A transformation contract to generate aspects from access control policies

被引:5
作者
Braga, Christiano [1 ]
机构
[1] Univ Fed Fluminense, Inst Comp, Niteroi, RJ, Brazil
关键词
UML; SECURITY; MODELS;
D O I
10.1007/s10270-010-0156-x
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Access control is an important security issue. It has been addressed since the late 1960s in the early time-sharing computer systems. Many access control models have been proposed since than but of particular interest is Ferraiolo and Khun's role-based access control model (RBAC). It is a simple and yet general model which has been deeply studied and applied both in industry and in academia. A variety of industrial standards have been proposed based on this model. Generating code for an access control policy is an interesting challenge. Understanding access control as a non-functional concern that cross-cuts the functional part of a system raises difficulties quite suitable for a solution based on aspect-oriented programming. In this paper, we address the problems of specification and validation of code generation for access control policies targeting an aspect-based infra-structure. We propose an MDA approach. The code generator is a transformation from SecureUML, an RBAC-based modeling language, to the language Aspects for Access Control (AAC), an aspect-oriented modeling language proposed in this paper. Metamodels are used to represent the languages and to specify the transformation. A metamodel is used to represent the abstract syntax of a language and the constraints that a given instance model of the metamodel must fulfill. We also use a metamodel to specify the code generator. This transformation metamodel, together with all the constraints, that is, from both languages and those constraints regarding the merge of the two languages, we call a transformation contract. It merges and conservatively extends the source and target metamodels of the model transformation it represents. In the context of code-generation for access control policies, the transformation contract specifies the relationships between the abstract syntaxes of SecureUML and AAC and constrains the two languages. The validation of the code generator also uses the transformation contract. For a given access control policy and aspect, represented as instances of the appropriate metamodels, with aspects produced by the code generator, the constraints of the transformation contract must hold. We have prototyped a transformer from SecureUML to aspects on top of ITP/OCL, an OCL interpreter that automatically validates the generated aspect code by applying the constraints of the transformation contract.
引用
收藏
页码:395 / 409
页数:15
相关论文
共 28 条
  • [1] [Anonymous], 1997, Object-oriented software construction
  • [2] Model Driven Security: From UML models to access control infrastructures
    Basin, D
    Doser, J
    Lodderstedt, T
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2006, 15 (01) : 39 - 91
  • [3] Automated analysis of security-design models
    Basin, David
    Clavel, Manuel
    Doser, Juergen
    Egea, Marina
    [J]. INFORMATION AND SOFTWARE TECHNOLOGY, 2009, 51 (05) : 815 - 831
  • [4] Bézivin J, 2006, LECT NOTES COMPUT SC, V4199, P440
  • [5] Specification and proof in membership equational logic
    Bouhoula, A
    Jouannaud, JP
    Meseguer, J
    [J]. THEORETICAL COMPUTER SCIENCE, 2000, 236 (1-2) : 35 - 132
  • [6] BRAGA C, 2008, LECT NOTES COMPUTER, V5421
  • [7] Chen K, 2006, LECT NOTES COMPUT SC, V3841, P176
  • [8] CLAVEL M, 2008, LECT NOTES COMPUTER, V5095, DOI DOI 10.1007/978-3-540-69100-6_22
  • [9] Clavel M., 2007, LNCS, V4350, DOI [10.1007/978-3-540-71999-1, DOI 10.1007/978-3-540-71999-1]
  • [10] CLAVEL M, 2006, EQUATIONAL SPECIFICA