Business process modelling challenges and solutions: a literature review
Y Alotaibi - Journal of intelligent manufacturing, 2016 - Springer
We have presented a review of the challenges facing business PM. These challenges are
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
categorized into three challenges:(1) between business and IT, difficulty of deriving IT goals …
Survey of business process management: challenges and solutions
Y Alotaibi, F Liu - Enterprise Information Systems, 2017 - Taylor & Francis
The current literature shows that creating a good framework on business process model
(PM) is not an easy task. A successful business PM should have the ability to ensure …
(PM) is not an easy task. A successful business PM should have the ability to ensure …
Semi-formal transformation of secure business processes into analysis class and use case models: An MDA approach
A Rodríguez, IGR de Guzmán… - Information and …, 2010 - Elsevier
CONTEXT: Model-Driven Development (MDD) is an alternative approach for information
systems development. The basic underlying concept of this approach is the definition of …
systems development. The basic underlying concept of this approach is the definition of …
Secure business process model specification through a UML 2.0 activity diagram profile
Business processes have become important resources, both for an enterprise's performance
and to enable it to maintain its competitiveness. The languages used for business process …
and to enable it to maintain its competitiveness. The languages used for business process …
A comparison of software design security metrics
D Mellado, E Fernández-Medina… - Proceedings of the Fourth …, 2010 - dl.acm.org
A lack of security metrics signifies that it is not possible to measure the success of security
policies, mechanisms and implementations, and security cannot, in turn, be improved if it …
policies, mechanisms and implementations, and security cannot, in turn, be improved if it …
CIM to PIM transformation: A reality
A Rodríguez, E Fernández-Medina… - … II: Volume 2 IFIP TC 8 WG …, 2008 - Springer
Within the scope of MDA, the model transformation is orientated towards solving the
problems of time, cost and quality associated with software creation. Moreover, business …
problems of time, cost and quality associated with software creation. Moreover, business …
A novel secure business process modeling approach and its impact on business performance
Y Alotaibi, F Liu - Information Sciences, 2014 - Elsevier
The existing information system (IS) development methods do not meet the requirements to
resolve security-related IS problems and they fail to provide for the successful integration of …
resolve security-related IS problems and they fail to provide for the successful integration of …
Enhancing secure business process design with security process patterns
Business process definition and analysis are an important activity for any organisation. As
research has demonstrated, well-defined business processes can reduce cost, improve …
research has demonstrated, well-defined business processes can reduce cost, improve …
Formalizing linguistic conventions for conceptual models
A precondition for the appropriate analysis of conceptual models is not only their syntactic
correctness but also their semantic comparability. Assuring comparability is challenging …
correctness but also their semantic comparability. Assuring comparability is challenging …
Specifying security requirements of context aware system using UML
S Almutairi, G Bella… - … Conference on Digital …, 2012 - ieeexplore.ieee.org
Unified Modeling Language (UML) is an effective tool to model information systems and to
develop effective system specifications. Context Aware systems possess a dynamic …
develop effective system specifications. Context Aware systems possess a dynamic …