A combinatorial characterization of resolution width
A Atserias, V Dalmau - Journal of Computer and System Sciences, 2008 - Elsevier
We provide a characterization of the resolution width introduced in the context of
propositional proof complexity in terms of the existential pebble game introduced in the …
propositional proof complexity in terms of the existential pebble game introduced in the …
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …
systems development. The basic underlying concept of this approach is the definition of …
Security requirements specification in service-oriented business process management
M Menzel, I Thomas, C Meinel - 2009 International Conference …, 2009 - ieeexplore.ieee.org
Service-oriented Architectures deliver a flexible infrastructure to allow independently
developed software components to communicate in a seamless manner. In the scope of …
developed software components to communicate in a seamless manner. In the scope of …
An extension of business process model and notation for security risk management
O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …
development. Recently business process model and notation (BPMN) has become a …
Secure business process model specification through a UML 2.0 activity diagram profile
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …
and to enable it to maintain its competitiveness. The languages used for business process …
Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA)
M Kardoš, M Drozdová - Journal of information and organizational …, 2010 - hrcak.srce.hr
Sažetak Information system's models on higher level of abstraction have become a daily
routine in many software companies. The concept of Model Driven Architecture (MDA) …
routine in many software companies. The concept of Model Driven Architecture (MDA) …
Model Transformation with ATL into MDA from CIM to PIM Structured through MVC
Abstract Models transformation is the most important key in Model Driven Architecture
(MDA). The first transformation in MDA is Computing Independent Model (CIM) to Platform …
(MDA). The first transformation in MDA is Computing Independent Model (CIM) to Platform …
[PDF][PDF] A methodology for CIM modelling and its transformation to PIM
B Bousetta, O El Beggar, T Gadi - Journal of Information …, 2013 - researchgate.net
Abstract Developing with Model Driven Architecture is nowadays widely used starting with a
CIM that can be transformed to models of low abstraction (PIM, PSM) that can be used to …
CIM that can be transformed to models of low abstraction (PIM, PSM) that can be used to …
Modelling security goals in business processes
C Wolter, M Menzel, C Meinel - 2008 - dl.gi.de
Various types of security goals, such as authentication or confidentiality, can be defined as
policies for process-aware information systems, typically in a manual fashion. Therefore, we …
policies for process-aware information systems, typically in a manual fashion. Therefore, we …
Advances in model-driven security
Sound methodologies for constructing security-critical systems are extremely important in
order to confront the increasingly varied security threats. As a response to this need, Model …
order to confront the increasingly varied security threats. As a response to this need, Model …