Title :
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
Author :
Linington, Peter F. ; Liyanagama, Pulitha
Author_Institution :
Univ. of Kent, Canterbury
Abstract :
There has, in recent years, been growing interest in model driven engineering (MDE), in which models are the primary design artifacts and transformations are applied to these models to generate refinements leading to usable implementations over specific platforms. There is also interest in factoring out a number of non-functional aspects, such as security, to provide reusable solutions applicable to a number of different applications. This paper brings these two approaches together, investigating, in particular, the way behaviour from the different sources can be combined and integrated into a single design model. Doing so involves transformations that weave together the constraints from the various aspects and are, as a result, more complex to specify than the linear pipelines of transformations used in most MDE work to date. The approach taken here involves using an aspect model as a template for refining particular patterns in the business model, and the transformations are expressed as graph rewriting rules for both static and behaviour elements of the models.
Keywords :
business data processing; rewriting systems; security of data; aspect model; business model; graph rewriting rule; model driven engineering; security behaviour; Computer integrated manufacturing; Distributed computing; Engineering management; Information security; Labeling; Laboratories; Logic; Model driven engineering; Pipelines; Weaving;
Conference_Titel :
Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th IEEE International
Conference_Location :
Annapolis, MD
Print_ISBN :
978-0-7695-2891-5
DOI :
10.1109/EDOC.2007.16