Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases

54Citations
Citations of this article
53Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The software community is currently paying attention to model transformation. The MDA approach is particularly orientated towards solving the problems of time, cost and quality associated with software creation. Enterprises are, moreover, aware of the importance that business processes and security have in relation to their competitive position and performance. In our previous work, we have proposed a BPMN extension which can be used to define security requirement in business process specifications. A Secure Business Process description is that of computation independent models in an MDA context. In this paper we propose a CIM to PIM transformation composed of QVT rules. Various UML use cases, which will be part of an information system, are obtained from the secure business process description. © Springer-Verlag Berlin Heidelberg 2007.

Cite

CITATION STYLE

APA

Rodríguez, A., Fernández-Medina, E., & Piattini, M. (2007). Towards CIM to PIM transformation: From secure business processes defined in BPMN to use-cases. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4714 LNCS, pp. 408–415). Springer Verlag. https://doi.org/10.1007/978-3-540-75183-0_30

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free