Security and Consistency of IT and Business Models at Credit Suisse Realized by Graph Constraints, Transformation and Integration Using Algebraic Graph Theory
This paper shows typical security and consistency challenges regarding the models of the business and the IT universe of the dynamic service-, process- and rule-based environment at Credit Suisse. It presents a theoretical solution for enterprise engineering that is implementable, and fits smoothly with the daily needs and constraints of the people in the scenario. It further enables decentralized modeling based on cognitive and mathematical or logical concepts. Normative aspects of the models are analyzed by graph constraint checks, while consistency is checked and ensured by model integration and transformation. To cope with theoretical and practical necessities, the presented solution is kept sound and usable as well as extensible and scalable. All techniques are based on one theoretical framework: algebraic graph theory. Therefore, the techniques are compatible with each other.
Keywordsenterprise engineering services processes rules business models IT models verification tests norms consistency algebraic graph theory model transformation integration graph constraints
Unable to display preview. Download preview PDF.
- 3.Brandt, C., Engel, T., Hermann, F., Adamek, J.: Security and Consistency of IT and Business Models at Credit Suisse realized by Graph Constraints, Transformation and Integration using Algebraic Graph Theory (Long Version). Technical report, Technische Universität Berlin,Fakultät IV (to appear, 2009)Google Scholar
- 4.Cornelius, F., Hußmann, H., Löwe, M.: The Korso Case Study for Software Engineering with Formal Methods: A Medical Information System. Technical Report 94–5, FB Informatik, TU Berlin (1994)Google Scholar
- 6.Ehrig, H., Ehrig, K., Hermann, F.: From Model Transformation to Model Integration based on the Algebraic Approach to Triple Graph Grammars. In: Ermel, C., de Lara, J., Heckel, R. (eds.) Proc. Workshop on Graph Transformation and Visual Modeling Techniques (GT-VMT 2008), vol. 10. EC-EASST (2008)Google Scholar
- 7.Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. EATCS Monographs in Theoretical Computer Science. Springer, Heidelberg (2006)Google Scholar
- 8.Ehrig, H., Ermel, C., Hermann, F.: On the Relationship of Model Transformations Based on Triple and Plain Graph Grammars (Long Version). Technical Report 2008/05, Technische Universität Berlin, Fakultät IV (2008)Google Scholar
- 11.Groote, J.F., Reniers, M.: Modelling and Analysis of Communicating Systems (to appear)Google Scholar
- 12.Le, T.V., Le, T.U.V., Van, L.T.: Techniques of PROLOG Programming with Implementation of Logical Negation and Quantified Goals. John Wiley & Sons, Chichester (1992)Google Scholar
- 13.OMG. Meta-Object Facility (MOF), Version 2.0 (2006), http://www.omg.org/
- 14.OMG. Unified Modeling Language: Superstructure – Version 2.1.2 (2007), http://www.omg.org/.
- 15.OMG. Catalog of OMG Business Strategy, Business Rules and Business Process Management Specifications (2009), http://www.omg.org/technology/documents/br_pm_spec_catalog.htm
- 16.OMG. Model driven Architecture (MDA) (2009), http://www.omg.org/mda
- 17.Pemmaraju, S., Skiena, S.: Computational Discrete Mathematics: Combinatorics and Graph Theory with Mathematica. The University of Iowa and SUNY at Stony Brook. Cambridge University Press, New York (2003)Google Scholar