![]() ; Amrani, Moussa ![]() in Software and Systems Modeling (2014) The notion of model transformation intent is proposed to capture the purpose of a transformation. In this paper, a framework for the description of model transformation intents is defined which includes ... [more ▼] The notion of model transformation intent is proposed to capture the purpose of a transformation. In this paper, a framework for the description of model transformation intents is defined which includes, for instance, a description of properties a model transformation has to satisfy to qualify as a suitable realization of an intent. Several common model transformation intents are identified and the framework is used to describe five of them in detail. A case study from the automotive industry is used to demonstrate the usefulness of the proposed framework for identifying crucial properties of model transformations with different intents and to illustrate the wide variety of model transformation intents that an industrial model-driven software development process typically encompasses. [less ▲] Detailed reference viewed: 170 (6 UL)![]() Amrani, Moussa ![]() in Journal of Technology (2014) Detailed reference viewed: 285 (8 UL)![]() ; Zhang, Qin ![]() ![]() in Memon, Atif (Ed.) Advances in Computers (2014) Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has ... [more ▼] Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has emerged in the early 2000s as a specialized Model-Driven Engineering approach for supporting the development of security-critical systems. In this chapter we summarize the most important developments of Model-Driven Security during the past decade. In order to do so we start by building a taxonomy of the most important concepts of this domain. We then use our taxonomy to describe and evaluate a set of representative and influential Model-Driven Security approaches in the literature. In our development of this topic we concentrate on the concepts shared by Model-Driven Engineering and Model-Driven Security. This allows us to identify and debate the advantages, disadvantages and open issues when applying Model-Driven Engineering to the Information Security domain. This chapter provides a broad view of Model-Driven Security and is intended as an introduction to Model-Driven Security for students, researchers and practitioners. [less ▲] Detailed reference viewed: 422 (25 UL)![]() ; ; Amrani, Moussa ![]() in Workshop on Models And Evolution, co-located with MoDELS 2012 (2012) In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not ... [more ▼] In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not hinder the previous version. In this paper, we focus on invariant preservation of behavioral models expressed in Algebraic Petri Nets. The theory developed is applied to a Multi-Level Security File System modeled iteratively. We also discuss how this approach can be applied on Domain-Specific Languages that are translated to Algebraic Petri Nets. [less ▲] Detailed reference viewed: 105 (1 UL)![]() Amrani, Moussa ![]() in Proceedings of the First Workshop on Analysis of Model Transformations (2012) Detailed reference viewed: 94 (0 UL)![]() Amrani, Moussa ![]() in Proceedings of the First Workshop on Verification and Validation of Model Transformations (2012) Detailed reference viewed: 93 (2 UL)![]() Amrani, Moussa ![]() Report (2012) Detailed reference viewed: 58 (3 UL) |
||