defining a two way mapping, and is domain
independent. The proposed pattern promotes
reutilization by offering a technique allowing to
convey logic rules, like decision logic, from
metamodel elements to their instances. This allows
upgrading from illustrative metamodels to formal
specification languages with semantic expressiveness
capabilities and visual representation.
Applying this pattern, we have elaborated an
access control metamodel IM as a comprehensive
metamodel for hybrid AC policies. Although other
metamodels were proposed in the literature, IM
represents a realistic advance toward an AC
specification language that allows formal verification
of properties, promotes non-ambiguity, reduces
complexity and supports readability and clarity. This
is achieved by operating on four axes. First, the formal
semantics carried by the FOL mapping provides the
base for property verification using reasoning on FOL
clauses. Second, the IM integration capability allows
reducing the complexity of AC specification by
separating the specification into well-structured and
well-defined AC metamodel instances. Third, IM
supports refinement and modularity with a visual
representation based on an ADT tree structure that can
be unfolded to selectively display progressively more
detailed elements in AC metamodel instances or
combining algorithms. Fourth, each AC metamodel
allows the reutilization of its encapsulated AC
decision logic and relevant elements.
We plan to develop an IM specification editing
tool supporting the generation of IM instances with
their corresponding synchronized textual specifica-
tions. This tool will also support syntax validation and
property verification techniques.
ACKNOWLEDGEMENTS
This research was funded in part by the Natural
Sciences and Engineering Research Council of
Canada.
REFERENCES
Barker, S. (2012) Logical Approaches to Authorization
Policies. In: Artikis, A., Craven, R., Çiçekli, N. K.,
Sadighi, B., Stathis, K.(eds.) Logic Programs, Norms
and Action. LNCS, vol. 7360, pp. 349-373. Berlin
Heidelberg: Springer.
Barker, S. (2009) The next 700 access control models or a
unifying meta-model?. In: Proceedings of 14th ACM
Symposium on Access Control Models and
Technologies (SACMAT’09). pp. 187–196.
Basin, D., Doser, J., Lodderstedt, T. (2006) Model driven
security: From UML models to access control
infrastructures. ACM Transactions on Software
Engineering and Methodology. Vol.15, pt. 1, pp. 39–
91.
Becker, M. Y., Fournet, C. & Gordon, A. D. (2007) Design
and semantics of a decentralized authorization
language. In: CSF. pp. 3–15.
Bell, D. & LaPadula, L. (1976) Secure Computer Systems:
Unified Exposition and Multics Interpretation. Mitre
Corporation: Bedford, MA. (March 1976).
Biba, K. (1977) Integrity Considerartions for Secure
Compouter Systems. The Mitre Corporation. (April
1977).
Brewer, D. F.C & Nash, M. J. (1989) The Chinese Wall
security policy. In: Security and Privacy 1989,
Oakland, CA. pp. 206-214.
Damianou, N., Dulay, N., Lupu, E. & Sloman, M. (2001)
The Ponder specification language. In: Workshop on
Policies for Distributed Systems and Networks, Jan
2001.
Doan, T., Demurjian, S., Ting, T.C. & Ketterl, A. (2004)
MAC and UML for secure software design. In:
Proceedings of 2004 ACM workshop on Formal
methods in security engineering (FMSE’04) 2004. pp.
75–85.
Epstein, P. & Sandhu, R. 1999 Towards a UML based
approach to role engineering. In: Proceedings of 4th
ACM workshop on Role-based Access Control
(RBAC’99) 1999. pp. 135–143.
Gelfond, M. & Lobo, J. (2008) Authorization and
Obligation Policies in Dynamic Systems. In: Garcia de
la Banda, M., Pontelli, E. eds. ICLP 2008. LNCS, vol.
5366, pp. 22–36. Heidelberg: Springer.
Graven, R., Lobo, J., Ma, J., Russo, A., Lupu, E.C. &
Bandara, A.K. (2009) Expressive policy analysis with
enhanced system dynamicity. In: ASIACCS
proceedings of the 4
th
international Symposium on
Information Computer, and Commuication Security
2009. pp. 239–250. New York: ACM.
Jajodia, S., Samarati, P., Sapino, M. & Subrahmaninan, V.
(2001) Flexible support for multiple access control
policies. Vol. 26, pt.2, pp.214–260 ACM TODS.
Jurjens, J. (2001) Towards development of secure systems
using UMLsec. In: Hussmann, H. (eds.) Proceedings of
4th International Conference on Fundamental
Approaches to Software Engineering (FASE/
ETAPS’01) 2001. volume of LNCS, vol. 2029, pp.187–
200. Heidelberg: Spring.
Kleppe, A., Warmer, J. & Bast, W. (2002). MDA
Explained, The Model Driven Architecture: Practice
And Promise. Addison-Wesley.
OASIS (2013) eXtensible Access Control Markup
Language XACML version 3.0. OASIS standard.
Object Management Group, (2010) Unified Modeling
Language, version 2.3. OMG Document Number:
formal/2010-05-03.
MetamodellingwithFormalSemanticswithApplicationtoAccessControlSpecification
361