Access control models

M Penelova - Cybernetics and Information Technologies, 2021 - sciendo.com
Access control is a part of the security of information technologies. Access control regulates
the access requests to system resources. The access control logic is formalized in models …

[HTML][HTML] A domain-specific language for the specification of UCON policies

AMR Quintero, SM Pérez, ÁJ Varela-Vaca… - Journal of information …, 2022 - Elsevier
Security policies constrain the behavior of all users of an information system. In any non-
trivial system, these security policies go beyond simple access control rules and must cover …

The MONDO collaboration framework: secure collaborative modeling over existing version control systems

C Debreceni, G Bergmann, M Búr, I Ráth… - Proceedings of the 2017 …, 2017 - dl.acm.org
Model-based systems engineering of critical cyber-physical systems necessitates effective
collaboration between different stakeholders while still providing secure protection of …

Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations

C Debreceni, G Bergmann, I Ráth, D Varró - Software & Systems Modeling, 2019 - Springer
Large-scale model-driven system engineering projects are carried out collaboratively.
Engineering artefacts stored in model repositories are developed in either offline (checkout …

Model-driven run-time enforcement of complex role-based access control policies

A Ben Fadhel, D Bianculli, LC Briand - Proceedings of the 33rd ACM …, 2018 - dl.acm.org
A Role-based Access Control (RBAC) mechanism prevents unauthorized users to perform
an operation, according to authorization policies which are defined on the user's role within …

On the need for intellectual property protection in model-driven co-engineering processes

S Martínez, S Gerard, J Cabot - … , EMMSAD 2019, Held at CAiSE 2019 …, 2019 - Springer
We live in an increasingly complex world where all systems tend to include heterogeneous
and interconnected components. To cope with these systems, industry is shifting towards co …

Automatic generation of security compliant (virtual) model views

S Martínez, A Fouche, S Gérard, J Cabot - … , ER 2018, Xi'an, China, October …, 2018 - Springer
The increased adoption of model-driven engineering in collaborative development
scenarios raises new security concerns such as confidentiality and integrity. In a …

User-centered performance engineering of declarative model transformations

RG Groner - 2024 - oparu.uni-ulm.de
The software to be developed is becoming increasingly extensive and complex, which can
lead to classic development methods reaching their limits. Model-driven software …

Comprehensive Specification and Efficient Enforcement of Role-based Access Control Policies using a Model-driven Approach

A Ben Fadhel - 2017 - orbilu.uni.lu
Prohibiting unauthorized access to critical resources and data has become a major
requirement for enterprises. Access control (AC) mechanisms manage requests from users …

Advanced techniques and tools for secure collaborative modeling

C Debreceni - 2019 - search.proquest.com
The advance of information technology allows the engineers to build even more complex
systems. However, numerous challenges have arisen due to the increasing level of …