automatic generate security requirements. On the
same modeling approach and similar developing of
modeling tools is possible to design other security
requirements as: Identification, Authentication and
Authorization, Trust, Privacy and so on.
Several improvements and extensions need to be
addressed in future work. Currently our approach
focuses on static design models, which are relatively
close to the implementation. It is worth considering
whether the efficiency of the development process of
secure applications can be improved by annotating
models at a higher level of abstraction (e.g. analysis)
or by annotating dynamic models. Moreover, some
critical questions concerning the development
process are still open, e.g. how are roles and
permissions identified? Beyond that, the current
prototype does not yet demonstrate the platform
independence of our concepts. Future work will
focus on modeling security requirements and design
information using dynamic models. Furthermore, the
development process for secure systems starting
with the initial analysis up to the complete secure
system design will be investigated. In this context,
we will examine the possibility of propagating
security requirements between analysis and design
models and ways to verify the compatibility of
requirements and design information given at
different levels.
REFERENCES
Xin Jin, Master Thesis, University of Ottawa, Ontario,
Canada 2006 Applying Model Driven Architecture
approach to Model Role Based Access Control System
Taufiq Rochaeli, TUD SEC, Ruben Wolf, Fraunhofer-SIT,
Policy Generator, February 10, 2006.
Jules White, Douglas Schmidt, Department of Electrical
Engineering and Computer Science, Vanderbilt
University, Nashville, USA, Simplifying the Deve-
lopment of Product-line Customization Tools via
Model Driven Development
Panos Periorellis, Jake Wu, March 2006, XACML-Role
Based Access Control
Jeremy W. Bryans, John S. Fitzgerald, Panos Periorellis,
School of Computing Science, Newcastle University,
UK, A Formal Approach to Dependable Evolution of
Access Control Policies in Dynamic Collaborations
Eduardo Fernández-Medina and Mario Piattini, Alarcos
Research Group, Universidad de Castilla-La Mancha,
Towards a Process for Web Services Security
Yuri Demchenko, Advanced Internet Research Group,
University of Amsterdam, Policy-based Access
Control to Data Ser vices in Ser vice-oriented
Architecture and Grid
GEMS EMF Intelligence Tutorial, http://wiki.eclipse.org/
GEMS_EMF_Intelligence_Tutorial
GEMS EMF Intelligence Tutorial with Mixed Constraints,
http://wiki.eclipse.org/GEMS_EMF_Intelligence_Tuto
rial_with_Mixed_Constraints
GEMS Metamodeling Tutorial,
http://wiki.eclipse.org/ GEMS_Metamodeling_Tutorial
Jules White, The Generic Eclipse Modeling System
(GEMS)
Markus Völter, openArchitectureWare 4.2 Fact Sheet,
voelter@acm.org Date: September 3, 2007
Mirad Zadic, Stockholm, Sweden, 22 - 24 October 2008,
A Meta Model Generator for Implementing Access
Control and Security Policies in Distributed Systems
based on Model-Driven Architecture, eChallenges e-
2008 Conference & Exhibition
GrTP: Transformation Based Graphical Tool Building
Platform, Institute of Mathematics and Computer
Science, University of Latvia, Building Tools by
Model Transformations in Eclipse, University of
Latvia, Audris Kalnins, Oskars Vilitis1, Edgars
Celms1
OASIS, 2005. eXtensible Access Control Markup
Language (XACML) Version 2.0. http://docs.oasis-
open.org/xacml/2.0/access_control-xacml-2.0-core-
spec-os.pdf
OASIS, 2005, Assertions and Protocols for the OASIS
Security Assertion Markup Language (SAML) V2.0.
http://docs.oasis-open.org/xacml/2.0/access_control-
xacml-2.0-saml-profile-spec-os.pdf
OASIS, 2005. Core and hierarchical role based access
control (RBAC) profile of XACML v2.0.
http://docs.oasis-open.org/xacml/2.0/access_control-
xacml-2.0-rbac-profile1-spec-os.pdf
OASIS, 2005. SAML 2.0 profile of XACML v2.0.
http://docs.oasis-open.org/xacml/2.0/access_control-
xacml-2.0-saml-profile-spec-os.pdf
OASIS, 2005. Web Service Security SAML Token Profile
1.1. http://www.oasis-open.org/specs/
index.php#wssprofilesv1.0
OASIS, 2003. XACML pr
ofile for Web-services.
http://www.oasis-
open.org/committees/download.php/3661/draft-xacml-
wspl-04.pdf
OASIS, 2004. WS-Security 1.1 Core Specification.
http://www.oasis-open.org/committees/download.php/
16790/wss-v1.1-spec-os-SOAPMessageSecurity.pdf
W3C, 2006. Web Service Policy 1.2-Framework (WS-
Policy). http://www.w3.org/Submission/WS-Policy/
ORMSC White Paper, A Proposal for an MDA
Foundation Model
Torsten Lodderstedt, David Basin, and Jürgen Doser
Institute for Computer Science, University of
Freiburg, Germany, SecureUML: A UML-Based
Modeling Language for Model-Driven Security
SECRYPT 2009 - International Conference on Security and Cryptography
36