{"id":"https://openalex.org/W4385350688","doi":"https://doi.org/10.3233/jifs-231359","title":"Model transformation and code generation using a secure business process model","display_name":"Model transformation and code generation using a secure business process model","publication_year":2023,"publication_date":"2023-07-28","ids":{"openalex":"https://openalex.org/W4385350688","doi":"https://doi.org/10.3233/jifs-231359"},"language":"en","primary_location":{"id":"doi:10.3233/jifs-231359","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231359","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5073160300","display_name":"M. Mythily","orcid":null},"institutions":[{"id":"https://openalex.org/I119668213","display_name":"Karunya University","ror":"https://ror.org/03k23nv15","country_code":"IN","type":"education","lineage":["https://openalex.org/I119668213"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"M. Mythily","raw_affiliation_strings":["Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India","institution_ids":["https://openalex.org/I119668213"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017555845","display_name":"Beaulah David","orcid":null},"institutions":[{"id":"https://openalex.org/I43663321","display_name":"Hindustan Institute of Technology and Science","ror":"https://ror.org/037tgdn13","country_code":"IN","type":"education","lineage":["https://openalex.org/I43663321"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Beaulah David","raw_affiliation_strings":["Department of Information Technology, Hindusthan College of Engineering and Technology, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Department of Information Technology, Hindusthan College of Engineering and Technology, Coimbatore, India","institution_ids":["https://openalex.org/I43663321"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112744390","display_name":"R. Venkatesan","orcid":null},"institutions":[{"id":"https://openalex.org/I119668213","display_name":"Karunya University","ror":"https://ror.org/03k23nv15","country_code":"IN","type":"education","lineage":["https://openalex.org/I119668213"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"R. Venkatesan","raw_affiliation_strings":["Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Karunya Institute of Technology and Sciences, Coimbatore, India","institution_ids":["https://openalex.org/I119668213"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110502652","display_name":"Iwin Thanakumar Joseph","orcid":null},"institutions":[{"id":"https://openalex.org/I875944469","display_name":"Koneru Lakshmaiah Education Foundation","ror":"https://ror.org/02k949197","country_code":"IN","type":"education","lineage":["https://openalex.org/I875944469"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Iwin Thanakumar Joseph","raw_affiliation_strings":["Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswarm, Andhra Pradesh, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Koneru Lakshmaiah Education Foundation, Vaddeswarm, Andhra Pradesh, India","institution_ids":["https://openalex.org/I875944469"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5073160300"],"corresponding_institution_ids":["https://openalex.org/I119668213"],"apc_list":null,"apc_paid":null,"fwci":0.2159,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57081298,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"45","issue":"4","first_page":"6691","last_page":"6705"},"is_retracted":true,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11450","display_name":"Model-Driven Software Engineering Techniques","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10639","display_name":"Advanced Software Engineering Methodologies","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9965000152587891,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7727978229522705},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.662035346031189},{"id":"https://openalex.org/keywords/systems-development-life-cycle","display_name":"Systems development life cycle","score":0.5915294289588928},{"id":"https://openalex.org/keywords/security-testing","display_name":"Security testing","score":0.5619069933891296},{"id":"https://openalex.org/keywords/unified-modeling-language","display_name":"Unified Modeling Language","score":0.5378938913345337},{"id":"https://openalex.org/keywords/computer-security-model","display_name":"Computer security model","score":0.5252734422683716},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.5075701475143433},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.4845846891403198},{"id":"https://openalex.org/keywords/software-development-process","display_name":"Software development process","score":0.4549209773540497},{"id":"https://openalex.org/keywords/model-transformation","display_name":"Model transformation","score":0.4458174407482147},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41105547547340393},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.318761944770813},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.3002404570579529},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.2984113097190857},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2979734539985657},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.21402281522750854},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.18867498636245728},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.12675127387046814}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7727978229522705},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.662035346031189},{"id":"https://openalex.org/C120617098","wikidata":"https://www.wikidata.org/wiki/Q559486","display_name":"Systems development life cycle","level":5,"score":0.5915294289588928},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.5619069933891296},{"id":"https://openalex.org/C145644426","wikidata":"https://www.wikidata.org/wiki/Q169411","display_name":"Unified Modeling Language","level":3,"score":0.5378938913345337},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.5252734422683716},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.5075701475143433},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.4845846891403198},{"id":"https://openalex.org/C180152950","wikidata":"https://www.wikidata.org/wiki/Q2904257","display_name":"Software development process","level":4,"score":0.4549209773540497},{"id":"https://openalex.org/C2779791154","wikidata":"https://www.wikidata.org/wiki/Q258040","display_name":"Model transformation","level":3,"score":0.4458174407482147},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41105547547340393},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.318761944770813},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.3002404570579529},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.2984113097190857},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2979734539985657},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.21402281522750854},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.18867498636245728},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.12675127387046814},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.0},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jifs-231359","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jifs-231359","pdf_url":null,"source":{"id":"https://openalex.org/S179157397","display_name":"Journal of Intelligent & Fuzzy Systems","issn_l":"1064-1246","issn":["1064-1246","1875-8967"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Intelligent &amp; Fuzzy Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Responsible consumption and production","id":"https://metadata.un.org/sdg/12","score":0.5400000214576721}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1508868039","https://openalex.org/W1977353240","https://openalex.org/W2011532774","https://openalex.org/W2034466638","https://openalex.org/W2044799641","https://openalex.org/W2052632834","https://openalex.org/W2064406342","https://openalex.org/W2075827835","https://openalex.org/W2081399342","https://openalex.org/W2120095349","https://openalex.org/W2124105024","https://openalex.org/W2333751991","https://openalex.org/W2562582735","https://openalex.org/W2794355565","https://openalex.org/W2797511714","https://openalex.org/W2965304953","https://openalex.org/W3179614850","https://openalex.org/W6630458711","https://openalex.org/W6653325842"],"related_works":["https://openalex.org/W2553939890","https://openalex.org/W2017116761","https://openalex.org/W2018644264","https://openalex.org/W1811024770","https://openalex.org/W4285411707","https://openalex.org/W2907868081","https://openalex.org/W4230385779","https://openalex.org/W2056412463","https://openalex.org/W2187486724","https://openalex.org/W4387872582"],"abstract_inverted_index":{"Emerging":[0],"daily,":[1],"new":[2],"devices":[3],"and":[4,15,64,100,123,150],"software-driven":[5],"advancements":[6],"pose":[7],"challenges":[8,149],"in":[9,22,47,132,146],"software":[10,25,133,155],"development,":[11],"including":[12],"errors,":[13],"bugs,":[14],"evolving":[16],"requirements.":[17],"This":[18],"leads":[19],"to":[20,75,116],"delays":[21],"delivery.":[23],"Ensuring":[24],"security":[26,44,56,105,153],"within":[27],"the":[28,39,48,77,80,109,120,152],"Software":[29],"Development":[30],"Life":[31],"Cycle":[32],"(SDLC)":[33],"is":[34,73,135],"crucial.":[35],"To":[36],"address":[37],"this,":[38],"research":[40],"focuses":[41],"on":[42],"incorporating":[43],"aspects":[45],"early":[46],"SDLC":[49],"through":[50],"model":[51],"transformation.":[52],"Platform-independent":[53],"models":[54],"with":[55,104,126],"attributes":[57,106],"like":[58],"Integrity,":[59],"Privacy,":[60],"Security":[61,112],"Audit,":[62],"non-repudiation,":[63],"authentication":[65],"are":[66,114,129],"generated.":[67],"A":[68],"template-based":[69],"source":[70,81,121],"code":[71],"generator":[72],"utilized":[74],"create":[76],"structure":[78],"of":[79,154],"model.":[82,111],"The":[83],"Secure":[84],"Business":[85],"Process":[86],"Model":[87],"(SBPM)":[88],"encompasses":[89],"Unified":[90],"Modeling":[91],"Language":[92],"(UML)":[93],"artifacts,":[94],"such":[95],"as":[96,140],"analysis":[97],"level":[98],"classes":[99],"sequence":[101],"diagrams,":[102],"enriched":[103],"derived":[107],"from":[108,119],"activity":[110],"requirements":[113],"linked":[115],"elements":[117],"extracted":[118],"model,":[122],"structural":[124],"codes":[125],"security-enabled":[127],"members":[128],"produced.":[130],"Automation":[131],"development":[134],"inevitable,":[136],"though":[137],"not":[138],"complete,":[139],"it":[141],"plays":[142],"a":[143],"vital":[144],"role":[145],"addressing":[147],"these":[148],"improving":[151],"applications.":[156]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2026-02-01T03:34:12.195049","created_date":"2025-10-10T00:00:00"}
