Migrating legacy systems: gateways, interfaces & the incremental approach
Migrating legacy systems: gateways, interfaces & the incremental approach
Deriving authorizations from process analysis in legacy information systems
SEC'97 Proceedings of the IFIP TC11 13 international conference on Information Security (SEC '97) on Information security in research and business
Legacy information systems and business process change: a patterns perpective
Communications of the AIS
Software engineering (6th ed.)
Software engineering (6th ed.)
An architecture for recovering business events bottom-up
Proceedings of the HCI International '99 (the 8th International Conference on Human-Computer Interaction) on Human-Computer Interaction: Communication, Cooperation, and Application Design-Volume 2 - Volume 2
A methodology for managing roles in legacy systems
Proceedings of the eighth ACM symposium on Access control models and technologies
An Overview of Legacy System Migration
APSEC '97 Proceedings of the Fourth Asia-Pacific Software Engineering and International Computer Science Conference
VIATRA " Visual Automated Transformations for Formal Verification and Validation of UML Models
Proceedings of the 17th IEEE international conference on Automated software engineering
Model-Driven Business Process Recovery
WCRE '04 Proceedings of the 11th Working Conference on Reverse Engineering
A BPMN Extension for the Modeling of Security Requirements in Business Processes
IEICE - Transactions on Information and Systems
A Taxonomy of Model Transformation
Electronic Notes in Theoretical Computer Science (ENTCS)
Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases
BPM'07 Proceedings of the 5th international conference on Business process management
Towards a UML 2.0 extension for the modeling of security requirements in business processes
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Introducing business process into legacy information systems
BPM'05 Proceedings of the 3rd international conference on Business Process Management
Organisational scenarios and legacy systems
International Journal of Information Management: The Journal for Information Professionals
Hi-index | 0.00 |
Nowadays, enterprises deal with Legacy Information Systems (LIS) that are very important to carry out their daily tasks. These systems that are mission critical and very difficult to replace, contain much information about the Business Processes (BP) that support the operation of the enterprise. In most cases, this information is not easy to obtain and on the contrary, the effort in time and money required to obtain it discourages any attempt to carry out this task. In this paper, we present the preliminary definition of a framework that, through model transformation, will allow us to obtain information about the BP from the LIS, paying special attention to security requirements. Thus, it will be possible to have Secure Business Processes (SBP) that, besides providing an additional view of the information that underlies the LIS, could be used as a starting point in a process of creation of information Systems.