Reverse Engineering Process for the Generation of UML Diagrams in Web Services Composition

  • Isaac Machorro-CanoEmail author
  • Yaralitset López-Ramírez
  • Mónica Guadalupe Segura-Ozuna
  • Giner Alor-Hernández
  • Lisbeth Rodríguez-Mazahua
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 405)


Reverse engineering is a process that allows us to optimize and reuse code and applications based on a complete analysis of such code. This permits us to generate a new idea that it is based on an already existent one and it creates or improves the tool in which it is applied. In addition, UML activity diagrams are graphic representations of processes that facilitate the way in which we perceive and understand the order of execution of individual processes. It also provides visual representation of the primary subsystems that define the entire process. This work presents the application of reverse engineering to a transformation mechanism in WSCDL, which allows the generation of UML activity diagrams from WSCDL documents, and includes a case study to exemplify the functionality of this mechanism.


Reverse engineering Transformation mechanism WSCDL Activity diagrams 



The Authors wish to thank the following institutions: Program for the Teaching Professional Development (PRODEP), The National Council of Science and Technology (CONACYT) and to the National Technologic of México, for the support granted for the realization of the research.


  1. 1.
    Park, S.C., Ko, M., Chang, M.: A reverse engineering approach to generate a virtual plant model for PLC simulation. Int. J. Adv. Manuf. Technol. 69, 2459–2469 (2013). SpringerGoogle Scholar
  2. 2.
    El-Attar, M.: From misuse cases to mal-activity diagrams: bridging the gap between functional security analysis and design: Softw. Syst. Model. 13, 173–190 (2012). SpringerGoogle Scholar
  3. 3.
    Ranjitha Kumari, S., Panthi, V., Prasad Mohapatra, D., Kumar Behera, P.: Prioritizing test scenarios from UML communication and activity diagrams. Innov. Syst. Softw. Eng. 10, 165–180 (2014). SpringerGoogle Scholar
  4. 4.
    Hofstede, A., Mecella, M., Sardina S.: Special issue on: knowledge-intensive business processes. J. Data Semant. 4 (2015). SpringerGoogle Scholar
  5. 5.
    Nagamouttou, D., Egambaram, L., Krishnan, M., Narasingam, P.: A verification strategy for web services composition using enhanced stacked automata model. SpringerPlus 4, 1–13. (2015). SpringerGoogle Scholar
  6. 6.
    Alor Hernández, G., Machorro Cano, I., Gómez, J. M., Cruz Ahuactzi, J., Posada Gómez, R., Mencke, M., Juarez Martinez, U.: Mapping UML diagrams for generating WSCDL code. In: Third International Conference on Digital Society (ICDS), pp. 229–234. IEEE (2009)Google Scholar
  7. 7.
    Albert, M., Cabot J., Gómez, C., Palechano, V.: Generating operation specifications from UML class diagrams: a model transformation approach. Data Knowl. Eng. 70, 365–389 (2011). ElsevierGoogle Scholar
  8. 8.
    Fernández Sáez, AM., Genero, M., Chaudron Michel, R.V.: Empirical studies concerning the maintenance of UML diagrams and their use in the maintenance of code: a systematic mapping study. Inf. Softw. Technol. 55, 1119–1142 (2013). ElsevierGoogle Scholar
  9. 9.
    Fernández Sáez, AM., Genero, M., Chaudron Michel, R.V., Caivano, D., Ramos, I.: Are forward designed or reverse-engineered UML diagrams more helpful for code maintenance?: A family of experiments. Inf. Softw. Technol. 57, 644–663 (2014). ElsevierGoogle Scholar
  10. 10.
    Sellami, A., Hakim, H., Abran, A., Ben-Abdallah, H.: A measurement method for sizing the structure of UML sequence diagrams. Inf. Softw. Technol. 59, 222–232 (2015). ElsevierGoogle Scholar
  11. 11.
    Li, L., Li, X., He, T., Xiong, J.: Extenics-based test case generation for UML activity diagram. Proc. Comput. Sci. 17, 1186–1193 (2013). ElsevierGoogle Scholar
  12. 12.
    Vidal, C.L., López, L.P., Rivero, S.E., Meza, R.O.: Extension of UML sequence diagrams for aspect-oriented modeling. Inf. Tecnol. 24(5), 3–12 (2013)CrossRefGoogle Scholar
  13. 13.
    De Virgilio, R., Frasincar, F., Hop, W., Lachner, S.: A reverse engineering approach for automatic annotation of Web pages. Multimed. Tools Appl. 64, 119–140 (2011). SpringerGoogle Scholar
  14. 14.
    Parveen, T., Tilley, S., Allen, W., Marin, G., Ford, R.: Detecting emulated environments. Int. J. Softw. Eng. Knowl. Eng. 22(7), 927–944 (2012). World ScientificGoogle Scholar
  15. 15.
    Monroy, M.E., Arciniegas, J.L., Rodríguez, J.C.: Characterization of reverse engineering tools. Inf. Tecnol. 23(6), 31–42 (2012)CrossRefGoogle Scholar
  16. 16.
    Ristic, S., Aleksic, S., Celikovic, M., Dimitrieski, V., Lukovicm I.: Database reverse engineering based on meta-models. Central Eur. J. Comput. Sci. 4(3), 150–159 (2014). SpringerGoogle Scholar
  17. 17.
    Bustard, D., Wilkie, G., Greer, D.: Towards optimal software engineering: learning from agile practice. Innov. Syst. Softw. Eng. 9, 191–200 (2013). SpringerGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Isaac Machorro-Cano
    • 1
    Email author
  • Yaralitset López-Ramírez
    • 2
  • Mónica Guadalupe Segura-Ozuna
    • 1
  • Giner Alor-Hernández
    • 3
  • Lisbeth Rodríguez-Mazahua
    • 3
  1. 1.Universidad Del Papaloapan (UNPA)TuxtepecMexico
  2. 2.Instituto de Estudios Superiores de Oaxaca A.C.(IESO)OaxacaMexico
  3. 3.Instituto Tecnológico de Orizaba (ITO)OrizabaMexico

Personalised recommendations