Extracting Business Rules from Information Systems

Business rules are an important asset of an organisation. Many organisations have substantial investment in business rules encoded in legacy information systems. This paper reports on the type of business rules that may be found in an organisation's information systems, and the techniques that may be used to recover business rules from such systems. Also outlined is a new approach which may be used to unlock business rules from legacy information systems.

[1]  Jean-Marc DeBaud,et al.  DARE: domain-augmented reengineering , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.

[2]  Atul Prakash,et al.  A Query Algebra for Program Databases , 1996, IEEE Trans. Software Eng..

[3]  Jean-Luc Hainaut,et al.  Contribution to a theory of database reverse engineering , 1993, [1993] Proceedings Working Conference on Reverse Engineering.

[4]  Holger Herbst,et al.  A Repository System for Business Rules , 1995, DS-6.

[5]  Michael R. Blaha Dimensions of Data ase Reverse Engineering , 1997 .

[6]  Vincent Englebert,et al.  Structure elicitation in database reverse engineering , 1996, Proceedings of WCRE '96: 4rd Working Conference on Reverse Engineering.

[7]  David W. Binkley,et al.  Interprocedural slicing using dependence graphs , 1990, TOPL.

[8]  W. Alex Gray,et al.  Establishing a Knowledge Base to Assist Integration of Heterogeneous Databases , 1998, BNCOD.

[9]  Lawrence Markosian,et al.  Using an enabling technology to reengineer legacy systems , 1994, CACM.

[10]  N. J. Fiddian,et al.  Tools to enable interoperation of heterogeneous databases , 1997, Proceedings 13th International Conference on Data Engineering.

[11]  W. Alex Gray,et al.  An Approach to Eliciting the Semantics of Relational Databases , 1992, CAiSE.

[12]  Gordon I. McCalla,et al.  Cliche recognition in legacy software: a scalable, knowledge-based approach , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.

[13]  Vincent Englebert,et al.  Program Understanding in Databases Reverse Engineering , 1998, DEXA.

[14]  James H. Cross,et al.  Reverse engineering and design recovery: a taxonomy , 1990, IEEE Software.

[15]  Michael R. Blaha Dimensions of database reverse engineering , 1997, Proceedings of the Fourth Working Conference on Reverse Engineering.