[PDF][PDF] Comparative study between data flow diagram and use case diagram

AY Aleryani - International Journal of Scientific and Research …, 2016 - academia.edu
Most of information systems use nowadays were modeled and documented using structured
approach. Expansion of these systems in terms of functionality and maintainability requires …

[PDF][PDF] A Unified Model to Detect Information Flow and Access Control Violations in Software Architectures.

S Seifermann, R Heinrich, D Werle, RH Reussner - SECRYPT, 2021 - scitepress.org
Software architectures allow identifying confidentiality issues early and in a cost-efficient
way. Information Flow (IF) and Access Control (AC) are established confidentiality …

[KÖNYV][B] Architectural Data Flow Analysis for Detecting Violations of Confidentiality Requirements

S Seifermann - 2022 - library.oapen.org
Software vendors must consider confidentiality especially while creating software
architectures because decisions made here are hard to change later. Our approach …

[PDF][PDF] Transforming Simplified Requirement in to a UML Use Case DiTransforming Simplified Requirement in to a UML Use Case DiTransforming Simplified …

RS Madanayake, GKA Dias… - International Journal of …, 2017 - researchgate.net
While our main focus was on Modular Transformations and Ontologies we focused on a
specific form of Modular Transformation, which arose due to the extremely rapid …

Model-driven techniques for data model synthesis

D Brdjanin, S Maric - Electronics, 2013 - doisrpska.nub.rs
This article presents a survey of model-driven techniquesfor data model synthesis. During
an extensive research, we identified more than 70 research papers in the field andmore than …

[PDF][PDF] Merging of Data Flow Diagram with Unified Modeling

K Tiwari, A Tripathi, S Sharma, V Dubey - International Journal of Scientific …, 2012 - Citeseer
In this paper we present an approach that combines the DFD with the UML diagrams. DFD is
a structured approach which provides the functional view of the system whereas UML is an …

[PDF][PDF] Use stories vs UML use cases in modular transformation

R Madanayake, GKA Dias… - International Journal of …, 2016 - researchgate.net
There have been a considerable amount of compatibility issues when considering models in
different system development methodologies. Among them are the low compatibility …

MDA-based ATL transformation to generate MVC 2 web models

M Rahmouni, S Mbarki - Transformation, 2011 - arxiv.org
Development and maintenance of Web application is still a complex and error-prone
process. We need integrated techniques and tool support for automated generation of Web …

[PDF][PDF] An approach to generation of the UML sequence diagram from the two-hemisphere model

O Nikiforova, K Gusarovs, A Ressin - ICSEA 2016, 2016 - researchgate.net
Modelling for model-based development of software concerns the representation of both
system structure and behavior. To this end, in order to satisfy this requirement Unified …

Information security integral engineering technique and its application in ISMS design

A Lyubimov, D Cheremushkin… - 2011 Sixth …, 2011 - ieeexplore.ieee.org
This paper proposes a technique for the design and implementation of the information
security management system (ISMS) for small and medium enterprises (SMEs). The …