Model driven implementation of security management process

Bruno A. Mozzaquatro, Ricardo Jardim-Goncalves, Carlos Agostinho

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Services composition involves many time and effort to describe high-level requirements of the business process. To this purpose, the Model Driven Service Engineering Architecture (MDSEA) is a methodology to distinguish the business view and technical point of view in products and services and to agilize the software development. Such capabilities demand more effective process applied to specify, evaluate, communicate and design the system as well as system functionalities and security issues. Security aspects are critical when it involves privacy of data exchange of devices. In this context, the definition of security artifacts during the design of a business process consumes time of system funcionalities development. This paper proposes an implementation of a security management process using the methodology MDSEA as support to promote model transformations from business model to specific artifacts and configurations. This support enables to enrich a solid business model with technical details by specialists.

Original languageEnglish
Title of host publicationMODELSWARD 2017 - Proceedings of the 5th International Conference on Model-Driven Engineering and Software Development
PublisherSciTePress
Pages229-238
Number of pages10
Volume2017-January
ISBN (Electronic)9789897582103
DOIs
Publication statusPublished - 2017
Event5th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2017 - Porto, Portugal
Duration: 19 Feb 201721 Feb 2017

Conference

Conference5th International Conference on Model-Driven Engineering and Software Development, MODELSWARD 2017
CountryPortugal
CityPorto
Period19/02/1721/02/17

Keywords

  • Business process
  • MDA
  • MDSEA
  • Model transformations
  • Security management

Fingerprint Dive into the research topics of 'Model driven implementation of security management process'. Together they form a unique fingerprint.

Cite this