Graph grammars with negative application conditions
Fundamenta Informaticae - Special issue on graph transformations
Specification of Graph Translators with Triple Graph Grammars
WG '94 Proceedings of the 20th International Workshop on Graph-Theoretic Concepts in Computer Science
Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series)
Attributed graph transformation with node type inheritance
Theoretical Computer Science
Integrating Security and Software Engineering: Advances and Future Vision
Integrating Security and Software Engineering: Advances and Future Vision
Security Requirements Engineering: A Framework for Representation and Analysis
IEEE Transactions on Software Engineering
Consistent integration of models based on views of visual languages
FASE'08/ETAPS'08 Proceedings of the Theory and practice of software, 11th international conference on Fundamental approaches to software engineering
Secure Systems Development with UML
Secure Systems Development with UML
Graphical definition of in-place transformations in the eclipse modeling framework
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Model transformation and induced instance migration: a universal framework
SBMF'11 Proceedings of the 14th Brazilian conference on Formal Methods: foundations and Applications
Transformation of Typed Composite Graphs with Inheritance and Containment Structures
Fundamenta Informaticae - Recent Developments in the Theory of Graph Transformation, 2010
Reusable graph transformation templates
AGTIVE'11 Proceedings of the 4th international conference on Applications of Graph Transformations with Industrial Relevance
Co-transformation of graphs and type graphs with application to model co-evolution
ICGT'12 Proceedings of the 6th international conference on Graph Transformations
Genericity for model management operations
Software and Systems Modeling (SoSyM)
Customizing model migrations by rule schemes
Proceedings of the 2013 International Workshop on Principles of Software Evolution
Hi-index | 0.00 |
E-government services usually process large amounts of confidential data. Therefore, security requirements for the communication between components have to be adhered in a strict way. Hence, it is of main interest that developers can analyze their modularized models of actual systems and that they can detect critical patterns. For this purpose, we present a general and formal framework for critical pattern detection and user-driven correction as well as possibilities for automatic analysis and verification at meta-model level. The technique is based on the formal theory of graph transformation, which we extend to transformations of type graphs with inheritance within a type graph hierarchy. We apply the framework to specify relevant security requirements. The extended theory is shown to fulfil the conditions of a weak adhesive HLR category allowing us to transfer analysis techniques and results shown for this abstract framework of graph transformation. In particular, we discuss how confluence analysis and parallelization can be used to enable parallel critical pattern detection and elimination.