Query-based Access Control for Secure Collaborative Modeling using Bidirectional Transformations

被引:17
|
作者
Bergmann, Gabor [1 ,2 ]
Debreceni, Csaba [1 ,2 ]
Rath, Istvan [1 ]
Varro, Daniel [1 ,2 ]
机构
[1] Budapest Univ Technol & Econ, Dept Measurement & Informat Syst, Magyar Tudosok Krt 2, H-1117 Budapest, Hungary
[2] MTA BME Lendulet Res Grp Cyber Phys Syst, Budapest, Hungary
关键词
POLICIES;
D O I
10.1145/2976767.2976793
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Large-scale model-driven system engineering projects are carried out collaboratively. Engineering artifacts stored in model repositories are developed in either offline (checkout modify-commit) or online (GoogleDoc-style) scenarios. Complex systems frequently integrate models and components developed by different teams, vendors and suppliers. Thus confidentiality and integrity of design artifacts need to be protected by access control policies. We propose a technique for secure collaborative modeling where (1) fine-grained access control for models can be defined by model queries, and (2) such access control policies are strictly enforced by bidirectional model transformations. Each collaborator obtains a filtered local copy of the model containing only those model elements which they are allowed to read; write access control policies are checked on the server upon submitting model changes. We illustrate the approach and carry out an initial scalability assessment using a case study of the MONDO EU project.
引用
收藏
页码:351 / 361
页数:11
相关论文
共 50 条
  • [1] Query-Based Access Control for Ontologies
    Knechtel, Martin
    Stuckenschmidt, Heiner
    WEB REASONING AND RULE SYSTEMS, 2010, 6333 : 73 - +
  • [2] Correction to: Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations
    Csaba Debreceni
    Gábor Bergmann
    István Ráth
    Dániel Varró
    Software & Systems Modeling, 2019, 18 : 1771 - 1771
  • [3] Analysis and Transformations for Efficient Query-based Debugging
    Gorbovitski, Michael
    Tekle, K. Tuncay
    Rothamel, Tom
    Stoller, Scott D.
    Liu, Yanhong A.
    EIGHTH IEEE INTERNATIONAL WORKING CONFERENCE ON SOURCE CODE ANALYSIS AND MANIPULATION, PROCEEDINGS, 2008, : 174 - 183
  • [4] Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations (vol 18, pg 1737, 2019)
    Debreceni, Csaba
    Bergmann, Gabor
    Rath, Istvan
    Varro, Daniel
    SOFTWARE AND SYSTEMS MODELING, 2019, 18 (03): : 1771 - 1771
  • [5] Query-Based Comparison of Mappings in Ontology-Based Data Access
    Bienvenu, Meghyn
    Rosati, Riccardo
    FIFTEENTH INTERNATIONAL CONFERENCE ON THE PRINCIPLES OF KNOWLEDGE REPRESENTATION AND REASONING, 2016, : 197 - 206
  • [6] Disease diagnosis using query-based neural networks
    Chang, RI
    ADVANCES IN NEURAL NETWORKS - ISNN 2005, PT 3, PROCEEDINGS, 2005, 3498 : 767 - 773
  • [7] Improving query-based summarization using document graphs
    Mohamed, Ahmed A.
    Rajasekaran, Sanguthevar
    2006 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2006, : 408 - +
  • [8] Random transformations to improve mitigation of query-based black-box attacks
    Ali, Ziad Tariq Muhammad
    Azad, R. Muhammad Atif
    Azad, Muhammad Ajmal
    Holyhead, James
    Rice, Iain
    Imran, Ali Shariq
    EXPERT SYSTEMS WITH APPLICATIONS, 2025, 264
  • [9] Blockchain-based Bidirectional Transformations for Access Control and Data Sharing in EMRs
    Zan, Tao
    Hu, Zhenjiang
    THE 12TH ASIA-PACIFIC SYMPOSIUM ON INTERNETWARE, INTERNETWARE 2020, 2021, : 71 - 80
  • [10] Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud: Moye(Omega)
    Konan, Martin
    Wang, Wenyong
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2018, 12 (04) : 1 - 23