Nothing Special   »   [go: up one dir, main page]

Skip to main content

Towards a MOF/QVT-Based Domain Architecture for Model Driven Security

  • Conference paper
Model Driven Engineering Languages and Systems (MODELS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4199))

Abstract

The Sectet-framework realizes an extensible domain architecture for the collaborative development and management of security-critical, inter-organizational workflows. Models integrate security requirements at the abstract level and are rendered in a visual language based on UML 2.0. The models form the input for a chain of integrated tools that transform them into artefacts configuring security components of a Web services-based architecture. Based on findings of various projects, this contribution has three objectives. First, we detail the MOF based metamodels defining a domain specific language for the design of inter-organizational workflows. The language supports various categories of security patterns. We then specify model-to-model transformations based on the MDA standard MOF-QVT. The mappings translate platform independent models into platform specific artefacts targeting the reference architecture. Third, we exemplarily show how model-to-code transformation could be implemented with an MDA-framework like openArchitectureWare.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Mukerji, I., Miller, J.: Overview and guide to OMG’s architecture (2003)

    Google Scholar 

  2. Newcomer, E., Lomow, G.: Understanding Service-Oriented Architecture (SOA) with Web Services. Addison Wesley, Reading (2005)

    Google Scholar 

  3. Weerawarana, S., et al.: Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More. Prentice Hall PTR, Englewood Cliffs (2005)

    Google Scholar 

  4. Aalst, W.M.P.v.d.: Formalization and Verification of Event-driven Process Chains. Information and Software Technology 41, 639–650 (1999)

    Article  Google Scholar 

  5. Clark, J.: XSL Transformations (XSLT) Version 1.0, World Wide Web Consortium, W3C Recommendation November 16 (1999)

    Google Scholar 

  6. OMG, MOF QVT Final Adopted Specification (2005)

    Google Scholar 

  7. A. X12, ASC X12 Reference Model for XML Design, ANSI ASC X12C Communications and Controls Subcommittee, Technical Report Type II - ASC X12C/TG3/2002 (July 2002)

    Google Scholar 

  8. Godik, S., Moses, T.: eXtensible Access Control Markup Language (XACML) Version 1.0 3 (2003)

    Google Scholar 

  9. Anderson, A.: XACML Profile for Role Based Access Control (RBAC), OASIS (2004)

    Google Scholar 

  10. Harmon, P.: The OMG’s Model Driven Architecture and BPM, Business Process Trends, Newsletter (May 2004), http://www.bptrends.com/publicationfiles/05-04NLMDAandBPM.pdf

  11. Atluri, V., Huang, W.K.: Enforcing Mandatory and Discretionary Security in Workflow Management Systems. In: Proceedings of the 5th European Symposium on Research in Computer Security (1996)

    Google Scholar 

  12. Gudes, E., Olivier, M., Riet, R.v.d.: Modelling, Specifying and Implementing Workflow Security in Cyberspace. Journal of Computer Security 7(4), 287–315 (1999)

    Google Scholar 

  13. Huang, W.K., Atluri, V.: SecureFlow: A secure Web-enabled Workflow Management System. In: ACM Workshop on Role-Based Access Control 1999, pp. 83–94 (1999)

    Google Scholar 

  14. Wainer, J., Barthelmess, P., Kumar, A.: W-RBAC A Workflow Security Model Incorporating Controlled Overriding of Constraints. International Journal of Cooperative Information Systems 12(4), 455–485 (2003)

    Article  Google Scholar 

  15. Hall, A., Chapman, R.: Correctness by Construction: Developing a Commercial Secure System. IEEE Software 19 (2002)

    Google Scholar 

  16. Schumacher, M.: Security Engineering with Patterns. In: Origins, Theoretical Models, and New Applications, Springer, Berlin (2003)

    Google Scholar 

  17. Lodderstedt, T., Basin, D., Doser, J.: SecureUML: A UML-Based Modeling Language for Model-Driven Security. In: 5th International Conference on the Unified Modeling Language (2002)

    Google Scholar 

  18. Jürjens, J.: Secure Systems Development with UML. Springer Academic Publishers, Hardcover (2004)

    Google Scholar 

  19. Mantell, K.: From UML to BPEL, IBM-developerWorks (2003)

    Google Scholar 

  20. IBM, Business Process Execution Language for Web Services JavaTM Run Time (BPWS4J), IBM (2002), http://www.alphaworks.ibm.com/tech/bpws4j

  21. Jablonski, S., Bussler, C.: Workflow Management: Concepts, Architecture and Implementation: Int. Thompson Publishers (1996)

    Google Scholar 

  22. Edmond, D., Hofstede, A.H.M.t.: A Reflective Infrastructure for Workflow Adaptability. Data and Knowledge Engineering 34, 271–304 (2000)

    Article  MATH  Google Scholar 

  23. Eder, J., Gruber, W.: A Meta Model for Structured Workflows Supporting Workflow Transformations. In: Manolopoulos, Y., Návrat, P. (eds.) ADBIS 2002. LNCS, vol. 2435, Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  24. Müller, R.: Event-Oriented Dynamic Adaptation of Workflows, University of Leipzig, Germany (2002)

    Google Scholar 

  25. Hafner, M., Weber, B., Breu, R.: Model Driven Security for Inter-Organizational Workflows in E-Government. In: Mitrakas, A., Hengeveld, P., Polemi, D., Gamper, J. (eds.) Secure E-Government Web Services, Idea Group Inc., USA (2006)

    Google Scholar 

  26. Schumacher, M., Fernandez-Buglioni, E., Hybertson, D., Buschmann, F., Sommerlad, P.: Security Patterns. Integrating Security and Systems Engineering. John Wiley and Sons Ltd, Chichester (2006)

    Google Scholar 

  27. Hafner, M., Breu, R., Agreiter, B., Nowak, A.: Sectet – An Extensible Framework for the Realization of Secure Inter-Organizational Workflows. In: Fourth International Workshop on Security in Information System (WOSIS 2006), Paphos, Cyprus (2006)

    Google Scholar 

  28. Hafner, M., Breu, R., Weber, B.: Model Driven Security for Inter-Organizational Workflows in E-Governement. Idea Group, Inc., USA (to appear, 2006)

    Google Scholar 

  29. Hafner, M., Breu, R., Breu, M., Nowak, A.: Modeling Inter-organizational Workflow Security in a Peer-to-Peer Environment. In: Proceedings of ICWS (2005)

    Google Scholar 

  30. Alam, M., Breu, R., Hafner, M.: Modeling permissions in a (U/X)ML world. In: ARES (accepted, 2006)

    Google Scholar 

  31. Alam, M., Breu, R., Breu, M.: Model Driven Security for Web Services (MDS4WS). In: INMIC 2004 IEEE 8th International Multi topic Conference. Digital Object Identifier 10.1109/INMIC.2004.1492930, pp. 498–505 (2004)

    Google Scholar 

  32. Hofstede, A.H.M.t., Dumas, M.: UML Activity Diagrams as a Workflow Specification Language. In: Gogolla, M., Kobryn, C. (eds.) UML 2001. LNCS, vol. 2185, Springer, Heidelberg (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Hafner, M., Alam, M., Breu, R. (2006). Towards a MOF/QVT-Based Domain Architecture for Model Driven Security. In: Nierstrasz, O., Whittle, J., Harel, D., Reggio, G. (eds) Model Driven Engineering Languages and Systems. MODELS 2006. Lecture Notes in Computer Science, vol 4199. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11880240_20

Download citation

  • DOI: https://doi.org/10.1007/11880240_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45772-5

  • Online ISBN: 978-3-540-45773-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics