Towards Generating Richer Code by Binding Security Abstractions to BPMN Task Types
نویسندگان
چکیده
منابع مشابه
Generating Executable BPEL Code from BPMN Models
Model transformations facilitate to process source models and generate other artifacts, output models and source code, based on algorithms and well-defined rules embedded into model transformations. Current paper presents two model transformations developed in Visual Modeling and Transformation System (VMTS) that facilitate the transformation between two languages for business process modeling:...
متن کاملTowards Transformations from BPMN to Heterogeneous Systems
By now, the mapping from BPMN to BPEL has been implemented in numerous tools, greatly assisting the business architect in the creation of BPEL processes. However, most of these tools are tailored especially for this transformation, neglecting the original purpose of BPMN: Providing a language independent process model. To address this shortcoming, a pure BPMN editor is needed, being dynamically...
متن کاملAutomatically Generating Abstractions for Planning
This article presents a completely automated approach to generating abstractions for planning. The abstractions are generated using a tractable, domain-independent algorithm whose only input is the definition of a problem to be solved and whose output is an abstraction hierarchy that is tailored to the particular problem. The algorithm generates abstraction hierarchies by dropping literals from...
متن کاملCollaborative Security Code-Review Towards Aiding Developers Ensure Software-Security
Humans make mistakes, and software programmers are no exception. Software vulnerabilities are discovered everyday; close to 8,000 vulnerabilities were reported in 2014, and almost 2,500 were reported in the first four months of 2015 [9]. Microsoft Security Response Centre defines software vulnerabilities as a security exposure that results from a product weakness that the product developer did ...
متن کاملA Model Driven Approach for Generating Code from Security Requirements
Nowadays, Information Systems are present in numerous areas and they usually contain data with special security requirements. However, these requirements do not often receive the attention that they deserve and, on many occasions, they are not considered or are only considered when the system development has nished. On the other hand, the use of model driven approaches has recently demonstrated...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista de Informática Teórica e Aplicada
سال: 2010
ISSN: 2175-2745,0103-4308
DOI: 10.22456/2175-2745.12581