loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Alfonso Rodríguez 1 and Ignacio García-Rodríguez de Guzmán 2

Affiliations: 1 Universidad del Bío-Bío, Chile ; 2 UCLM-Soluziona Research and Development Institute, University of Castilla-La Mancha, Spain

Abstract: MDA is an approach based on the transformation of models for software development. It is complemented with QVT as a language for transformations specifications. This approach is being paid much attention by researchers and practitioners since it promotes the early specification of requirements at high levels of abstractions, independently of computation, that will be later part of models closer to the software solution. Taking into account this approach, we can create business process models incorporating requirements, even those of security, that will be later part of more concrete models. In our proposal, based on MDA, we start from secure business process specifications and through transformations specified with QVT, we obtain use cases and security use cases. Such artifacts complement the first stages of an ordered and systematic software development process such as UP.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.118.119.77

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Rodríguez, A. and García-Rodríguez de Guzmán, I. (2007). Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach. In Proceedings of the 5th International Workshop on Security in Information Systems (ICEIS 2007) - WOSIS; ISBN 978-972-8865-96-2, SciTePress, pages 209-219. DOI: 10.5220/0002421502090219

@conference{wosis07,
author={Alfonso Rodríguez. and Ignacio {García{-}Rodríguez de Guzmán}.},
title={Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach},
booktitle={Proceedings of the 5th International Workshop on Security in Information Systems (ICEIS 2007) - WOSIS},
year={2007},
pages={209-219},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002421502090219},
isbn={978-972-8865-96-2},
}

TY - CONF

JO - Proceedings of the 5th International Workshop on Security in Information Systems (ICEIS 2007) - WOSIS
TI - Obtaining Use Cases and Security Use Cases from Secure Business Process through the MDA Approach
SN - 978-972-8865-96-2
AU - Rodríguez, A.
AU - García-Rodríguez de Guzmán, I.
PY - 2007
SP - 209
EP - 219
DO - 10.5220/0002421502090219
PB - SciTePress