Proceedings of the ACM/IEEE 19th International Conference on Model Driven Engineering Languages and Systems 2016
DOI: 10.1145/2976767.2976793
|View full text |Cite
|
Sign up to set email alerts
|

Query-based access control for secure collaborative modeling using bidirectional transformations*

Abstract: Large-scale model-driven system engineering projects are carried out collaboratively. Engineering artifacts stored in model repositories are developed in either offline (checkoutmodify-commit) or online (GoogleDoc-style) scenarios. Complex systems frequently integrate models and components developed by different teams, vendors and suppliers. Thus confidentiality and integrity of design artifacts need to be protected by access control policies.We propose a technique for secure collaborative modeling where (1) f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
4
2
1

Relationship

4
3

Authors

Journals

citations
Cited by 23 publications
(30 citation statements)
references
References 26 publications
0
30
0
Order By: Relevance
“…This paper is an extension of [8,18] by providing (1) an in-depth precise specification of the bidirectional transformation as well as the collaboration scheme, (2) further technical details on its realization for both offline and online collabo- (3) an extended scalability evaluation of our approach now also covering the offline scenario.…”
Section: Contributionsmentioning
confidence: 99%
See 1 more Smart Citation
“…This paper is an extension of [8,18] by providing (1) an in-depth precise specification of the bidirectional transformation as well as the collaboration scheme, (2) further technical details on its realization for both offline and online collabo- (3) an extended scalability evaluation of our approach now also covering the offline scenario.…”
Section: Contributionsmentioning
confidence: 99%
“…Hardware Configuration All the measurements 7 executed on a personal computer 8 with maximum a 7GB of Java heap size.…”
Section: Measurement Setupmentioning
confidence: 99%
“…As l is evaluated, we can assume that − → Op 1 and − → Op 2 do not introduce conflicts and do not violate access control rules (which is discussed in [17] in details, but out of scope for the current paper). Phase 3 is independent from the operations when the locks are evaluated as the match sets are calculated at the two states of the model (M and M ′ ).…”
Section: ∃L ∈ Locksmentioning
confidence: 99%
“…The framework extends existing version control systems (VCS) such as SVN [2] to support fine-grained access control rules [17] and PB locking strategy.…”
Section: Integration Into Mondo Collaboration Frameworkmentioning
confidence: 99%
“…We developed a collaborative modelling framework with the distinguishing features of fine-grained, rule-based model-level access control. The synchronization between views is achieved by incremental and bidirectional model transformations [153].…”
Section: Modelling Techniques For Cpsmentioning
confidence: 99%