Skip to main content
Log in

BPM supported model generation by contemplating key elements of information security

  • Published:
Automated Software Engineering Aims and scope Submit manuscript

Abstract

Model-based software engineering has made great strides in developing new software that would outshine traditional methodology. Due to this, well-defined support has been provided for process modeling by the introduction of varieties of notations to develop the UML models. In addition to this, Business Process Modeling (BPM) is a pioneer in introducing process models with domain knowledge representation. Most of the software has similarities based on their operations, structures, validation, and so on. So, an automatic process involvement supports them in terms of cost and duration. This proposed secure Business Process Model will support the development phase and help incorporate the security code along with customer requirements. The proposed Secured Business Process (SecBP) system is an automation process to fine-tune the software engineering design process automatically. Security requirement incorporation requires an image to text and vice versa conversion at the early stages of the software design process. The security integration process is optimized by a decision learning algorithm. Hence the proposed system brings an output model as a domain-specific model with security mapping.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Mythily.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Mythily, M., Saha, S., Selvam, S. et al. BPM supported model generation by contemplating key elements of information security. Autom Softw Eng 29, 23 (2022). https://doi.org/10.1007/s10515-022-00321-5

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s10515-022-00321-5

Keywords

Navigation