![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Towards Obtaining Analysis-Level Class and Use Case Diagrams from Business Process Models
Nowadays, business process modeling, using industrial standards such as UML or BPMN, offers us a good opportunity to incorporate requirements at high levels of abstraction. In the context of Model Driven Archi...
-
Chapter and Conference Paper
M-BPSec: A Method for Security Requirement Elicitation from a UML 2.0 Business Process Specification
The early attainment of requirements in a software development process allows us to improve the quality of the product. Although many methods through which to elicit requirements exist, few of them are specifi...
-
Chapter and Conference Paper
Towards CIM to PIM Transformation: From Secure Business Processes Defined in BPMN to Use-Cases
The software community is currently paying attention to model transformation. The MDA approach is particularly orientated towards solving the problems of time, cost and quality associated with software creatio...
-
Chapter and Conference Paper
Capturing Security Requirements in Business Processes Through a UML 2.0 Activity Diagrams Profile
Security has become a crucial aspect for the performance of present organizations since the protected object is the mission of them. Therefore, the management approach oriented to business processes has been a...