Managing business compliance using model-driven security management

Author(s):  
Ulrich Lang ◽  
Rudolf Schreiner
Author(s):  
Nataliia Tsymbalenko

The subject of research-theoretical concepts of economic security managementof universities. The purpose of the article. The study of the essence of the economicsecurity management system of the university and the definition of its main tasks,the formulation of principles of economic security management of the university.Methodology. The dialectical method, methods of analysis and synthesis, methodsof structural-logical and semantic analysis were used to study and summarizescientific papers on the research topic. The results of the work. The essence of theuniversity’s economic security management system has been reviewed. The maintasks of the control system have been identified. A definition of the university’seconomic security system has been proposed. Principles of management of economicsecurity of the university have been formulated. These are: scientific andorganizational and social principles. Conclusions. The proposed principles allow totake into account the economic role and social mission of universities in managingeconomic security.


Author(s):  
Meryem El Allaoui ◽  
Khalid Nafil ◽  
Raja Touahni

2009 ◽  
Vol 38 (38) ◽  
pp. 119-130
Author(s):  
Erika Asnina

Use of Business Models within Model Driven Architecture Model Driven Architecture is a framework dedicated for development of large and complex computer systems. It states and implements the principle of architectural separation of concerns. This means that a system can be modeled from three different but related to each other viewpoints. The viewpoint discussed in this paper is a Computation Independent one. MDA specification states that a model that shows a system from this viewpoint is a business model. Taking into account transformations foreseen by MDA, it should be useful for automation of software development processes. This paper discusses an essence of the Computation Independent Model (CIM) and the place of business models in the computation independent modeling. This paper considers four types of business models, namely, SBVR, BPMN, use cases and Topological Functioning Model (TFM). Business persons use SBVR to define business vocabularies and business rules of the existing and planned domains, BPMN to define business processes of both existing and planned domains, and use cases to define business requirements to the planned domain. The TFM is used to define functionality of both existing and planned domains. This paper discusses their capabilities to be used as complete CIMs with formally defined conformity between planned and existing domains.


Sign in / Sign up

Export Citation Format

Share Document