pass a security monitoring service to identify potential
threat in the sensor network.
Figure 7 demonstrated a human task (Corrective
Action) responsible to the perform some configurati-
ons to recover a detected threat. This interaction with
a security expert is enriched with the result of Secu-
rity Threat Analysis, which proposes security mecha-
nims or only changes in security polices to recover an
anomaly to the network.
This security analysis enables to identify false po-
sitives that can occur and it must not interrup the
workflow. In contrast, some problems can result to
the end of the workflow. For instance, if an threat re-
sults in a critical problem for the infrastructure.
In this context, the human receive detailed infor-
mation about detected threats and security solutions
to be implemented.
6 CONCLUSIONS AND FUTURE
WORKS
Cooperative networks include organizations and busi-
nesses that are owned and managed by the people pro-
viding products and supplying of services. The crea-
tion of new services requires time and effort to design
effective services. The adoption of a methodology of
the Model Driven Service Engineering Architecture
(MDSEA) implements the process of model transfor-
mation from business details to specific artifacts.
The paper presented a implementation of a secu-
rity management process in a business model of the
manufacturing scenario of C2NET project as well as
the execution of model transformations following a
methodology MDSEA to enrich specific details du-
ring the process.
Due to the facility to construct services based on
model driven engineering behind manufacturing en-
terprises, the methodology MDSEA could be imple-
mented to demonstrate the transition between busi-
ness models to security artifacts and implementati-
ons. This implementation of the security management
process provided a view to understand how to enrich
a simple business model based on a methodology as
well as transforming high-level abstraction models to
add specific details of security activities.
As future works, we intend to use model dri-
ven engineering to support services development that
should to be executed in this security management
process. Also, the integration of ontology-based so-
lution need to be studied for the adoption of an
ontology-based framework to support making deci-
sion in realtime.
ACKNOWLEDGEMENTS
The research leading to this work has received fun-
ding from CAPES Proc. N
o
: BEX 0966/15-0 and
European Commission’s Horizon 2020 Programme
(H2020/2014-2020) under grant agreement: C2NET
N
o
: 636909.
REFERENCES
Agostinho, C.,
ˇ
Cern
`
y, J., and Jardim-Goncalves, R. (2012).
Mda-based interoperability establishment using lan-
guage independent information models. In Interna-
tional IFIP Working Conference on Enterprise Intero-
perability, pages 146–160. Springer.
Atkinson, C. and Kuhne, T. (2003). Model-driven deve-
lopment: a metamodeling foundation. IEEE software,
20(5):36–41.
Bahill, A. T. and Gissing, B. (1998). Re-evaluating systems
engineering concepts using systems thinking. IEEE
Transactions on Systems, Man, and Cybernetics, Part
C (Applications and Reviews), 28(4):516–527.
Basin, D., Doser, J., and Lodderstedt, T. (2003). Model dri-
ven security for process-oriented systems. In Procee-
dings of the eighth ACM symposium on Access control
models and technologies, pages 100–109. ACM.
Bazoun, H., Ribault, J., Zacharewicz, G., Ducq, Y., and
Boy
´
e, H. (2016). Slmtoolbox: Enterprise service pro-
cess modeling and simulation by coupling devs and
services workflow. International Journal of Simula-
tion and Process Modelling.
Bazoun, H., Zacharewicz, G., Ducq, Y., and Boye, H.
(2013). Transformation of extended actigram star
to bpmn2.0 and simulation model in the frame of
model driven service engineering architecture. In
Proceedings of the Symposium on Theory of Mo-
deling & Simulation-DEVS Integrative M&S Sympo-
sium, page 20. Society for Computer Simulation In-
ternational.
Bazoun, H., Zacharewicz, G., Ducq, Y., and Boy
´
e, H.
(2014). Slmtoolbox: An implementation of mdsea for
servitisation and enterprise interoperability. In Enter-
prise Interoperability VI, pages 101–111. Springer.
B
´
ezivin, J. (2006). Model driven engineering: An emer-
ging technical space. In Generative and transformati-
onal techniques in software engineering, pages 36–64.
Springer.
Brucker, A. D., Hang, I., L
¨
uckemeyer, G., and Ruparel, R.
(2012). Securebpmn: Modeling and enforcing access
control requirements in business processes. In Procee-
dings of the 17th ACM symposium on Access Control
Models and Technologies, pages 123–126. ACM.
Butun, I., Morgera, S. D., and Sankar, R. A survey of
intrusion detection systems in wireless sensor net-
works. IEEE Communications Surveys & Tutorials,
16(1):266–282.
Model Driven Implementation of Security Management Process
237