2 RELATED WORK
In this section, we are going to shed light on the
related works concerning the passage of the CIM
level to the PIM level in MDA drawing out in part
the advantages and disadvantages of each approach.
The oriented service transformation from CIM to
PIM was proposed by (Castro ,Marcos and Vara,
2011). The authors present the CIM level using
BPMN for modeling business process and the value
model (Gordijn and Akkermans, 2003) so as to
identify services from the beginning in the business
perspective. Through the ATL language, the authors
move towards a PIM level presented by two
extensions of use case model and two extensions of
the activity diagram. Although this method has the
advantage of identifying services and the
specification of a business process at the CIM level
in order to guide the transformation to PIM in a
semi-automatic manner with well-defined rules. But
the authors’ study is only limited to the use case
diagram and the activity diagram in the PIM level
and does not present the structural view (generally
through the class diagram) that defines the ultimate
objective of this level. Also, the use of activity
diagram in the PIM level causes great inconvenience
since this diagram is among the standards for
modeling business processes.
A transformation approach from CIM to PIM
based on security requirements from the beginning
in the business perspective is presented by
(Rodríguez, García-Rodríguez de Guzmán,
Fernández Medina and Piattini, 2010). The authors
use the BPMN notation for modeling a secure
business processes of the CIM level; then, they
determine the transformations in QVT in order to
obtain class diagrams and use case. This method
presents a reference in the transformation of CIM to
PIM security oriented. However, this proposal
focuses only on secure information systems.
(Hahn, Dmytro and Fischer., 2010) focus on
engineering services driven by models. The authors
present the CIM level with BPMN notation and
establish the ATL language to achieve a
transformation to the PIM level represented in this
approach by using SoaML models. The authors use
SoaML, the new OMG standard for modeling
services, but this approach does not represent the
ultimate goal of PIM level, such class digrams.
(Zhang, Mei, Zhao and Yang, 2005) describe an
approach in which the CIM and PIM are
respectively represented by functionalities and
components. Responsibilities in this approach are
considered as connectors between functionalities and
components to simplify the task of transforming
CIM to PIM. (Grammel and Kastenholz, 2010) rely
on a DSL connection, which focuses on the
management of traceability in general. Both
approaches offer solutions to transform CIM to PIM,
while they do not specify models used in CIM level
and PIM level.
An approach respecting MDA which aims at
transforming the diagram of use case to the activity
diagram is proposed by (Gutiérrez, Nebut, Escalona,
Mejías and Ramos, 2008). The authors use QVT to
transform existing use cases to the activity diagram.
While this approach makes a CIM to PIM
transformation through clear rules, the authors
define in the CIM level functional requirements
represented by the use case.
(Mazón, Pardillo and Trujillo, 2007) propose an
objective-oriented approach by defining a UML
profile to present the CIM level, based on the i*
modeling framework. The authors use QVT to move
towards the PIM that focuses on conceptual
modeling of data warehouse. However, this
approach only tackles the transformation in the field
of data warehousing.
(Kherraf, Lefebvre and Suryn, 2008) propose a
disciplined approach to transform the CIM to PIM
using the business process model and use case
diagram as an initial step in the modeling of business
processes, then a detailed activity diagram which
defines the system requirements which represents
the last step in the CIM level. The elements of the
requirements’ model are transformed as components
of the system. These are presented in the component
diagram as a first step in the PIM level. Finally, a set
of business archetypes helps to transform the system
components to obtain the class diagram. This
approach offers interesting ideas on transforming the
CIM to PIM. However, this approach uses diagram
use case that represents the system functionalities in
the CIM level.
(Kardoš and Drozdová, 2010) present an
analytical method for the transformation of CIM to
PIM in MDA. The authors define the CIM level
through the data flow diagram; then they use the use
case diagram to initiate the information system view.
This approach also defines a model of activity
diagram as well as a model of sequence diagram and
finally a model class diagram. The advantage of this
method is the use of various UML diagrams that
present different views of the information system in
PIM level, but this method does not present a real
business view since it uses DFD, and does not
clearly define rules for transforming the CIM to
PIM.
DisciplinedApproachforTransformationCIMtoPIMinMDA
313