Filters








63,458 Hits in 5.6 sec

Goal-Equivalent Secure Business Process Re-engineering [chapter]

Hugo A. López, Fabio Massacci, Nicola Zannone
2009 Lecture Notes in Computer Science  
To ensure that the re-engineered business process meets the elicited requirements, we employ a notion of equivalence based on goal-equivalence.  ...  The introduction of information technologies in health care systems often requires to re-engineer the business processes used to deliver care.  ...  How do we know that the old BP and the new, re-engineered BP are somehow equivalent? Indeed the whole point of BPR is that the old and new processes should not be equivalent.  ... 
doi:10.1007/978-3-540-93851-4_21 fatcat:kxvcjcg72vg2tgx2ma3h5xee5u

Eliciting Security Requirements for Business Processes of Legacy Systems [chapter]

Nikolaos Argyropoulos, Luis Márquez Alcañiz, Haralambos Mouratidis, Andrew Fish, David G. Rosado, Ignacio García-Rodriguez de Guzmán, Eduardo Fernández-Medina
2015 Lecture Notes in Business Information Processing  
Building on top of that work, in this paper we propose an integrated approach for transforming the extracted legacy process models into Secure Tropos goal models.  ...  To retain the underlying business behaviour during their modernisation, the MARBLE TM framework has been developed for the extraction of business process models from their source code.  ...  MARBLE TM focuses on the reverse engineering stage of the re-engineering process.  ... 
doi:10.1007/978-3-319-25897-3_7 fatcat:uupjn5flbnhhre5v762xxs7npu

SecEPM: A Security Engineering Process Model for Electronic Business Processes

Jorn Eichler
2012 2012 IEEE Ninth International Conference on e-Business Engineering  
SecEPM guides security, business process, and domain experts through the development of secure business processes from the identification of security goals to the selection and configuration of security  ...  In this paper, we provide the design as well as key entities of our Security Engineering Process Model (SecEPM) for electronic business processes.  ...  At the moment, they have to choose to focus on either the protection of their assets or on lightweight innovation and business process (re-) engineering cycles.  ... 
doi:10.1109/icebe.2012.41 dblp:conf/icebe/Eichler12 fatcat:zfpylmb55bcmxecg7xmt522aga

Multi-Perspective Requirements Engineering for Networked Business Systems: A Framework for Pattern Composition

Zlatko Zlatev, Maya Daneva, Roel J. Wieringa
2005 Workshop em Engenharia de Requisitos  
The framework includes three perspectives: Economic value, Business processes, and Application communication, each of which applies a goal-oriented method to compose patterns.  ...  In this paper, we present a framework for analysis and redesign of networked business systems. It is based on libraries of patterns which are derived from existing Internet businesses.  ...  This situation created needs for requirements engineering (RE) methods that combine exploration of new business ideas and redesign of outdated business models.  ... 
dblp:conf/wer/ZlatevDW05 fatcat:kptajfqwvzcdrdplrm67hnuuse

A Systematic Approach to Define the Domain of Information System Security Risk Management [chapter]

Éric Dubois, Patrick Heymans, Nicolas Mayer, Raimundas Matulevičius
2010 Intentional Perspectives on Information Systems Engineering  
Today, security concerns are at the heart of information systems, both at technological and organizational levels.  ...  The proposed domain model can then be used to compare, select or otherwise improve security risk management methods.  ...  A process to effectively deal with both safety and security engineering is also proposed.  ... 
doi:10.1007/978-3-642-12544-7_16 fatcat:5fmfulrmgnbm5kkrjch3iczhkm

Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation

Fabio Massacci, Marco Prest, Nicola Zannone
2005 Computer Standards & Interfaces  
Extending Requirements Engineering modelling and formal analysis methodologies to cope with Security Requirements has been a major effort in the past decade.  ...  In this paper we present a comprehensive case study of the application of the Secure Tropos RE methodology for the compliance to the Italian legislation on Privacy and Data Protection by the University  ...  Introduction The last years have seen a major interest in the development of requirements engineering (RE) methodologies which are able to capture security requirements.  ... 
doi:10.1016/j.csi.2005.01.003 fatcat:47mgu6v4zfgzhgfi5lalfxbwce

Trust for Electronic Commerce Transactions [chapter]

Günther Pernul, Alexander W. Röhm, Gaby Herrmann
1999 Lecture Notes in Computer Science  
MOSS, a business process reengineering methodology for analysing and modelling the security semantics of business transactions in order to transfer them to electronic markets.  ...  But in spite of the well-published success stories, many businesses and consumers are cautious about e-commerce, and security concerns are often cited as being the most important barrier.  ...  The re-engineering aspect is of particular importance in order to transfer a traditional business transaction into an equivalent e-commerce business transaction.  ... 
doi:10.1007/3-540-48252-0_1 fatcat:i4t7ybmh6zbubifrxfqagsm3ua

WSMX - a semantic service-oriented architecture

A. Haller, E. Cimpian, A. Mocan, E. Oren, C. Bussler
2005 IEEE International Conference on Web Services (ICWS'05)  
Web Services offer an interoperability model thut from the idiosyncrasies of implementations; they were introduced to address the need for seamless interoperability between in the Businessto-Business domain  ...  goals, secondly to embed WSMX in an existing process language.  ...  We have investigated two initial approaches, to use hard-coded business rules for composing goals and to embed WSMX in an external process language [ Given the component-based architecture of the WSMX  ... 
doi:10.1109/icws.2005.139 dblp:conf/icws/HallerCMOB05 fatcat:y2vgp4nh3jdaxmlmcph5tcng34

Business Silos Integration Using Service Oriented Architecture

Rajashri Hiremath
2012 International Journal of Computer Science Engineering and Applications  
business services.  ...  Existing traditional enterprise applications are in-capable of integrating with different business silos lacks to improve the business agility.  ...  ACKNOWLEDGEMENTS We are thankful for the Computer Science and Engineering department and management of M S Ramaiah Institute of Technology for having provided all the necessary research facilities.  ... 
doi:10.5121/ijcsea.2012.2206 fatcat:lpbzfp4dyzfm3piecfhofwxpry

Second International SeMSoC Workshop – Business Oriented Aspects Concerning Semantics and Methodologies in Service-Oriented Computing [chapter]

Maximilian Ahrens, Manfred Hauswirth, Frank Leymann, Marten Schönherr
2009 Lecture Notes in Computer Science  
On the other hand, semantic technologies have recently emerged as a promising approach for reducing data and process heterogeneities and automating tasks within SOA and Business Process Management.  ...  But facing the challenge of reconciling the business process requirements and the IT landscape especially in the design time of a SOA implementation, one needs to consider both methodological and technological  ...  Approach in a Multi-Service-Provider-Scenario (Rake / Schönherr), An Execution Engine for Semantic Business Processes (van Lessen et al.), Goal-Equivalent Secure Business Process Re-engineering (Lopez  ... 
doi:10.1007/978-3-540-93851-4_17 fatcat:gcb6mr7b5jasnce4tspb5ozozi

Goal Oriented Requirements Engineering for Blockchain based Food Supply Chain

Shailey Chawla, 1College of Science and Technology, James Cook University, Singapore
2020 International Journal of Software Engineering and Computer Systems  
GOAL ORIENTED REQUIREMENTS ENGINEERING Requirements engineering (RE) refers to the activities that are aimed at guaranteeing that a software system accomplishes the goals, the wants and the expectations  ...  Goal oriented Requirements Engineering is a popular technique that helps in understanding business goals in a comprehensive manner.  ... 
doi:10.15282/ijsecs.6.2.2020.6.0074 fatcat:cxxul4r6kfbpdcw42e7s4j7r5e

Do Cloud Computing Tools Support the Needs of Virtual Enterprises? [chapter]

Andre F. Ruaro, Ricardo J. Rabelo
2016 IFIP Advances in Information and Communication Technology  
A VE is as temporary network of enterprises that collaborate via the Internet towards achieving common goals, sharing assets, costs, risks and benefits.  ...  This is the essential goal of this paper. The needs of VEs and performance indicators to evaluate cloud tools have been identified, and two commercial SaaS, PaaS and IaaS tools have been evaluated.  ...  This can either happen when the VE goals are achieved successfully or due to severe problems along its execution which lead it to abandon its business goal).  ... 
doi:10.1007/978-3-319-45390-3_41 fatcat:edfl35ajx5etjid2qr6jhol32u

An Agile Reverse Engineering Process based on a Framework

Maria Istela Cagnin, José Carlos Maldonado, Fernão Stella R. Germano, Paulo Cesar Masiero, Alessandra Chan, Rosângela Dellosso Penteado
2003 Workshop em Engenharia de Requisitos  
This paper presents an agile reverse engineering process, referred to as PARFAIT/RE, which has been abstracted from the use of a framework-based agile reengineering process, named PARFAIT 3 .  ...  GRN belongs to the business resource management domain and supports object oriented modeling of procedural legacy systems.  ...  , were used to abstract an agile reverse engineering process, referred as PARFAIT/RE.  ... 
dblp:conf/wer/CagninMGMCD03 fatcat:7oyjia5dzvczbogc4x32qxyrbq

Unified Process for Domain Analysis integrating Quality, Aspects and Goals

Francisca Losavio, Alfredo Matteo, Irma Pacilli Camejo
2014 CLEI Electronic Journal  
The Requirements Engineering (RE) discipline is where the software system needs or requirements are captured; these are then "translated" into software components.  ...  This paper proposes a Unified Process for Domain Analysis (UPDA), based on Aspect and Goal orientations to deal with NFR, specified by quality standards to enhance communication.  ...  A crucial discipline within the software development process is Requirements Engineering (RE).  ... 
doi:10.19153/cleiej.17.2.1 fatcat:jvmxlo3u7bhp7bb3x5l2hbjycm

Towards a Decision Support Architecture for Digital Preservation of Business Processes

Martin Alexander Neumann, Michael Beigl, Rudolf Mayer, Hossein Miri, John Thomson, Gonçalo Antunes
2012 International Conference on Digital Preservation  
In this paper, we present and address a number of challenges in digital preservation of entire business processes: (1) identifying digital objects a business process depends on ("What to preserve and why  ...  ; (3) determining a re-deployment setting ("What to re-deploy and why?").  ...  For example, in one scenario it might be sufficient for re-deployment of a business process if the requirements stipulate causal trace-equivalent behaviour after re-deployment.  ... 
dblp:conf/ipres/NeumannBMMTA12 fatcat:l4ksat6hezdgpdf77thz4epogy
« Previous Showing results 1 — 15 out of 63,458 results