Authors:
Mirad Zadic
and
Andrea Nowak
Affiliation:
Austrian Research Centers GmbH-ARC, Austria
Keyword(s):
Model Driven Development, Graphical modeling environment, Security policies Architectures, Access Control Policy, Business Processes, XACM Policy Generator.
Related
Ontology
Subjects/Areas/Topics:
Access Control
;
Data Engineering
;
Databases and Data Security
;
Enterprise Information Systems
;
Formal Methods
;
Identification, Authentication and Non-Repudiation
;
Information and Systems Security
;
Information Assurance
;
Information Systems Analysis and Specification
;
Internet Technology
;
Methodologies and Technologies
;
Operational Research
;
Organizational Security Policies
;
Security
;
Simulation and Modeling
;
Web Information Systems and Technologies
Abstract:
Our approach is based on a security modeling framework and a Meta Modeling Environment for design and generating of access control and security policies for business processes. The framework introduces a methodology that focuses on both, the modeling as well as the implementation aspect of security-requirements and consists of a suite of tools that facilitates the correct realization and the cost-efficient management of decentralized, security-critical workflows. Currently, the framework is being analyzed for general suitability to domains in business processes, taking basic security requirements like confidentiality, integrity and non-repudiation. We use Model-Driven Development (MDD) approach to creating our solutions based on graphical modeling environment as EMF (Eclipse Modeling Framework), GEF (Graphical Editor Framework) and GEMS (Generic Eclipse Modeling System). This graphical modeling environment makes possible rapidly creating modeling tool from a visual language descripti
on or metamodel without any coding in third-generation languages. The framework is prototypically validated through a case study for the systematic realization of e-government related workflows. Realizations of security issues follow the steps from provide methodologies that translate the abstract security requirements into run-time artifacts for the target architecture through model transformation. On this approach for this Case study is develop a Policy Specifications modeling tool based on the metamodel describing syntax of the DSML. The important goal is the automatically generate the security artifacts (enforceable security policies in XACML format) to improve the productivity of the development process and the platform independent design. Our case study defines the Business processes, which provide secure Information between three Domains: Municipality, Environment Ministry and Registry of the Combustion plant - environmental pollution producer.
(More)