ifications in order to provide a filter that will grant or
deny the executionof actions. In (Milhau et al., 2010)
we present systematic translation rules from the ASTD
notation to Event-B (Abrial, 2010). We are currently
working on a translation of such Event-B access con-
trol policy specifications into Business Process Ex-
ecution Language (BPEL) that can be enforced in a
service oriented architecture (SOA) system (Embe Ji-
ague et al., 2011). As future work we plan to provide
tools in order to model and verify ASTD specifications
and implement thealgorithms of (Milhauet al., 2010).
ACKNOWLEDGEMENTS
This research is funded by ANR (France) as part
of the SELKIS project (ANR-08-SEGI-018) and by
NSERC (Canada).
REFERENCES
Abrial, J.-R. (2010). Modeling in Event-B. Cambridge Uni-
versity Press.
ANSI (2004). American national standard for information
technology – role based access control. ANSI INCITS
359–2004.
Basin, D., Burri, S. J., and Karjoth, G. (2010). Dynamic
enforcement of abstract separation of duty constraints.
In Computer Security – ESORICS 2009, LNCS. vol.
5789, pp. 250–267, Springer, Berlin Heidelberg.
Basin, D., Doser, J., and Lodderstedt, T. (2006). Model
driven security: From UML models to access control
infrastructures. ACM TOSEM, 15(1):39–91.
Basin, D. A., Clavel, M., Doser, J., and Egea, M. (2009).
Automated analysis of security-design models. Infor-
mation & Software Technology, 51(5):815–831.
Embe Jiague, M., Frappier, M., Gervais, F., Konopacki,
P., Milhau, J., Laleau, R., and St-Denis, R. (2010).
Model-driven engineering of functional security poli-
cies. In INSTICC Press, volume Information Systems
Analysis and Specification, pages 374–379, Funchal,
Madeira.
Embe Jiague, M., Frappier, M., Gervais, F., Laleau, R., and
St-Denis, R. (2011). From ASTD access control poli-
cies to WS-BPEL processes deployed in a SOA envi-
ronment. In Chiu, D. K. W. and al., editors, WISS 2010
Workshops, LNCS. vol. 6724, pp. 126–141, Springer,
Berlin Heidelberg.
Evans, N., Treharne, H., Laleau, R., and Frappier, M.
(2008). Applying CSP - B to information systems.
Software and System Modeling, 7(1):85–102.
Ferraiolo, D. F., Kuhn, D. R., and Chandramouli, R. (2003).
Role-Based Access Control. Artech House, Inc., Nor-
wood, MA, USA.
Fraikin, B., Frappier, M., and Laleau, R. (2005). State-
based versus event-based specifications for informa-
tion system specification: a comparison of B and EB
3
.
Software and Systems Modeling, 4(3):236–257.
Frappier, M., Fraikin, B., Chossart, R., Chane-Yack-Fa, R.,
and Ouenzar, M. (2010). Comparison of model check-
ing tools for information systems. In Dong, J. and
Zhu, H., editors, Formal Methods and Software En-
gineering, LNCS. vol. 6447, pp. 581–596, Springer,
Berlin Heidelberg.
Frappier, M., Gervais, F., Laleau, R., Fraikin, B., and St-
Denis, R. (2008). Extending statecharts with process
algebra operators. Innovations in Systems and Soft-
ware Engineering, 4(3):285–292.
Frappier, M. and St-Denis, R. (2003). EB
3
: an entity-based
black-box specification method for information sys-
tems. Software and Systems Modeling, 2(2):134–149.
Holzmann, G. J. (2004). The Spin Model Checker: Primer
and Reference Manual. Addison-Wesley.
Jackson, D. (2006). Software Abstractions. MIT Press.
Kallel, S., Charfi, A., Mezini, M., Jmaiel, M., and Klose, K.
(2009). From formal access control policies to run-
time enforcement aspects. In Massacci, F., Zannone,
N., and Redwine, S. T., editors, Engineering Secure
Software and Systems, LNCS. vol. 5429, pp. 16–31,
Springer, Berlin.
Konopacki, P., Frappier, M., and Laleau, R. (2010).
Expressing access control policies with an event-
based approach. Technical Report TR-LACL-2010-6,
LACL, Universit´e Paris Est.
Leuschel, M. and Butler, M. (2003). ProB: A model checker
for B. In Araki, K., Gnesi, S., and Mandrioli, D., ed-
itors, FME 2003: Formal Methods, LNCS. vol. 2805,
pp. 855–874, Springer, Berlin Heidelberg.
Milhau, J., Frappier, M., Gervais, F., and Laleau, R. (2010).
Systematic translation rules from ASTD to Event-B.
In M´ery, D. and Merz, S., editors, Integrated Formal
Methods, LNCS. vol. 6396, pp. 245–259, Springer,
Berlin H.
Parnas, D. (1972). On the criteria to be used in decomposing
systems into modules. Communications of the ACM,
15(12).
Schauerhuber, A., Schwinger, W., Kapsammer, E., Rets-
chitzegger, W., Wimmer, M., and Kappel, G. (2007).
A survey on aspect-oriented modeling approaches.
Technical report, Vienna University of Technology.
Win, B. D., Vanhaute, B., and Decker, B. D. (2002). How
aspect-oriented programming can help to build secure
software. Informatica (Slovenia), 26(2).
A FOUR-CONCERN-ORIENTED SECURE IS DEVELOPMENT APPROACH
471