DOI: 10.1007/978-3-540-75132-8_30
|View full text |Cite
|
Sign up to set email alerts
|

UML Profile for the Platform Independent Modelling of Service-Oriented Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(5 citation statements)
references
References 4 publications
0
5
0
Order By: Relevance
“…For instance, a collaboration service can be mapped to 'collaboration service' in [7] and compserv or orchserv in [14]. A basic service in this paper can be converted into basic serv in [14] or 'service' in [7]. Once the conversion is done, tools such as MDA supporting tools can help developers to build SOA systems based on the profile.…”
Section: Step 5 Converting Identified Services Into Service Profilementioning
confidence: 99%
See 1 more Smart Citation
“…For instance, a collaboration service can be mapped to 'collaboration service' in [7] and compserv or orchserv in [14]. A basic service in this paper can be converted into basic serv in [14] or 'service' in [7]. Once the conversion is done, tools such as MDA supporting tools can help developers to build SOA systems based on the profile.…”
Section: Step 5 Converting Identified Services Into Service Profilementioning
confidence: 99%
“…The services identified in our approach can be mapped into several service profiles in the various manners [7,14]. For instance, a collaboration service can be mapped to 'collaboration service' in [7] and compserv or orchserv in [14].…”
Section: Step 5 Converting Identified Services Into Service Profilementioning
confidence: 99%
“…Security experts use the given architecture of software (i.e., provided by the software owners) for threat modeling given that the ground-truth architecture of software (a ground-truth architecture is the architecture of software as recovered and verified by the architects [32]) is often not available. However, the given architecture is often different than the groundtruth architecture.…”
Section: Approachmentioning
confidence: 99%
“…In recent years, several research studies have focused on developing UML profiles to enhance UML to adapt to different application domains. In , a model‐driven development approach was introduced to the development of access control policies for distributed systems.…”
Section: Related Workmentioning
confidence: 99%