2018
DOI: 10.1007/978-3-319-74161-1_2
|View full text |Cite|
|
Sign up to set email alerts
|

Translating BPMN to Business Rules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…Saruwatari et al, 33 highlighted the difficulty to extract business rules from general purpose programming languages and suggested to analyze the execution logs instead. Other authors have put an emphasis on high‐level specification languages, namely: Deesukying and Vatanawood 34 worked in the context of Petri Nets, Skersys et al 35 and Danenas et al 36 focused on UML, and Mickeviciute et al 37 and Al‐Ali et al 38 specialized in BPMN. The work by Karaa et al 39 is interesting in the context of UML since it presented an improved approach to transform business rules from natural language that are specified within a user's requirements document into an UML class diagram, automatically.…”
Section: Related Workmentioning
confidence: 99%
“…Saruwatari et al, 33 highlighted the difficulty to extract business rules from general purpose programming languages and suggested to analyze the execution logs instead. Other authors have put an emphasis on high‐level specification languages, namely: Deesukying and Vatanawood 34 worked in the context of Petri Nets, Skersys et al 35 and Danenas et al 36 focused on UML, and Mickeviciute et al 37 and Al‐Ali et al 38 specialized in BPMN. The work by Karaa et al 39 is interesting in the context of UML since it presented an improved approach to transform business rules from natural language that are specified within a user's requirements document into an UML class diagram, automatically.…”
Section: Related Workmentioning
confidence: 99%
“…This off-line analysis is not suitable for cases which are still in the pipeline. An open research question is whether current algorithms to abstract models from logs are scalable enough to handle data streams [155,161].…”
Section: Data Analysis and Modellingmentioning
confidence: 99%
“…5, we present our exten-1 Such organizations are subject to data protection regulations from a variety of organizations ranging from the European Union (Data Retention Directive) to national and international law enforcement agencies. Regulations explicitly prescribe the deployment of AC mechanisms that prevent unauthorized access to clients' critical information [14,15] sion to XACML, while Sect. 6 describes our enforcement mechanism in detail.…”
Section: Introductionmentioning
confidence: 99%