Skip to main content

Integrating Constraints in Schematics of Systems

  • Conference paper
Software Engineering in Intelligent Systems

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 349))

  • 1453 Accesses

Abstract

In computer science, a constraint represents a restriction related to some element (e.g., a UML class), where it is usually specified by a Boolean expression. Several languages have been developed for constraint specification at the requirements level; still, problems exist, such as the introduction of new notions applied specifically to constraints instead of an attempt to integrate them into the requirements description, e.g., use of Object Constraint Language as an extension of Unified Modeling Language. This paper introduces a new method that integrates constraints into a flow-based diagrammatic conceptual model. Various features of this modeling are applied to several examples from the literature and to a case study that utilizes Role-Based Access Control (RBAC). The results suggest a promising approach to constraints specification as an integral part of the conceptual model of any system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hansen, F.O.: SysML – a modeling language for systems engineering [slides] (2010), http://staff.iha.dk/foh/Foredrag/SysML-SystemEngineering-DSFD-15-03-2010.pdf

  2. Friedenthal, S., Moore, A., Steiner, R.: A Practical Guide to SysML: The Systems Modeling Language, 2nd edn. Elsevier (2011) ISBN 0123852064, 9780123852069

    Google Scholar 

  3. Friedenthal, S., Moore, A., Steiner, R.: A Practical Guide to SysML: The Systems Modeling Language. Elsevier (2008)

    Google Scholar 

  4. Weilkiens, T.: Systems Engineering with SysML/UML: Modeling, Analysis, Design. Elsevier (2007)

    Google Scholar 

  5. Fakhroutdinov, K.: UML Constraint, Blo, @014 (Access), http://www.uml-diagrams.org/constraint.html

  6. Ambler, S.W.: Agile Modeling (2003-2014), http://www.agilemodeling.com/artifacts/constraint.htm

  7. Warmer, J., Kleppe, A.: The Object Constraint Language – Precise Modeling with UML. Addison-Wesley (1999)

    Google Scholar 

  8. Hußmann, H.: Technische Universität Dresden, Lecture Notes (2014) (access), http://www-st.inf.tu-dresden.de/fs/lectnotes/fss5a.pdf

  9. Al-Fedaghi, S.: Pure Conceptualization of Computer Programming Instructions. International Journal of Advancements in Computing Technology 3(9), 302–313 (2011)

    Article  Google Scholar 

  10. Al-Fedaghi, S.: Schematizing Proofs based on Flow of Truth Values in Logic. In: IEEE International Conference on Systems, Man, and Cybernetics (IEEE SMC 2013), Manchester, UK, October 13-16 (2013)

    Google Scholar 

  11. Al-Fedaghi, S.: Flow-based Enterprise Process Modeling. International Journal of Database Theory and Application 6(3), 59–70 (2013)

    Google Scholar 

  12. Al-Fedaghi, S.: Toward Flow-Based Semantics of Activities. International Journal of Software Engineering and Its Applications 7(2), 171–182 (2013)

    Google Scholar 

  13. BusinessAnalystFaq,com. What is sequence diagram? http://www.businessanalystfaq.com/whatissequencediagram.htm

  14. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: Jézéquel, J.-M., Hussmann, H., Cook, S. (eds.) UML 2002. LNCS, vol. 2460, pp. 426–441. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  15. Jürjens, J., Shabalin, P.: Tools for Secure Systems Development with UML. International Journal on Software Tools for Technology Transfer (STTT) 9(5-6), 527–544 (2004), doi:10.1007/s10009-007-0048-8

    Article  Google Scholar 

  16. Cenys, A., Normantas, Radvilavicius, L.: Designing Role-based Access Control Policies with UML. Journal of Engineering Science and Technology Review 2(1), 48–50 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Al-Fedaghi, S. (2015). Integrating Constraints in Schematics of Systems. In: Silhavy, R., Senkerik, R., Oplatkova, Z., Prokopova, Z., Silhavy, P. (eds) Software Engineering in Intelligent Systems. Advances in Intelligent Systems and Computing, vol 349. Springer, Cham. https://doi.org/10.1007/978-3-319-18473-9_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18473-9_17

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18472-2

  • Online ISBN: 978-3-319-18473-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics