19 th National Information Systems Security ConferenceBaltimore, MD , year={1996} } @incollection{b4, , title={{A different kind of life cycle: the Zachman Framework}} , author={{ DCHey }} , journal={{Essential Strategies Inc. Available}} } @incollection{b5, , title={{Designing an research firewall: policy, practice and experience with SURF}} , author={{ MGreenwald }} , booktitle={{IEEE Proceedings of 1966 Symposium of Network and Distributed Systems Security}} , year={1996} } @book{b6, , title={{Designing security architecture solutions}} , author={{ JRamachandran }} , year={2002} , publisher={John Wiley and Sons} , address={Hoboken} } @incollection{b7, , title={{Information assurance for enterprise engineering}} , author={{ JHeaney }} , booktitle={{Proc. of the 9th Conference on Pattern Language of Programs}} of the 9th Conference on Pattern Language of ProgramsMonticello, Illinois , year={2002} } @incollection{b8, , title={{Three-zone model to depict enterprise security & technology architectures}} , author={{ MRosenthal } and { PCoopers }} , booktitle={{28th Annual Computer Security Conference}} Washington D.C , year={2001} }