SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS

Wanderley Augusto Radaelli Junior, Gleison Samuel do Nascimento, Cirano Iochpe

2011

Abstract

Computer systems implement business processes from different organizations. Among the currently operating computer systems, much of it is classified as legacy system. Typically, legacy systems are complex applications that are still active, due to the high cost of modernization and a high degree of criticality. In recent years, were published several works addressing the importance of legacy systems modernization, emphasizing the extraction of the business process model implemented in these systems. Within this context, a key step is to extract knowledge from source code and / or systems execution logs, aiming to use this information in reverse engineering processes. In this work are presented and analyzed methods based on source code manipulation and system’s execution logs mining, which can be used to extract knowledge from legacy systems, prioritizing business rules identification. A comparison between the two different approaches is presented, as well as their positive and negative characteristics. Our results include a list of desired features and a proposal of a method for legacy systems reverse engineering and business rules identification.

References

  1. Almonaies A., Cordy J., Dean T., Legacy System Evolution towards Service-Oriented Architecture, 2009.
  2. Almonaies A., Cordy J., Dean T., Legacy System Evolution towards Service-Oriented Architecture, 2009.
  3. Chiang C. Extracting Business Rules from Legacy Systems into Reusable Components, 2006.
  4. Chiang C. Extracting Business Rules from Legacy Systems into Reusable Components, 2006.
  5. El-Ramly M., Stroulia E., Sorenson P., Mining SystemUser Interaction Traces for Use Case Models, 2002.
  6. El-Ramly M., Stroulia E., Sorenson P., Mining SystemUser Interaction Traces for Use Case Models, 2002.
  7. Erlikh L., Leveraging legacy system dollars for e-business, IT Professional, p. 17-23, 2000.
  8. Erlikh L., Leveraging legacy system dollars for e-business, IT Professional, p. 17-23, 2000.
  9. Harman M., Hierons M., An overview of program slicing. Software Focus p. 85-92, 2001.
  10. Harman M., Hierons M., An overview of program slicing. Software Focus p. 85-92, 2001.
  11. Huang H., Tsai W., Bhattacharya S., Chen X., Wang Y., Sun J., Business Rule Extraction from Legacy Code. In: 20th Compute software & Applications Conf. IEEE Computer Society Press (1996).
  12. Huang H., Tsai W., Bhattacharya S., Chen X., Wang Y., Sun J., Business Rule Extraction from Legacy Code. In: 20th Compute software & Applications Conf. IEEE Computer Society Press (1996).
  13. Kalsing A. C., Nascimento G. S. do., Iochpe C., Thom L. H., Reichert M. An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems, In: 14th Int. IEEE EDOC Conf., IEEE Computer Society Press: Vitória-Brazil, (2010).
  14. Kalsing A. C., Nascimento G. S. do., Iochpe C., Thom L. H., Reichert M. An Incremental Process Mining Approach to Extract Knowledge from Legacy Systems, In: 14th Int. IEEE EDOC Conf., IEEE Computer Society Press: Vitória-Brazil, (2010).
  15. Kalsing A. C., Thom L. H., C. Iochpe. An Incremental Process Mining Algorithm. In: 12th Int. Conf. on Enterprise Information Systems, (2010).
  16. Kalsing A. C., Thom L. H., C. Iochpe. An Incremental Process Mining Algorithm. In: 12th Int. Conf. on Enterprise Information Systems, (2010).
  17. Knolmayer G., Endl R., Pfahrer M.. Modelling Processes and Workflows by Business Rules, In: LNCS - Business Process Management, Springer: London, (2000).
  18. Knolmayer G., Endl R., Pfahrer M.. Modelling Processes and Workflows by Business Rules, In: LNCS - Business Process Management, Springer: London, (2000).
  19. Kuipers T., Moonen L., Types and Concept Analysis for Legacy Systems, 2000.
  20. Kuipers T., Moonen L., Types and Concept Analysis for Legacy Systems, 2000.
  21. Nascimento G. S., Iochpe C., Thom L. H., Reichert M. A Method for Rewriting Legacy Systems using Business Process Management Technology, In: 11th Int. Conf. on Enterprise Information Systems, (2009).
  22. Nascimento G. S., Iochpe C., Thom L. H., Reichert M. A Method for Rewriting Legacy Systems using Business Process Management Technology, In: 11th Int. Conf. on Enterprise Information Systems, (2009).
  23. Newcomb P., Kotik G. Reengineering Procedural Into Object-Oriented Systems, 1995.
  24. Newcomb P., Kotik G. Reengineering Procedural Into Object-Oriented Systems, 1995.
  25. Paradauskas B., Laurikaitidis A., Business Knowledge Extraction from Legacy Information Systems, Information Technology and Control, Vol.35, No.3, 2006.
  26. Paradauskas B., Laurikaitidis A., Business Knowledge Extraction from Legacy Information Systems, Information Technology and Control, Vol.35, No.3, 2006.
  27. Pressman R. S. Software Engineering: A Practitioners Approach, (McGraw-Hill, 2001).
  28. Pressman R. S. Software Engineering: A Practitioners Approach, (McGraw-Hill, 2001).
  29. Putrycz E., Kark A. W., Recovering Business Rules from Legacy Source Code for System Modernization, Lecture notes in computer science, p 107, 2007.
  30. Putrycz E., Kark A. W., Recovering Business Rules from Legacy Source Code for System Modernization, Lecture notes in computer science, p 107, 2007.
  31. Ross R. G. The Business Rule Book: Classifying, Defining and Modeling Rules, 2nd edition, Business Rule Solutions, (1997).
  32. Ross R. G. The Business Rule Book: Classifying, Defining and Modeling Rules, 2nd edition, Business Rule Solutions, (1997).
  33. Stroulia E., El-Ramly M., Kong L., Sorenson P., Matichuk B., Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach. In Proc. of the 6th Working Conf. on Reverse Engineering, (1999).
  34. Stroulia E., El-Ramly M., Kong L., Sorenson P., Matichuk B., Reverse Engineering Legacy Interfaces: An Interaction-Driven Approach. In Proc. of the 6th Working Conf. on Reverse Engineering, (1999).
  35. Van der aalst W., Reijers H., Weijters A., Business Process Mining: An Industrial Application, (2007).
  36. Van der aalst W., Reijers H., Weijters A., Business Process Mining: An Industrial Application, (2007).
  37. Wang C., Zhou Y., Chen J. Extracting Prime Business Rules from large legacy system, Int. Conf. on Computer Science and Software Engineering, (2008).
  38. Wang C., Zhou Y., Chen J. Extracting Prime Business Rules from large legacy system, Int. Conf. on Computer Science and Software Engineering, (2008).
  39. Wang X., Sun J., Yang X., He Z., Maddineni S. Business Rules Extraction from Large Legacy Systems, In: 8th Euro. Conf. on Software Maintenance and Reengineering, 2004.
  40. Wang X., Sun J., Yang X., He Z., Maddineni S. Business Rules Extraction from Large Legacy Systems, In: 8th Euro. Conf. on Software Maintenance and Reengineering, 2004.
  41. Weske M. Business Process Management: Concepts, Languages, Architectures, Springer; Berlin (2007).
  42. Weske M. Business Process Management: Concepts, Languages, Architectures, Springer; Berlin (2007).
Download


Paper Citation


in Harvard Style

Radaelli Junior W., do Nascimento G. and Iochpe C. (2011). SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 207-213. DOI: 10.5220/0003483802070213


in Harvard Style

Radaelli Junior W., do Nascimento G. and Iochpe C. (2011). SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS . In Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS, ISBN 978-989-8425-55-3, pages 207-213. DOI: 10.5220/0003483802070213


in Bibtex Style

@conference{iceis11,
author={Wanderley Augusto Radaelli Junior and Gleison Samuel do Nascimento and Cirano Iochpe},
title={SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={207-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003483802070213},
isbn={978-989-8425-55-3},
}


in Bibtex Style

@conference{iceis11,
author={Wanderley Augusto Radaelli Junior and Gleison Samuel do Nascimento and Cirano Iochpe},
title={SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS},
booktitle={Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,},
year={2011},
pages={207-213},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0003483802070213},
isbn={978-989-8425-55-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS
SN - 978-989-8425-55-3
AU - Radaelli Junior W.
AU - do Nascimento G.
AU - Iochpe C.
PY - 2011
SP - 207
EP - 213
DO - 10.5220/0003483802070213


in EndNote Style

TY - CONF
JO - Proceedings of the 13th International Conference on Enterprise Information Systems - Volume 3: ICEIS,
TI - SURVEY AND PROPOSAL OF A METHOD FOR BUSINESS RULES IDENTIFICATION IN LEGACY SYSTEMS SOURCE CODE AND EXECUTION LOGS
SN - 978-989-8425-55-3
AU - Radaelli Junior W.
AU - do Nascimento G.
AU - Iochpe C.
PY - 2011
SP - 207
EP - 213
DO - 10.5220/0003483802070213