Content Based Model Transformations: Solutions to Existing Issues with Application in Information Security
Keywords:
Cyber Security Modeling Language, Model Transformation, Model Driven EngineeringAbstract
Model-Driven Engineering uses models in various stages of the software engineering. To reduce the cost of modelling and production, models are reused by transforming. Therefore the accuracy of model transformations plays a key role in ensuring the quality of the process. However, problems exist when trying to transform a very abstract and content dependent model. This paper describes the issues arising from such transformations. Solutions to solve problems in content based model transformation are proposed as well. The usage of proposed solutions allowing realization of semi-automatic transformations was integrated into a tool, designed for OPC/XML drawing file transformations to CySeMoL models. The accuracy of transformations in this tool has been analyzed and presented in this paper to acquire data on the proposed solutions influence to the accuracy in content based model transformation.References
L. Levi, M. Amrani, J. Dingel, L. Lambers, R. Salay, G. M. K. Selim, E. Syriani and M. Wimmer (2014), Model Transformation Intents and their Properties, Software Systems & Modeling, 1-38.
L. M. Rose, M. Hermannsdoerfer, S. Mazanek, P. V. Gorp, S. Buchwald, T. Horn and E. Kalnina (2014), Graph and Model Transformation Tools for Model Migration, Software & Systems Modeling, 13(1): 323-359. http://dx.doi.org/10.1007/s10270-012-0245-0
G. M. K. Selim, S. Wang, J. R. Cordy and J. Dingel (2012), Model Transformations for Migrating Legacy Models: An Industrial Case Study, ECMFA, LNCS 7349, 90-101. http://dx.doi.org/10.1007/978-3-642-31491-9_9
S. Sen, N. Moha, V. Mahe, O. Barais, B. Baudry, J. M. Jezequel (2012), Reusable Model Transformations, Software & Systems Modeling, 11(1): 111-125. http://dx.doi.org/10.1007/s10270-010-0181-9
L. Lambers, S. Hildebrandt, H. Giese and F. Orejas (2012), Attribute Handling for Bidirectional Model Transformations: the Triple Graph Grammar Case, Electronic Communications of the EASST, 49: 1-16.
D. Basin, M. Clavel and M. Egea (2011), A Decade of Model-driven Security, SACMAT11 Proceedings of the 16th ACM symposium on Access control models and technologies, 1-16.
A. D. Brucker, J. Doser and B.Wolff (2006), A Model Transformation Semantics and Analysis Methodology for SecureUML, Lecture notes in computer science, Berlin, Springer, 306-320. http://dx.doi.org/10.1007/11880240_22
R. Matulevicius and M. Dumas (2011), Towards Model Transformation Between SecureUML and UMLsec for Role-based Access Control, Databases and Information Systems, 6: 1-14.
S. Friedenthal, A. Moore and R. Steiner (2014), A Practical Guide to SysML, Waltham: Elsevier, 2014.
M. Chinosi and A. Trombetta (2012), BPMN: An introduction to the standard, Computer Standards & Interfaces, 34: 124-134. http://dx.doi.org/10.1016/j.csi.2011.06.002
L. Lemaire and J. Lapon (2014), A SysML Extension for Security Analysis of Industrial Control Systems, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014),1-9.
E. C. Andrade, M. Alves, R. Matos, B. Silva and P. Maciel (2013), OpenMADS: An Open Source Tool for Modeling and Analysis of Distributed Systems, Computer Safety, Reliability, and Security, Lecture Notes in Computer Science, 8153: 277-284. http://dx.doi.org/10.1007/978-3-642-40793-2_25
T. Sommestad, M. Ekstedt and H. Holm (2013), The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, Systems Journal, 7: 363-373. http://dx.doi.org/10.1109/JSYST.2012.2221853
M. Biehl (2010), Literature study on model transformations, Royal Institute of Technology, Stockholm, 2010.
K. Czarnecki and S. Helsen (2003), Classification of model transformation approaches, 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture, 2003.
P. A. Bernstein and S. Melnik (2007), Model Management 2.0: Manipulating Richer Mappings, SIGMOD07, Proceedings of the 2007 ACM SIGMOD international conference on Management of data, 1-12. http://dx.doi.org/10.1145/1247480.1247482
T. Frisendal (2012), Business Concept Mapping, Concept Maps: Theory, Methodology, Technology Proc. of the Fifth Int. Conference on Concept Mapping, 1-4.
B. Ganter and R. Wille (2012), Formal Concept Analysis: Mathematical Foundations, Berlin: Springer Science & Business Media, 2012.
T. Mens and P. V. Gorp (2015), A Taxonomy of Model Transformation, Electronic Notes in Theoretical Computer Science, 152: 125-142. http://dx.doi.org/10.1016/j.entcs.2005.10.021
K. Czarnecki and S. Helsen (2006), Feature-Based Survey of Model Transformation Approaches, IBM Syst. J., 45(3): 621-645. http://dx.doi.org/10.1147/sj.453.0621
G. Besova, D. Steenken, and H. Wehrheim (2015), Grammar-based model transformations, Comput. Lang. Syst. Struct., 43(C): 116-138.
H. Saada, X. Dolques, M. Huchard, C. Nebut and H. Sahraoui (2012), Generation of operational transformation rules from examples of model transformations, Model Driven Engineering Languages and Systems. Lecture Notes in Computer Science, 7590: 546-561. http://dx.doi.org/10.1007/978-3-642-33666-9_35
M. Wimmer, M. Strommer, H. Kargl and G Kramler (2007), Towards Model Transformation Generation By-Example, HICSS 2007, 40th Annual Hawaii International Conference on System Sciences, 285b.
G. Kappel, P. Langer, W. Retschitzegger, W. Schwinge and M. Wimmer (2012), Model Transformation By-Example: A Survey of the First Wave, Conceptual Modelling and Its Theoretical Foundations, 197-215.
D. Varro (2006), Model Transformation by Example, Model Driven Engineering Languages and Systems, 410-424.
P. Arora and T. Bhalla (2014), A Synonym Based Approach of Data Mining in Search Engine Optimization, International Journal of Computer Trends and Technology (IJCTT), 12(4): 201-205. http://dx.doi.org/10.14445/22312803/IJCTT-V12P140
B. Ma, Z. Dongsong, Z. Yan and T. Kim (2013), An LDA and Synonym Lexicon Based Approach to Product Feature Extraction from Online Consumer Product Review, Journal of Electronic Commerce Research, 14(4): 304-314
Y. Chang, S. Saito and M. Nakajima (2005), Example-based color transformation for image and video, Proceedings of the 3rd international conference on Computer graphics and interactive techniques in Australasia and South East Asia (GRAPHITE05). ACM, New York, NY, USA, 347-353. http://dx.doi.org/10.1145/1101389.1101459
R. Singh and S. Gulwani (2012), Learning semantic string transformations from examples, Proc. VLDB Endow., 5(87): 740-751. http://dx.doi.org/10.14778/2212351.2212356
International Organization for Standartization (2012), ISO 29500-2:2012 Information technology - Document description and processing languages - Office Open XML File Formats - Part 2: Open Packaging Conventions. Third Edition, Geneva: International Organization for Standartization.
F. Hermann, H. Ehrig, F. Orejas and U. Golas (2010), Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars, Graph Transformations, Berlin, Springer, 155-170. http://dx.doi.org/10.1007/978-3-642-15928-2_11
Published
Issue
Section
License
ONLINE OPEN ACCES: Acces to full text of each article and each issue are allowed for free in respect of Attribution-NonCommercial 4.0 International (CC BY-NC 4.0.
You are free to:
-Share: copy and redistribute the material in any medium or format;
-Adapt: remix, transform, and build upon the material.
The licensor cannot revoke these freedoms as long as you follow the license terms.
DISCLAIMER: The author(s) of each article appearing in International Journal of Computers Communications & Control is/are solely responsible for the content thereof; the publication of an article shall not constitute or be deemed to constitute any representation by the Editors or Agora University Press that the data presented therein are original, correct or sufficient to support the conclusions reached or that the experiment design or methodology is adequate.