Skip to main content
Erschienen in: Software and Systems Modeling 3/2019

Open Access 21.11.2017 | Special Section Paper

Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations

verfasst von: Csaba Debreceni, Gábor Bergmann, István Ráth, Dániel Varró

Erschienen in: Software and Systems Modeling | Ausgabe 3/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Large-scale model-driven system engineering projects are carried out collaboratively. Engineering artefacts stored in model repositories are developed in either offline (checkout–modify–commit) or online (GoogleDoc-style) scenarios. Complex systems frequently integrate models and components developed by different teams, vendors and suppliers. Thus, confidentiality and integrity of design artefacts need to be protected in accordance with access control policies. We propose a secure collaborative modelling approach where fine-grained access control for models is strictly enforced by bidirectional model transformations. Collaborators obtain filtered local copies of the model containing only those model elements which they are allowed to read; write access control policies are checked on the server upon submitting model changes. We present a formal collaboration schema which provenly guarantees certain correctness constraints, and its adaption to online scenarios with on-the-fly change propagation and the integration into existing version control systems to support offline scenarios. The approach is illustrated, and its scalability is evaluated using a case study of the MONDO EU project.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Fußnoten
1
https://static-content.springer.com/image/art%3A10.1007%2Fs10270-017-0631-8/MediaObjects/10270_2017_631_IEq78_HTML.gif takes care of the containment reference between \(sN_G\) and ctrl3.
 
2
Similarly, https://static-content.springer.com/image/art%3A10.1007%2Fs10270-017-0631-8/MediaObjects/10270_2017_631_Figp_HTML.gif will handle the removal of the previous attribute asset \(\textit{AttributeAsset}(s1_F,frequency,30)\) before the addition.
 
3
Note that we make a distinction between a user having no access to a model at all, and a user having access to the model, but nothing is readable in it.
 
4
The complete formal specification is available at: http://​goo.​gl/​pJzIX1.
 
5
Source codes and more details are at https://​tinyurl.​com/​sosym-access-control-source.
 
7
Raw data and reproduction instructions at https://​tinyurl.​com/​sosym-access-control.
 
8
CPU: Intel Core i7-4700MQ@2.40GHz, MEM: 8GB.
 
Literatur
2.
4.
Zurück zum Zitat Bagnato, A., Brosse, E., Sadovykh, A., Maló, P., Trujillo, S., Mendialdua, X., De Carlos, X.: Flexible and scalable modelling in the mondo project: Industrial case studies. In: XM@ MoDELS, pp. 42–51 (2014) Bagnato, A., Brosse, E., Sadovykh, A., Maló, P., Trujillo, S., Mendialdua, X., De Carlos, X.: Flexible and scalable modelling in the mondo project: Industrial case studies. In: XM@ MoDELS, pp. 42–51 (2014)
5.
Zurück zum Zitat Bancilhon, F., Spyratos, N.: Update semantics of relational views. ACM Trans. Database Syst. 6(4), 557–575 (1981)CrossRefMATH Bancilhon, F., Spyratos, N.: Update semantics of relational views. ACM Trans. Database Syst. 6(4), 557–575 (1981)CrossRefMATH
6.
Zurück zum Zitat Basciani, F., Rocco, J.D., Ruscio, D.D., Salle, A.D., Iovino, L., Pierantonio, A.: MDEForge: an extensible web-based modeling platform. In: CloudMDE@MoDELS (2014) Basciani, F., Rocco, J.D., Ruscio, D.D., Salle, A.D., Iovino, L., Pierantonio, A.: MDEForge: an extensible web-based modeling platform. In: CloudMDE@MoDELS (2014)
7.
Zurück zum Zitat Bergmann, G., Dávid, I., Hegedüs, Á., Horváth, Á., Ráth, I., Ujhelyi, Z., Varró, D.: VIATRA 3: a reactive model transformation platform. In: International Conference on Theory and Practice of Model Transformations, pp. 101–110. Springer (2015) Bergmann, G., Dávid, I., Hegedüs, Á., Horváth, Á., Ráth, I., Ujhelyi, Z., Varró, D.: VIATRA 3: a reactive model transformation platform. In: International Conference on Theory and Practice of Model Transformations, pp. 101–110. Springer (2015)
8.
Zurück zum Zitat Bergmann, G., Debreceni, C., Ráth, I., Varró, D.: Query-based access control for secure collaborative modeling using bidirectional transformations. In: ACM/IEEE 19th International Conference on MODELS (2016) Bergmann, G., Debreceni, C., Ráth, I., Varró, D.: Query-based access control for secure collaborative modeling using bidirectional transformations. In: ACM/IEEE 19th International Conference on MODELS (2016)
9.
Zurück zum Zitat Bergmann, G., Debreceni, C., Ráth, I., Varró, D.: Towards efficient evaluation of rule-based permissions for fine-grained access control in collaborative modeling. In: 2nd International Workshop on Collaborative Modelling in MDE, Austin Texas, USA. ACM (in press) Bergmann, G., Debreceni, C., Ráth, I., Varró, D.: Towards efficient evaluation of rule-based permissions for fine-grained access control in collaborative modeling. In: 2nd International Workshop on Collaborative Modelling in MDE, Austin Texas, USA. ACM (in press)
10.
Zurück zum Zitat Blaze, M., Keromytis, A.D.: The keynote trust-management system version 2 (1999) Blaze, M., Keromytis, A.D.: The keynote trust-management system version 2 (1999)
11.
Zurück zum Zitat Breu, R., Popp, G., Alam, M.: Model based development of access policies. Int. J. Softw. Tools Technol. Transf. 9(5), 457–470 (2007)CrossRef Breu, R., Popp, G., Alam, M.: Model based development of access policies. Int. J. Softw. Tools Technol. Transf. 9(5), 457–470 (2007)CrossRef
13.
Zurück zum Zitat Chechik, M., Dalpiaz, F., Debreceni, C., Horkoff, J., Ráth, I., Salay, R., Varró, D.: Property-based methods for collaborative model development. In: Joint Proceedings of the 3rd International Workshop on the Glob. of Modeling Lang. and the 9th International Workshop on Multi-Paradigm Modeling. Citeseer, pp. 1–7 (2015) Chechik, M., Dalpiaz, F., Debreceni, C., Horkoff, J., Ráth, I., Salay, R., Varró, D.: Property-based methods for collaborative model development. In: Joint Proceedings of the 3rd International Workshop on the Glob. of Modeling Lang. and the 9th International Workshop on Multi-Paradigm Modeling. Citeseer, pp. 1–7 (2015)
14.
Zurück zum Zitat Clasen, C., Jouault, F., Cabot, J.: VirtualEMF: A model virtualization tool. In: Advances in Conceptual Modeling. Recent Developments and New Directions, pp. 332–335 (2011) Clasen, C., Jouault, F., Cabot, J.: VirtualEMF: A model virtualization tool. In: Advances in Conceptual Modeling. Recent Developments and New Directions, pp. 332–335 (2011)
15.
Zurück zum Zitat Conner, N.: Google Apps: The Missing Manual: The Missing Manual. O’Reilly Media Inc, Sebastopol (2008) Conner, N.: Google Apps: The Missing Manual: The Missing Manual. O’Reilly Media Inc, Sebastopol (2008)
16.
Zurück zum Zitat Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621–645 (2006)CrossRef Czarnecki, K., Helsen, S.: Feature-based survey of model transformation approaches. IBM Syst. J. 45(3), 621–645 (2006)CrossRef
17.
Zurück zum Zitat DARPA VehicleFORGE, P.U.: TrustForge: Flexible Access Control for VehicleForge.mil Collaborative Environment, (2012) DARPA VehicleFORGE, P.U.: TrustForge: Flexible Access Control for VehicleForge.mil Collaborative Environment, (2012)
18.
Zurück zum Zitat Debreceni, C., Bergmann, G., Ráth, I., Varró, D.: Deriving effective permissions for modeling artifacts from fine-grained access control rules. In: 1st International Workshop on Collaborative Modelling in MDE, Saint Malo, France. ACM (2016) Debreceni, C., Bergmann, G., Ráth, I., Varró, D.: Deriving effective permissions for modeling artifacts from fine-grained access control rules. In: 1st International Workshop on Collaborative Modelling in MDE, Saint Malo, France. ACM (2016)
19.
Zurück zum Zitat Debreceni, C., Ráth, I., Varró, D., De Carlos, X., Mendialdua, X., Trujillo, S.: Automated model merge by design space exploration. In: International Conference on Fundamental Approaches to Software Engineering. Springer, pp. 104–121 (2016) Debreceni, C., Ráth, I., Varró, D., De Carlos, X., Mendialdua, X., Trujillo, S.: Automated model merge by design space exploration. In: International Conference on Fundamental Approaches to Software Engineering. Springer, pp. 104–121 (2016)
20.
Zurück zum Zitat Dietzold, S., Auer. S., S.: Access control on RDF triple stores from a semantic wiki perspective. In: Scripting for the Semantic Web Workshop at 3rd European Semantic Web Conference (ESWC) (2006) Dietzold, S., Auer. S., S.: Access control on RDF triple stores from a semantic wiki perspective. In: Scripting for the Semantic Web Workshop at 3rd European Semantic Web Conference (ESWC) (2006)
21.
Zurück zum Zitat Diskin, Z.: Algebraic models for bidirectional model synchronization. In: MoDELS, pp. 21–36 (2008) Diskin, Z.: Algebraic models for bidirectional model synchronization. In: MoDELS, pp. 21–36 (2008)
22.
Zurück zum Zitat Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series). Springer, New York (2006) Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation (Monographs in Theoretical Computer Science. An EATCS Series). Springer, New York (2006)
23.
Zurück zum Zitat Farwick, M., Agreiter, B., White, J., Forster, S., Lanzanasto, N., Breu, R.: A web-based collaborative metamodeling environment with secure remote model access. In: Web Engineering, 10th International Conference, ICWE 2010, Vienna, Austria, July 5–9, 2010. Proceedings, Volume 6189 of LNCS, pp. 278–291. Springer (2010) Farwick, M., Agreiter, B., White, J., Forster, S., Lanzanasto, N., Breu, R.: A web-based collaborative metamodeling environment with secure remote model access. In: Web Engineering, 10th International Conference, ICWE 2010, Vienna, Austria, July 5–9, 2010. Proceedings, Volume 6189 of LNCS, pp. 278–291. Springer (2010)
24.
Zurück zum Zitat Fogel, K.F., Bar, M.: Open Source Development with CVS. Coriolis Group Books, London (2001) Fogel, K.F., Bar, M.: Open Source Development with CVS. Coriolis Group Books, London (2001)
25.
Zurück zum Zitat Foster, J.N., Pierce, B.C., Zdancewic, S.: Updatable security views. In: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, CSF’09, pp. 60–74. IEEE Computer Society, Washington (2009) Foster, J.N., Pierce, B.C., Zdancewic, S.: Updatable security views. In: Proceedings of the 2009 22nd IEEE Computer Security Foundations Symposium, CSF’09, pp. 60–74. IEEE Computer Society, Washington (2009)
27.
Zurück zum Zitat Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: 9th ACM Symposium on Access Control Models and Technologies, pp. 61–69 (2004) Fundulaki, I., Marx, M.: Specifying access control policies for XML documents with XPath. In: 9th ACM Symposium on Access Control Models and Technologies, pp. 61–69 (2004)
28.
Zurück zum Zitat Gallardo, J., Bravo, C., Redondo, M.A.: A model-driven development method for collaborative modeling tools. J. Netw. Comput. Appl. 35(3), 1086–1105 (2012)CrossRef Gallardo, J., Bravo, C., Redondo, M.A.: A model-driven development method for collaborative modeling tools. J. Netw. Comput. Appl. 35(3), 1086–1105 (2012)CrossRef
30.
Zurück zum Zitat Gibson-Robinson, T., Armstrong, P., Boulgakov, A., Roscoe, A.: FDR3—A Modern Refinement Checker for CSP. In: Ábrahám, E., Havelund, K. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, Volume 8413 of Lecture Notes in Computer Science, pp. 187–201 (2014) Gibson-Robinson, T., Armstrong, P., Boulgakov, A., Roscoe, A.: FDR3—A Modern Refinement Checker for CSP. In: Ábrahám, E., Havelund, K. (eds.) Tools and Algorithms for the Construction and Analysis of Systems, Volume 8413 of Lecture Notes in Computer Science, pp. 187–201 (2014)
31.
Zurück zum Zitat Godik, S., Moses, T. (eds.). eXtensible access control markup language (XACML) version 1.0. 02 (2003) Godik, S., Moses, T. (eds.). eXtensible access control markup language (XACML) version 1.0. 02 (2003)
32.
Zurück zum Zitat International Organization for Standardization. ISO 16739:2013: Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries (2013) International Organization for Standardization. ISO 16739:2013: Industry Foundation Classes (IFC) for data sharing in the construction and facility management industries (2013)
33.
Zurück zum Zitat Jaeschke, R.: Encrypting C source for distribution. J. C Lang. Transl. 2(1), 71–80 (1990)MathSciNet Jaeschke, R.: Encrypting C source for distribution. J. C Lang. Transl. 2(1), 71–80 (1990)MathSciNet
34.
Zurück zum Zitat Jürjens, J.: Model-based run-time checking of security permissions using guarded objects. In: Leucker, M. (ed.) Proceedings of the 8th International Workshop on Runtime Verification, Volume 5289 of LNCS, pp. 36–50. Springer, Budapest (2008) Jürjens, J.: Model-based run-time checking of security permissions using guarded objects. In: Leucker, M. (ed.) Proceedings of the 8th International Workshop on Runtime Verification, Volume 5289 of LNCS, pp. 36–50. Springer, Budapest (2008)
35.
Zurück zum Zitat Lucio, L., Zhang, Q., Nguyen, P.H., Amrani, M., Klein, J., Vangheluwe, H., Traon, Y.L.: Advances in model-driven security. Adv. Comput. 93, 103–152 (2014)CrossRef Lucio, L., Zhang, Q., Nguyen, P.H., Amrani, M., Klein, J., Vangheluwe, H., Traon, Y.L.: Advances in model-driven security. Adv. Comput. 93, 103–152 (2014)CrossRef
36.
Zurück zum Zitat Maroti, M., et al.: Next generation (meta)modeling: web- and cloud-based collaborative tool infrastructure. In: 8th Multi-Paradigm Modeling Workshop, Valencia, Spain (2014) Maroti, M., et al.: Next generation (meta)modeling: web- and cloud-based collaborative tool infrastructure. In: 8th Multi-Paradigm Modeling Workshop, Valencia, Spain (2014)
37.
Zurück zum Zitat Martínez, S., García, J., Cabot, J.: Runtime support for rule-based access-control evaluation through model-transformation. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering, pp. 57–69. ACM (2016) Martínez, S., García, J., Cabot, J.: Runtime support for rule-based access-control evaluation through model-transformation. In: Proceedings of the 2016 ACM SIGPLAN International Conference on Software Language Engineering, pp. 57–69. ACM (2016)
38.
Zurück zum Zitat Montrieux, L., Hu, Z.: Towards attribute-based authorisation for bidirectional programming. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT’15, pp. 185–196. ACM, New York (2015) Montrieux, L., Hu, Z.: Towards attribute-based authorisation for bidirectional programming. In: Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, SACMAT’15, pp. 185–196. ACM, New York (2015)
42.
Zurück zum Zitat Papakonstantinou, V., Michou, M., Fundulaki, I. Flouris, G., Antoniou, G.: Access control for RDF graphs using abstract models. In: 17th ACM Symposium on Access Control Models and Technologies, SACMAT’12, Newark, NJ, USA, June 20–22, 2012, pp. 103–112. ACM (2012) Papakonstantinou, V., Michou, M., Fundulaki, I. Flouris, G., Antoniou, G.: Access control for RDF graphs using abstract models. In: 17th ACM Symposium on Access Control Models and Technologies, SACMAT’12, Newark, NJ, USA, June 20–22, 2012, pp. 103–112. ACM (2012)
43.
Zurück zum Zitat Rocco, J.D., Ruscio, D.D., Iovino, L., Pierantonio, A.: Collaborative repositories in model-driven engineering [software technology]. IEEE Softw. 32(3), 28–34 (2015)CrossRef Rocco, J.D., Ruscio, D.D., Iovino, L., Pierantonio, A.: Collaborative repositories in model-driven engineering [software technology]. IEEE Softw. 32(3), 28–34 (2015)CrossRef
45.
Zurück zum Zitat Roscoe, B.: The theory and practice of concurrency (1998) Roscoe, B.: The theory and practice of concurrency (1998)
46.
Zurück zum Zitat Stevens, P.: Bidirectional model transformations in QVT: semantic issues and open questions. Softw. Syst. Model. 9(1), 7–20 (2008)MathSciNetCrossRef Stevens, P.: Bidirectional model transformations in QVT: semantic issues and open questions. Softw. Syst. Model. 9(1), 7–20 (2008)MathSciNetCrossRef
47.
Zurück zum Zitat Syriani, E., Vangheluwe, H., Mannadiar, R., Hansen, C., Mierlo, V., Ergin, H.: AToMPM: A Web-based Modeling Environment. MODELS 2013 Demonstrations Track (2013) Syriani, E., Vangheluwe, H., Mannadiar, R., Hansen, C., Mierlo, V., Ergin, H.: AToMPM: A Web-based Modeling Environment. MODELS 2013 Demonstrations Track (2013)
53.
Zurück zum Zitat Tolvanen, J.: MetaEdit+: Domain-specific modeling and product generation environment. In: 11th International Conference on Software Product Lines, SPLC 2007, Kyoto, Japan, pp. 145–146 (2007) Tolvanen, J.: MetaEdit+: Domain-specific modeling and product generation environment. In: 11th International Conference on Software Product Lines, SPLC 2007, Kyoto, Japan, pp. 145–146 (2007)
54.
Zurück zum Zitat Varró, D., Bergmann, G., Hegedüs, Á., Horváth, Á., Ráth, I., Ujhelyi, Z.: Road to a reactive and incremental model transformation platform: three generations of the viatra framework. Softw. Syst. Model. 15(3), 609–629 (2016). 05/2016CrossRef Varró, D., Bergmann, G., Hegedüs, Á., Horváth, Á., Ráth, I., Ujhelyi, Z.: Road to a reactive and incremental model transformation platform: three generations of the viatra framework. Softw. Syst. Model. 15(3), 609–629 (2016). 05/2016CrossRef
55.
Zurück zum Zitat Whittle, J., Hutchinson, J.E., Rouncefield, M.: The state of practice in model-driven engineering. IEEE Softw. 31(3), 79–85 (2014)CrossRef Whittle, J., Hutchinson, J.E., Rouncefield, M.: The state of practice in model-driven engineering. IEEE Softw. 31(3), 79–85 (2014)CrossRef
Metadaten
Titel
Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations
verfasst von
Csaba Debreceni
Gábor Bergmann
István Ráth
Dániel Varró
Publikationsdatum
21.11.2017
Verlag
Springer Berlin Heidelberg
Erschienen in
Software and Systems Modeling / Ausgabe 3/2019
Print ISSN: 1619-1366
Elektronische ISSN: 1619-1374
DOI
https://doi.org/10.1007/s10270-017-0631-8

Weitere Artikel der Ausgabe 3/2019

Software and Systems Modeling 3/2019 Zur Ausgabe