pdfreaders.org

A Model Transformation Semantics and Analysis Methodology for SecureUML

by Achim D. Brucker, Jürgen Doser, and Burkhart Wolff

Cover for brucker.ea:transformation:2006.SecureUML is a security modeling language for formalizing access control requirements in a declarative way. It is equipped with a UML notation in terms of a UML profile, and can be combined with arbitrary design modeling languages. We present a semantics for SecureUML in terms of a model transformation to standard UML/OCL. The transformation scheme is used as part of an implementation of a tool chain ranging from front-end visual modeling tools over code-generators to the interactive theorem proving environment holocl. The methodological consequences for an analysis of the generated OCL formulae are discussed.

Keywords: security, SecureUML, UML, OCL, HOL-OCL, model-transformation
Categories: , ,
Documents: (full text as PDF file) (Extended Version)

QR Code for brucker.ea:transformation:2006.Please cite this article as follows:
Achim D. Brucker, Jürgen Doser, and Burkhart Wolff. A Model Transformation Semantics and Analysis Methodology for SecureUML. In MoDELS 2006: Model Driven Engineering Languages and Systems. Lecture Notes in Computer Science (4199), pages 306-320, Springer-Verlag, 2006. An extended version of this paper is available as ETH Technical Report, no. 524.
Keywords: security, SecureUML, UML, OCL, HOL-OCL, model-transformation
(full text as PDF file) (Extended Version) (BibTeX) (Endnote) (RIS) (Word) (doi:10.1007/11880240_22) (Share article on LinkedIn. Share article on CiteULike. )

BibTeX
@InCollection{ brucker.ea:transformation:2006,
abstract = {SecureUML is a security modeling language for formalizing access control requirements in a declarative way. It is equipped with a \UML notation in terms of a \UML profile, and can be combined with arbitrary design modeling languages. We present a semantics for SecureUML in terms of a model transformation to standard UML/OCL. The transformation scheme is used as part of an implementation of a tool chain ranging from front-end visual modeling tools over code-generators to the interactive theorem proving environment \holocl. The methodological consequences for an analysis of the generated \OCL formulae are discussed.},
address = {Heidelberg},
author = {Achim D. Brucker and J\"urgen Doser and Burkhart Wolff},
booktitle = {{MoDELS} 2006: Model Driven Engineering Languages and Systems},
doi = {10.1007/11880240_22},
editor = {Oscar Nierstrasz and Jon Whittle and David Harel and Gianna Reggio},
file = {https://www.brucker.ch/bibliography/download/2006/brucker.ea-transformation-2006-b.pdf},
filelabel = {Extended Version},
keywords = {security, SecureUML, UML, OCL, HOL-OCL, model-transformation},
language = {USenglish},
location = {Genova},
note = {An extended version of this paper is available as ETH Technical Report, no. 524.},
number = {4199},
pages = {306--320},
pdf = {https://www.brucker.ch/bibliography/download/2006/brucker.ea-transformation-2006.pdf},
project = {CSFMDOS},
publisher = {Springer-Verlag},
series = {Lecture Notes in Computer Science},
talk = {talk:brucker.ea:transformation:2006},
title = {A Model Transformation Semantics and Analysis Methodology for {SecureUML}},
url = {https://www.brucker.ch/bibliography/abstract/brucker.ea-transformation-2006},
year = {2006},
}