Applying programmable browsing semantics within the context of the World-Wide Web
Proceedings of the thirteenth ACM conference on Hypertext and hypermedia
Designing Data-Intensive Web Applications
Designing Data-Intensive Web Applications
Designing the automatic transformation of visual languages
Science of Computer Programming - Special issue on applications of graph transformations (GRATRA 2000)
ObjectCheck: A Model Checking Tool for Executable Object-Oriented Software System Designs
FASE '02 Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering
AToM3: A Tool for Multi-formalism and Meta-modelling
FASE '02 Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering
A Formal Approach to the Generation of Visual Language Environments Supporting Multiple Views
VLHCC '05 Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing
Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series)
A model-checking approach to analysing organisational controls in a loan origination process
Proceedings of the eleventh ACM symposium on Access control models and technologies
Security analysis in role-based access control
ACM Transactions on Information and System Security (TISSEC)
Modelling hypermedia and web applications: the Ariadne Development Method
Information Systems
Towards a common metamodel for the development of web applications
ICWE'03 Proceedings of the 2003 international conference on Web engineering
Visual specifications of policies and their verification
FASE'03 Proceedings of the 6th international conference on Fundamental approaches to software engineering
Evaluating access control policies through model checking
ISC'05 Proceedings of the 8th international conference on Information Security
Model view management with triple graph transformation systems
ICGT'06 Proceedings of the Third international conference on Graph Transformations
Supporting user-oriented analysis for multi-view domain-specific visual languages
Information and Software Technology
Information and Software Technology
An automated round-trip support towards deployment assessment in component-based embedded systems
Proceedings of the 16th International ACM Sigsoft symposium on Component-based software engineering
From models to code and back: correct-by-construction code from UML and ALF
Proceedings of the 2013 International Conference on Software Engineering
Hi-index | 0.00 |
In this paper, we present a verification framework for security policies of Web designs. The framework is based on the transformation of the models that conform the system design into a formalism where further analysis can be performed. The transformation is specified as a triple graph transformation system, which in addition creates mappings between the elements in the source and target models. This allows the back-annotation of the analysis results to the original model by means of triple graphical patterns. The verification mechanisms are provided by the designer of the Web design language, together with the language specification. However, the complexities of the formalisms are hidden to the developer who uses the language. As case study, we apply these ideas to Labyrinth, a domain specific language oriented to the design of Web applications. The analysis is done by a transformation into the Petri nets formalism, and then performing model checking on the coverability graph. The framework is supported by the meta-modelling tool AToM3.