DocumentCode :
2124905
Title :
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
Author :
Linington, Peter F. ; Liyanagama, Pulitha
Author_Institution :
Univ. of Kent, Canterbury
fYear :
2007
fDate :
15-19 Oct. 2007
Firstpage :
405
Lastpage :
405
Abstract :
There has, in recent years, been growing interest in model driven engineering (MDE), in which models are the primary design artifacts and transformations are applied to these models to generate refinements leading to usable implementations over specific platforms. There is also interest in factoring out a number of non-functional aspects, such as security, to provide reusable solutions applicable to a number of different applications. This paper brings these two approaches together, investigating, in particular, the way behaviour from the different sources can be combined and integrated into a single design model. Doing so involves transformations that weave together the constraints from the various aspects and are, as a result, more complex to specify than the linear pipelines of transformations used in most MDE work to date. The approach taken here involves using an aspect model as a template for refining particular patterns in the business model, and the transformations are expressed as graph rewriting rules for both static and behaviour elements of the models.
Keywords :
business data processing; rewriting systems; security of data; aspect model; business model; graph rewriting rule; model driven engineering; security behaviour; Computer integrated manufacturing; Distributed computing; Engineering management; Information security; Labeling; Laboratories; Logic; Model driven engineering; Pipelines; Weaving;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Enterprise Distributed Object Computing Conference, 2007. EDOC 2007. 11th IEEE International
Conference_Location :
Annapolis, MD
ISSN :
1541-7719
Print_ISBN :
978-0-7695-2891-5
Type :
conf
DOI :
10.1109/EDOC.2007.16
Filename :
4384010
Link To Document :
بازگشت