A combinatorial characterization of resolution width

A Atserias, V Dalmau - Journal of Computer and System Sciences, 2008 - Elsevier
We provide a characterization of the resolution width introduced in the context of
propositional proof complexity in terms of the existential pebble game introduced in the …

Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach

A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …

Security requirements specification in service-oriented business process management

M Menzel, I Thomas, C Meinel - 2009 International Conference …, 2009 - ieeexplore.ieee.org
Service-oriented Architectures deliver a flexible infrastructure to allow independently
developed software components to communicate in a seamless manner. In the scope of …

An extension of business process model and notation for security risk management

O Altuhhov, R Matulevičius, N Ahmed - International Journal of …, 2013 - igi-global.com
Business process modelling is one of the major aspects in the modern information system
development. Recently business process model and notation (BPMN) has become a …

Secure business process model specification through a UML 2.0 activity diagram profile

A Rodríguez, E Fernández-Medina, J Trujillo… - Decision Support …, 2011 - Elsevier
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …

Analytical method of CIM to PIM transformation in Model Driven Architecture (MDA)

M Kardoš, M Drozdová - Journal of information and organizational …, 2010 - hrcak.srce.hr
Sažetak Information system's models on higher level of abstraction have become a daily
routine in many software companies. The concept of Model Driven Architecture (MDA) …

Model Transformation with ATL into MDA from CIM to PIM Structured through MVC

Y Rhazali, Y Hadi, A Mouloudi - Procedia Computer Science, 2016 - Elsevier
Abstract Models transformation is the most important key in Model Driven Architecture
(MDA). The first transformation in MDA is Computing Independent Model (CIM) to Platform …

[PDF][PDF] A methodology for CIM modelling and its transformation to PIM

B Bousetta, O El Beggar, T Gadi - Journal of Information …, 2013 - researchgate.net
Abstract Developing with Model Driven Architecture is nowadays widely used starting with a
CIM that can be transformed to models of low abstraction (PIM, PSM) that can be used to …

Modelling security goals in business processes

C Wolter, M Menzel, C Meinel - 2008 - dl.gi.de
Various types of security goals, such as authentication or confidentiality, can be defined as
policies for process-aware information systems, typically in a manual fashion. Therefore, we …

Advances in model-driven security

L Lucio, Q Zhang, PH Nguyen, M Amrani, J Klein… - Advances in …, 2014 - Elsevier
Sound methodologies for constructing security-critical systems are extremely important in
order to confront the increasingly varied security threats. As a response to this need, Model …