Podrobná bibliografie
| Název: |
Model transformation and code generation using a secure business process model. |
| Autoři: |
Mythily, M., David, Beaulah, Venkatesan, R., Joseph, Iwin Thanakumar |
| Zdroj: |
Journal of Intelligent & Fuzzy Systems; 2023, Vol. 45 Issue 4, p6691-6705, 15p |
| Témata: |
UNIFIED modeling language, BUSINESS process modeling, COMPUTER software security, CODE generators, COMPUTER software development, SOURCE code |
| Abstrakt: |
Emerging daily, new devices and software-driven advancements pose challenges in software development, including errors, bugs, and evolving requirements. This leads to delays in delivery. Ensuring software security within the Software Development Life Cycle (SDLC) is crucial. To address this, the research focuses on incorporating security aspects early in the SDLC through model transformation. Platform-independent models with security attributes like Integrity, Privacy, Security Audit, non-repudiation, and authentication are generated. A template-based source code generator is utilized to create the structure of the source model. The Secure Business Process Model (SBPM) encompasses Unified Modeling Language (UML) artifacts, such as analysis level classes and sequence diagrams, enriched with security attributes derived from the activity model. Security requirements are linked to elements extracted from the source model, and structural codes with security-enabled members are produced. Automation in software development is inevitable, though not complete, as it plays a vital role in addressing these challenges and improving the security of software applications. [ABSTRACT FROM AUTHOR] |
|
Copyright of Journal of Intelligent & Fuzzy Systems is the property of Sage Publications Inc. and its content may not be copied or emailed to multiple sites without the copyright holder's express written permission. Additionally, content may not be used with any artificial intelligence tools or machine learning technologies. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.) |
| Databáze: |
Complementary Index |