Metamodelling with Formal Semantics with Application to Access Control Specification

Jamal Abd-Ali, Karim El Guemhioui, Luigi Logrippo

2015

Abstract

The visual aspect of metamodelling languages is an efficient lever to deal with the complexity of specifying systems. In many application domains, these systems are generally characterized by the sensitivity and criticality of their contents, hence precision and formalism are essential goals. This paper considers the domain of access control specification languages and proposes a metamodelling paradigm with capabilities for specifying both semantics and structuring elements. We describe how to specify semantics of domain specific systems at the metamodel and model levels. The paradigm defines reusable rules allowing mapping the models, including their semantics, to first order logic programs. It represents a methodical approach to elaborate domain specific languages endowed with visual aspects and means of reasoning on formal specifications. The paradigm is applicable to a wide range of systems. We show in this paper its application in the area of decision systems.

References

  1. Barker, S. (2012) Logical Approaches to Authorization Policies. In: Artikis, A., Craven, R., Çiçekli, N. K., Sadighi, B., Stathis, K.(eds.) Logic Programs, Norms and Action. LNCS, vol. 7360, pp. 349-373. Berlin Heidelberg: Springer.
  2. Barker, S. (2009) The next 700 access control models or a unifying meta-model?. In: Proceedings of 14th ACM Symposium on Access Control Models and Technologies (SACMAT'09). pp. 187-196.
  3. Basin, D., Doser, J., Lodderstedt, T. (2006) Model driven security: From UML models to access control infrastructures. ACM Transactions on Software Engineering and Methodology. Vol.15, pt. 1, pp. 39- 91.
  4. Becker, M. Y., Fournet, C. & Gordon, A. D. (2007) Design and semantics of a decentralized authorization language. In: CSF. pp. 3-15.
  5. Bell, D. & LaPadula, L. (1976) Secure Computer Systems: Unified Exposition and Multics Interpretation. Mitre Corporation: Bedford, MA. (March 1976).
  6. Biba, K. (1977) Integrity Considerartions for Secure Compouter Systems. The Mitre Corporation. (April 1977).
  7. Brewer, D. F.C & Nash, M. J. (1989) The Chinese Wall security policy. In: Security and Privacy 1989, Oakland, CA. pp. 206-214.
  8. Damianou, N., Dulay, N., Lupu, E. & Sloman, M. (2001) The Ponder specification language. In: Workshop on Policies for Distributed Systems and Networks, Jan 2001.
  9. Doan, T., Demurjian, S., Ting, T.C. & Ketterl, A. (2004) MAC and UML for secure software design. In: Proceedings of 2004 ACM workshop on Formal methods in security engineering (FMSE'04) 2004. pp. 75-85.
  10. Epstein, P. & Sandhu, R. 1999 Towards a UML based approach to role engineering. In: Proceedings of 4th ACM workshop on Role-based Access Control (RBAC'99) 1999. pp. 135-143.
  11. Gelfond, M. & Lobo, J. (2008) Authorization and Obligation Policies in Dynamic Systems. In: Garcia de la Banda, M., Pontelli, E. eds. ICLP 2008. LNCS, vol. 5366, pp. 22-36. Heidelberg: Springer.
  12. Graven, R., Lobo, J., Ma, J., Russo, A., Lupu, E.C. & Bandara, A.K. (2009) Expressive policy analysis with enhanced system dynamicity. In: ASIACCS proceedings of the 4th international Symposium on Information Computer, and Commuication Security 2009. pp. 239-250. New York: ACM.
  13. Jajodia, S., Samarati, P., Sapino, M. & Subrahmaninan, V. (2001) Flexible support for multiple access control policies. Vol. 26, pt.2, pp.214-260 ACM TODS.
  14. Jurjens, J. (2001) Towards development of secure systems using UMLsec. In: Hussmann, H. (eds.) Proceedings of 4th International Conference on Fundamental Approaches to Software Engineering (FASE/ ETAPS'01) 2001. volume of LNCS, vol. 2029, pp.187- 200. Heidelberg: Spring.
  15. Kleppe, A., Warmer, J. & Bast, W. (2002). MDA Explained, The Model Driven Architecture: Practice And Promise. Addison-Wesley.
  16. OASIS (2013) eXtensible Access Control Markup Language XACML version 3.0. OASIS standard.
  17. Object Management Group, (2010) Unified Modeling Language, version 2.3. OMG Document Number: formal/2010-05-03.
  18. Pavlich-Mariscal, J., Demurjian, S. & Michel, L. (2010) A framework of composable access control features: Preserving separation of access control concerns from models to code. Computers & Security. Vol. 29, pt.3, pp.50-379.
  19. Sandhu, R., Coyne, E., Feinstein, H. & Youman, C. (1996) Role-based access control models. Computer. Vol. 29, pt.2, pp.38-47.
  20. Shin, M., &Ahn, G. (2000) UML-based representation of role-based access control. In: Proceedings of 9th IEEE International Workshops on Enabling Technologies (WETICE'00) (2000). pp. 195-200.
  21. Slimani, N., Khambhammettu, H., Adi, K. & Logrippo, L. (2011) UACML: Unified Access Control Modeling Language. In: New Technologies, Mobility and Security (NTMS), 2011 4th IFIP International Conference. pp. 1-8. Paris: IEEE press.
Download


Paper Citation


in Harvard Style

Abd-Ali J., El Guemhioui K. and Logrippo L. (2015). Metamodelling with Formal Semantics with Application to Access Control Specification . In Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD, ISBN 978-989-758-083-3, pages 354-362. DOI: 10.5220/0005272903540362


in Bibtex Style

@conference{modelsward15,
author={Jamal Abd-Ali and Karim El Guemhioui and Luigi Logrippo},
title={Metamodelling with Formal Semantics with Application to Access Control Specification},
booktitle={Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD,},
year={2015},
pages={354-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005272903540362},
isbn={978-989-758-083-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Model-Driven Engineering and Software Development - Volume 1: MODELSWARD,
TI - Metamodelling with Formal Semantics with Application to Access Control Specification
SN - 978-989-758-083-3
AU - Abd-Ali J.
AU - El Guemhioui K.
AU - Logrippo L.
PY - 2015
SP - 354
EP - 362
DO - 10.5220/0005272903540362