A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Eliciting Security Requirements for Business Processes of Legacy Systems
[chapter]
2015
Lecture Notes in Business Information Processing
The modernisation of enterprise legacy systems, without compromises in their functionality, is a demanding and time consuming endeavour. To retain the underlying business behaviour during their modernisation, the MARBLE TM framework has been developed for the extraction of business process models from their source code. Building on top of that work, in this paper we propose an integrated approach for transforming the extracted legacy process models into Secure Tropos goal models. Such models
doi:10.1007/978-3-319-25897-3_7
fatcat:uupjn5flbnhhre5v762xxs7npu