Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Generating Executable BPEL Code from BPMN Models

Model transformations facilitate to process source models and generate other artifacts, output models and source code, based on algorithms and well-defined rules embedded into model transformations. Current paper presents two model transformations developed in Visual Modeling and Transformation System (VMTS) that facilitate the transformation between two languages for business process modeling:...

متن کامل

Towards Transformations from BPMN to Heterogeneous Systems

By now, the mapping from BPMN to BPEL has been implemented in numerous tools, greatly assisting the business architect in the creation of BPEL processes. However, most of these tools are tailored especially for this transformation, neglecting the original purpose of BPMN: Providing a language independent process model. To address this shortcoming, a pure BPMN editor is needed, being dynamically...

متن کامل

Automatically Generating Abstractions for Planning

This article presents a completely automated approach to generating abstractions for planning. The abstractions are generated using a tractable, domain-independent algorithm whose only input is the definition of a problem to be solved and whose output is an abstraction hierarchy that is tailored to the particular problem. The algorithm generates abstraction hierarchies by dropping literals from...

متن کامل

Collaborative Security Code-Review Towards Aiding Developers Ensure Software-Security

Humans make mistakes, and software programmers are no exception. Software vulnerabilities are discovered everyday; close to 8,000 vulnerabilities were reported in 2014, and almost 2,500 were reported in the first four months of 2015 [9]. Microsoft Security Response Centre defines software vulnerabilities as a security exposure that results from a product weakness that the product developer did ...

متن کامل

A Model Driven Approach for Generating Code from Security Requirements

Nowadays, Information Systems are present in numerous areas and they usually contain data with special security requirements. However, these requirements do not often receive the attention that they deserve and, on many occasions, they are not considered or are only considered when the system development has nished. On the other hand, the use of model driven approaches has recently demonstrated...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Revista de Informática Teórica e Aplicada

سال: 2010

ISSN: 2175-2745,0103-4308

DOI: 10.22456/2175-2745.12581