loading
Papers

Research.Publish.Connect.

Paper

Authors: Boris Shishkov 1 and Yi Yin 2

Affiliations: 1 Bulgarian Academy of Sciences / IICREST, Bulgaria ; 2 TBM - Delft University of Technology, Netherlands

ISBN: 978-989-758-238-7

Keyword(s): Enterprise Modeling, Software Specification, Context-Awareness, Privacy, Land Border Security.

Abstract: Current global trends push enterprises to be increasingly efficient and flexible, and at the same time compliant with legislation regarding privacy, security, and transparency. The latest IoT (Internet-of-Things) developments offer opportunities for enterprises but at the same time those developments lead to an increased complexity with regard to the underlying software, this in turn leading to new risks. Hence, more advanced modeling methods and techniques may be necessary, especially in the area of enterprise information systems (often featured currently by enterprise-aligned IoT-enabled software systems), such that both the enterprise needs are captured (and understood) and software features are specified accordingly. We need a common modeling ground for this, allowing us to properly align enterprise modeling and software specification. Such a common ground can be co-created by enterprise engineers and software engineers, featuring: (a) technologyindependent enterprise models roote d in social theories; (b) technology-specific software models rooted in computing paradigms. An approach is needed on top of that because such an integrated enterprise-software modeling requires to be greased by modeling guidelines and notations, such that adequate modeling generations and transformations are possible. This means that taking as input unstructured business information, we should be able to usefully apply a modeling and design process, such that we come through enterprise models and reach as far as the specification and implementation of software. We argue that an existing approach has those capabilities, namely the approach SDBC (Software Derived from Business Components). Hence, we adopt SDBC in the current research. Further, we have opted for an explicit consideration of context-awareness and privacy, claiming their relevance with regard to some current IoTrelated demands (mentioned above). Nevertheless, it has not yet been extensively studied how SDBC can be used for modeling software systems with requirements on those properties. For this reason, we aim at enriching the SDBC-rooted enterprise-modeling-driven software specification, by weaving in contextawareness and privacy enforcement. We partially demonstrate our proposed way of modeling, by means of a case example featuring land border security. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.173.45

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Shishkov B.; Yin Y. and (2017). Towards Context-Aware and Privacy-Sensitive Systems.In Proceedings of the Seventh International Symposium on Business Modeling and Software Design - Volume 1: BMSD, ISBN 978-989-758-238-7, pages 46-60. DOI: 10.5220/0006527400460060

@conference{bmsd17,
author={Boris Shishkov and Yi Yin},
title={Towards Context-Aware and Privacy-Sensitive Systems},
booktitle={Proceedings of the Seventh International Symposium on Business Modeling and Software Design - Volume 1: BMSD,},
year={2017},
pages={46-60},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006527400460060},
isbn={978-989-758-238-7},
}

TY - CONF

JO - Proceedings of the Seventh International Symposium on Business Modeling and Software Design - Volume 1: BMSD,
TI - Towards Context-Aware and Privacy-Sensitive Systems
SN - 978-989-758-238-7
AU - Shishkov, B.
AU - Yin, Y.
PY - 2017
SP - 46
EP - 60
DO - 10.5220/0006527400460060

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.