![]() Amrani, Moussa ![]() in Journal of Technology (2014) Detailed reference viewed: 285 (8 UL)![]() ; Zhang, Qin ![]() ![]() in Memon, Atif (Ed.) Advances in Computers (2014) Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has ... [more ▼] Sound methodologies for constructing security-critical systems are extremely important in order to confront the increasingly varied security threats. As a response to this need, Model-Driven Security has emerged in the early 2000s as a specialized Model-Driven Engineering approach for supporting the development of security-critical systems. In this chapter we summarize the most important developments of Model-Driven Security during the past decade. In order to do so we start by building a taxonomy of the most important concepts of this domain. We then use our taxonomy to describe and evaluate a set of representative and influential Model-Driven Security approaches in the literature. In our development of this topic we concentrate on the concepts shared by Model-Driven Engineering and Model-Driven Security. This allows us to identify and debate the advantages, disadvantages and open issues when applying Model-Driven Engineering to the Information Security domain. This chapter provides a broad view of Model-Driven Security and is intended as an introduction to Model-Driven Security for students, researchers and practitioners. [less ▲] Detailed reference viewed: 422 (25 UL)![]() Amrani, Moussa ![]() in Proceedings of the First Workshop on Verification and Validation of Model Transformations (2012) Detailed reference viewed: 93 (2 UL)![]() Amrani, Moussa ![]() Report (2012) Detailed reference viewed: 58 (3 UL)![]() ; ; Amrani, Moussa ![]() in Workshop on Models And Evolution, co-located with MoDELS 2012 (2012) In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not ... [more ▼] In a Model-Driven Development project, models are typically built iteratively to better satisfy a set of requirements. Therefore it is crucial to guarantee that one iteration of a model evolution does not hinder the previous version. In this paper, we focus on invariant preservation of behavioral models expressed in Algebraic Petri Nets. The theory developed is applied to a Multi-Level Security File System modeled iteratively. We also discuss how this approach can be applied on Domain-Specific Languages that are translated to Algebraic Petri Nets. [less ▲] Detailed reference viewed: 105 (1 UL) |
||