A Relational Approach to Defining Transformations in a Metamodel
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Specification of Graph Translators with Triple Graph Grammars
WG '94 Proceedings of the 20th International Workshop on Graph-Theoretic Concepts in Computer Science
Model driven security: From UML models to access control infrastructures
ACM Transactions on Software Engineering and Methodology (TOSEM)
The Description Logic Handbook
The Description Logic Handbook
Automated analysis of security-design models
Information and Software Technology
From Access Control Policies to an Aspect-Based Infrastructure: A Metamodel-Based Approach
Models in Software Engineering
Reasoning on UML class diagrams
Artificial Intelligence
A transformation contract to generate aspects from access control policies
Software and Systems Modeling (SoSyM)
Model transformations? transformation models!
MoDELS'06 Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems
Verification of ATL transformations using transformation models and model finders
ICFEM'12 Proceedings of the 14th international conference on Formal Engineering Methods: formal methods and software engineering
Hi-index | 0.00 |
Model transformations are first-class artifacts in a model-driven development process. As such, their verification and validation is an important task. We have been developing a technique to specify, verify, validate and implement model transformations. Our technique is based on the concept of transformation contracts, a specification that relates two modeling languages and declares properties that must be fulfilled in such a relation. A transformation contract is essentially a transformation model that allows for the verification and validation of a model transformation using the same techniques one uses to verify and validate any given model. This paper describes our technique, discusses consistency of model transformations and reports on its application to a model transformation from access control models to Java security.