Role-Based Access Control Models
Computer
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Requirements engineering: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Designing enterprise applications with the J2EE platform
Designing enterprise applications with the J2EE platform
A Visualization of OCL Using Collaborations
«UML» '01 Proceedings of the 4th International Conference on The Unified Modeling Language, Modeling Languages, Concepts, and Tools
SecureUML: A UML-Based Modeling Language for Model-Driven Security
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Manageable access control for CORBA
Journal of Computer Security - Special issue on ESORICS 2000
An MDA-Based Approach for Behaviour Modelling of Context-Aware Mobile Applications
ECMDA-FA '09 Proceedings of the 5th European Conference on Model Driven Architecture - Foundations and Applications
Defining and transforming security rules in an MDA approach for DWs
International Journal of Business Intelligence and Data Mining
Data & Knowledge Engineering
Modeling process-related RBAC models with extended UML activity models
Information and Software Technology
Extending UML to model Web 2.0-based context-aware applications
Software—Practice & Experience
Using a functional size measurement procedure to evaluate the quality of models in MDD environments
ACM Transactions on Software Engineering and Methodology (TOSEM) - In memoriam, fault detection and localization, formal methods, modeling and design
MDA-based visual modeling approach for resources link relationships using UML profile
Computer Standards & Interfaces
Hi-index | 0.00 |
We present a Model Driven Development (MDD) approach to the development of access control policies for distributed systems. The models are expressed as Meta-Object Facility (MOF) models enriched by Unified Modeling Language (UML) profiles. The view-based access control model is used as an example, for which we present a platform independent meta-model and platform specific meta-models for the Java 2 Platform, Enterprise Edition (J2EE). A management application is used to build instance models for the platform independent and platform specific meta-models, respectively. We present in this paper how the platform independent models can be used to generate the platform specific models, and how the meta-models can be used to generate the models for the specific application. Finally, the platform specific models are used to generate the security policy to be deployed in the security infrastructure. We show how consistence requirements can be verified formally by using category-based graph transformations.