Research Article
An Authentication-Oriented Approach to Model the Crosscutting Constraints in Sequence Diagram Using Aspect OCL
Table 3
Limitations of the previous approaches.
| Papers | Functional requirements modeling | Crosscutting quality attributes modeling (security, reliability, etc.) | Separation of simple and crosscutting constraints | Extension of aspect OCL constraint | Crosscutting constraints modeling (both functional and authentication) | Weaving of crosscutting constraints | Verification of constraint-oriented models |
| Shaukat et al. [1] | ✓ | ✓ | | | | | | Djedjiga et al. [6] | ✓ | ✓ | | | | | | Indrakshi et al. [9] | ✓ | ✓ | | | | | | Ubaid et al. [10] | ✓ | ✓ | | | | | | Kendra et al. [22] | ✓ | ✓ | | | | | | Geri et al. [23] | ✓ | ✓ | | | | | | Nada et al. [24] | ✓ | ✓ | | | | | | Dianxiang et al. [25] | ✓ | ✓ | | | | | | Xiang and Li [26] | ✓ | ✓ | | | | | | Guisheng et al. [27] | ✓ | ✓ | | | | | | Lidia et al. [28] | ✓ | ✓ | | | | | | Our approach | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ | ✓ |
|
|