메뉴 건너뛰기




Volumn 52, Issue 9, 2010, Pages 945-971

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach

Author keywords

BPMN; MDA; Secure business processes; UML

Indexed keywords

ABSTRACT MODELS; ABSTRACTION LEVEL; ACTIVITY DIAGRAM; ALTERNATIVE APPROACH; BUSINESS PROCESS; BUSINESS PROCESS MODEL; BUSINESS PROCESS MODELLING; CLASS DIAGRAMS; ELECTRICAL ENERGY CONSUMPTION; FORMAL TRANSFORMATION; INFORMATION SYSTEMS DEVELOPMENT; ITERATIVE PROCESS; MDA APPROACH; META MODEL; MODEL DRIVEN ARCHITECTURES; MODEL-DRIVEN DEVELOPMENT; REAL ENVIRONMENTS; RESEARCH METHODS; SECURITY REQUIREMENTS; SEMI-AUTOMATICS; SET OF RULES; SOFTWARE DEVELOPMENT PROCESS; TRANSFORMATION RULES; UNIFIED MODELLING LANGUAGE; USE CASE DIAGRAM; USE CASE MODEL;

EID: 77953671395     PISSN: 09505849     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.infsof.2010.03.015     Document Type: Article
Times cited : (86)

References (73)
  • 9
    • 0030509189 scopus 로고    scopus 로고
    • A critical perspective on action research as a method for information systems research
    • Baskerville R., and Wood-Harper T. A critical perspective on action research as a method for information systems research. Journal of Information Technology 11 (1996) 235-246
    • (1996) Journal of Information Technology , vol.11 , pp. 235-246
    • Baskerville, R.1    Wood-Harper, T.2
  • 15
    • 77953665597 scopus 로고    scopus 로고
    • K.-K.R. Choo, R.G. Smith, R. McCusker, and C.h.w.a.g.a.p.r., Australian Institute of Criminology, future directions in technology-enabled crime: 2007-09, Research and Public Policy Series Edited by Australian Institute of Criminology, 78, 2007.
    • K.-K.R. Choo, R.G. Smith, R. McCusker, and C.h.w.a.g.a.p.r., Australian Institute of Criminology, future directions in technology-enabled crime: 2007-09, Research and Public Policy Series Edited by Australian Institute of Criminology, vol. 78, 2007.
  • 21
    • 2942753973 scopus 로고    scopus 로고
    • Specifying reusable security requirements
    • Firesmith D. Specifying reusable security requirements. Journal of Object Technology 3 1 (2004) 61-75
    • (2004) Journal of Object Technology , vol.3 , Issue.1 , pp. 61-75
    • Firesmith, D.1
  • 22
    • 0035300743 scopus 로고    scopus 로고
    • A taxonomy of business process modelling and information systems modelling techniques
    • Giaglis G.M. A taxonomy of business process modelling and information systems modelling techniques. International Journal of Flexible Manufacturing Systems 13 2 (2001) 209-228
    • (2001) International Journal of Flexible Manufacturing Systems , vol.13 , Issue.2 , pp. 209-228
    • Giaglis, G.M.1
  • 26
    • 33747166768 scopus 로고    scopus 로고
    • The OMG's model driven architecture and BPM
    • Harmon P. The OMG's model driven architecture and BPM. Business Process Trends 2 5 (2004)
    • (2004) Business Process Trends , vol.2 , Issue.5
    • Harmon, P.1
  • 28
    • 33749367621 scopus 로고    scopus 로고
    • Security requirement analysis of business processes
    • Herrmann P., and Herrmann G. Security requirement analysis of business processes. Electronic Commerce Research 6 3-4 (2006) 305-335
    • (2006) Electronic Commerce Research , vol.6 , Issue.3-4 , pp. 305-335
    • Herrmann, P.1    Herrmann, G.2
  • 31
    • 33749254250 scopus 로고    scopus 로고
    • An approach to modelling process variety and best practice
    • King S.F., Johnson O.A., and BP V. An approach to modelling process variety and best practice. Information and Software Technology 48 11 (2006) 1104-1114
    • (2006) Information and Software Technology , vol.48 , Issue.11 , pp. 1104-1114
    • King, S.F.1    Johnson, O.A.2    BP, V.3
  • 35
    • 33846879802 scopus 로고    scopus 로고
    • UML model transformation and its application to MDA technology
    • Kuznetsov M.B. UML model transformation and its application to MDA technology. Programming and Computer Software 33 1 (2007) 44-53
    • (2007) Programming and Computer Software , vol.33 , Issue.1 , pp. 44-53
    • Kuznetsov, M.B.1
  • 38
    • 77953678388 scopus 로고    scopus 로고
    • O. Macek, K. Richta, The BPM to UML activity diagram transformation using XSLT, in: Databases, Texts, Specifications, and Objects (DATESO 2009), 2009.
    • O. Macek, K. Richta, The BPM to UML activity diagram transformation using XSLT, in: Databases, Texts, Specifications, and Objects (DATESO 2009), 2009.
  • 44
    • 8844267219 scopus 로고    scopus 로고
    • Object Management Group, Version 1.0.1, 2003
    • Object Management Group, MDA Guide Version 1.0.1, 2003.
    • MDA Guide
  • 45
    • 77953663209 scopus 로고    scopus 로고
    • Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, 2005, p. 204.
    • Object Management Group, Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification, OMG Adopted Specification ptc/05-11-01, 2005, p. 204.
  • 46
    • 77953677622 scopus 로고    scopus 로고
    • Object Management Group, Unified Modeling Language: Superstructure, Version 2.0, formal/05-07-04, 2005
    • Object Management Group, Unified Modeling Language: Superstructure, Version 2.0, formal/05-07-04, 2005.
  • 47
    • 77953658234 scopus 로고    scopus 로고
    • Object Management Group, Unified Modeling Language: Superstructure Version 2.1.1 formal/2007-02-05, 2007
    • Object Management Group, Unified Modeling Language: Superstructure Version 2.1.1 (formal/2007-02-05), 2007.
  • 49
    • 77953654034 scopus 로고    scopus 로고
    • OMG, OCL 2.0 Specification, Version 2.0., RN, 2005.
    • OMG, OCL 2.0 Specification, Version 2.0., RN, 2005.
  • 50
    • 77953664618 scopus 로고    scopus 로고
    • OMG, Unified Modeling Language: Superstructure, Versión 2.0, 2005
    • OMG, Unified Modeling Language: Superstructure, Versión 2.0, 2005.
  • 51
    • 77953667916 scopus 로고    scopus 로고
    • G. Rader, C. Vo, Achieving consistency between business process models and operational guides, in: Rational Software. Enterprise Business Process Documentation (White Paper), 2008.
    • G. Rader, C. Vo, Achieving consistency between business process models and operational guides, in: Rational Software. Enterprise Business Process Documentation (White Paper), 2008.
  • 61
    • 61849169018 scopus 로고    scopus 로고
    • Guidelines for conducting and reporting case study research in software engineering
    • Runeson P., and Höst M. Guidelines for conducting and reporting case study research in software engineering. Empirical Software Engineering 14 2 (2009) 131-161
    • (2009) Empirical Software Engineering , vol.14 , Issue.2 , pp. 131-161
    • Runeson, P.1    Höst, M.2
  • 62
    • 33645121958 scopus 로고    scopus 로고
    • A guideline to mapping business processes to UML class diagrams
    • Rungworawut W., and Senivongse T. A guideline to mapping business processes to UML class diagrams. WSEAS Transactions on Computers 4 11 (2005) 1526-1533
    • (2005) WSEAS Transactions on Computers , vol.4 , Issue.11 , pp. 1526-1533
    • Rungworawut, W.1    Senivongse, T.2
  • 66
    • 38049110583 scopus 로고    scopus 로고
    • A description of business process modeling as a tool for definition of requirements specification
    • Prague, Czech Republic
    • S. Štolfa, I. Vondrák, A description of business process modeling as a tool for definition of requirements specification, in: Systems Integration 12th Annual International Conference, Prague, Czech Republic, 2004.
    • (2004) Systems Integration 12th Annual International Conference
    • Štolfa, S.1    Vondrák, I.2
  • 67
    • 35248832632 scopus 로고    scopus 로고
    • Towards a business process-driven framework for security engineering with the UML
    • Colin Boyd, Wenbo Mao Eds, ISC, Bristol, UK
    • J.L. Vivas, J.A. Montenegro, J. Lopez, Towards a business process-driven framework for security engineering with the UML, in: Colin Boyd, Wenbo Mao (Eds.), Information Security: 6th International Conference, ISC, Bristol, UK, 2003.
    • (2003) Information Security: 6th International Conference
    • Vivas, J.L.1    Montenegro, J.A.2    Lopez, J.3
  • 70
    • 36049035822 scopus 로고    scopus 로고
    • Process Modeling Notations and Workflow Patterns, 2004
    • March
    • S.A. White, Process Modeling Notations and Workflow Patterns, 2004, BPTrends, March 2004.
    • (2004) BPTrends
    • White, S.A.1
  • 71
    • 77953657747 scopus 로고    scopus 로고
    • C. Wolter, A. Schaad, modeling of task-based authorization constraints in BPMN, in: 5th International Conference on Business Process Management, 2007.
    • C. Wolter, A. Schaad, modeling of task-based authorization constraints in BPMN, in: 5th International Conference on Business Process Management, 2007.
  • 72
    • 84859940168 scopus 로고    scopus 로고
    • Deriving XACML policies from business process models
    • C. Wolter, A. Schaad, C. Meinel, Deriving XACML policies from business process models, in: WISE Workshops, 2007.
    • (2007) WISE Workshops
    • Wolter, C.1    Schaad, A.2    Meinel, C.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.