Towards CIM to PIM transformation: from secure business processes defined in BPMN to use-cases

  • Authors:
  • Alfonso Rodríguez;Eduardo Fernández-Medina;Mario Piattini

  • Affiliations:
  • Departamento de Auditoría e Informática, Universidad del Bio Bio, Chillán, Chile;ALARCOS Research Group, Information Systems and Technologies Department, Indra Research and Development Institute, University of Castilla-La Mancha, Ciudad Real, Spain;ALARCOS Research Group, Information Systems and Technologies Department, Indra Research and Development Institute, University of Castilla-La Mancha, Ciudad Real, Spain

  • Venue:
  • BPM'07 Proceedings of the 5th international conference on Business process management
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The software community is currently paying attention to modeltransformation. The MDA approach is particularly orientated towards solvingthe problems of time, cost and quality associated with software creation.Enterprises are, moreover, aware of the importance that business processes andsecurity have in relation to their competitive position and performance. In ourprevious work, we have proposed a BPMN extension which can be used todefine security requirement in business process specifications. A SecureBusiness Process description is that of computation independent models in anMDA context. In this paper we propose a CIM to PIM transformationcomposed of QVT rules. Various UML use cases, which will be part of aninformation system, are obtained from the secure business process description.