Access control models
M Penelova - Cybernetics and Information Technologies, 2021 - sciendo.com
Access control is a part of the security of information technologies. Access control regulates
the access requests to system resources. The access control logic is formalized in models …
the access requests to system resources. The access control logic is formalized in models …
[HTML][HTML] A domain-specific language for the specification of UCON policies
AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …
trivial system, these security policies go beyond simple access control rules and must cover …
The MONDO collaboration framework: secure collaborative modeling over existing version control systems
Model-based systems engineering of critical cyber-physical systems necessitates effective
collaboration between different stakeholders while still providing secure protection of …
collaboration between different stakeholders while still providing secure protection of …
Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations
Large-scale model-driven system engineering projects are carried out collaboratively.
Engineering artefacts stored in model repositories are developed in either offline (checkout …
Engineering artefacts stored in model repositories are developed in either offline (checkout …
Model-driven run-time enforcement of complex role-based access control policies
A Ben Fadhel, D Bianculli, LC Briand - Proceedings of the 33rd ACM …, 2018 - dl.acm.org
A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform
an operation, according to authorization policies which are defined on the user's role within …
an operation, according to authorization policies which are defined on the user's role within …
On the need for intellectual property protection in model-driven co-engineering processes
S Martínez, S Gerard, J Cabot - … , EMMSAD 2019, Held at CAiSE 2019 …, 2019 - Springer
We live in an increasingly complex world where all systems tend to include heterogeneous
and interconnected components. To cope with these systems, industry is shifting towards co …
and interconnected components. To cope with these systems, industry is shifting towards co …
Automatic generation of security compliant (virtual) model views
S Martínez, A Fouche, S Gérard, J Cabot - … , ER 2018, Xi'an, China, October …, 2018 - Springer
The increased adoption of model-driven engineering in collaborative development
scenarios raises new security concerns such as confidentiality and integrity. In a …
scenarios raises new security concerns such as confidentiality and integrity. In a …
User-centered performance engineering of declarative model transformations
RG Groner - 2024 - oparu.uni-ulm.de
The software to be developed is becoming increasingly extensive and complex, which can
lead to classic development methods reaching their limits. Model-driven software …
lead to classic development methods reaching their limits. Model-driven software …
Comprehensive Specification and Efficient Enforcement of Role-based Access Control Policies using a Model-driven Approach
A Ben Fadhel - 2017 - orbilu.uni.lu
Prohibiting unauthorized access to critical resources and data has become a major
requirement for enterprises. Access control (AC) mechanisms manage requests from users …
requirement for enterprises. Access control (AC) mechanisms manage requests from users …
Advanced techniques and tools for secure collaborative modeling
C Debreceni - 2019 - search.proquest.com
The advance of information technology allows the engineers to build even more complex
systems. However, numerous challenges have arisen due to the increasing level of …
systems. However, numerous challenges have arisen due to the increasing level of …