Abstract
In the context of our work, we devote this paper to the derivation from the PIM level to the PSM level in accordance with the MDA approach. PrivUML, the meta-model that we proposed in our previous work to model the privacy protection requirements, will be transformed into XACML by relying on the QVT transformation language. This paper presents this derivation process as well as the changes made to make our transformation a success. It also discusses the concept of anonymization and our integration proposal to be able to guarantee dynamic data anonymization.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
El Mokhtari, J., Abou El Kalam, A., Benhaddou, S., Medroumi, H.: PrivUML: A privacy metamodel. In: Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies, ANT 2019, pp. 53–60 (2019). https://doi.org/10.1016/j.procs.2019.04.011
Atlam, H.F., Alassafi, M.O., Alenezi, A., Walters, R.J., Wills, G.B.: XACML for building access control policies in Internet of Things. In: Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, pp. 253–260 (2019). https://doi.org/10.5220/0006725102530260
Xu, D., Shrestha, R., Shen, N.: Strong mutation testing of XACML policies. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, pp. 105–116 (2020). https://doi.org/10.1145/3381991.3395599
Daoudagh, S., Lonetti, F., Marchetti, E.: XACMET: XACML testing & modeling an automated model-based testing solution for access control systems. Softw. Qual. J. 28, 249–282 (2020). https://doi.org/10.1007/s11219-019-09470-5
Ahmadi, A., Nassiri, M., Rezvani, M.: XACBench: a XACML policy benchmark. Soft. Comput. 24, 16081–16096 (2020). https://doi.org/10.1007/s00500-020-04925-5
OASIS eXtensible Access Control Markup Language (XACML), Version 1.0 (2003). www.oasis-open.org›committees›oasis-xacml-1.0.pdf
Turkmen, F., Crispo, B.: Performance evaluation of XACML PDP implementations. In: Proceedings of the 2008 ACM Workshop on Secure Web Services, pp. 37–44 (2008). https://doi.org/10.1145/1456492.1456499
Laborde, R., Desprats, T.: Gestion de conditions stables dans XACML : intérêt d’une approche par notification. In: GRES 2007, Hammamet, Tunisie, Novembre 2007 (2007). https://www.irit.fr/publis/SIERA/gres2007-desprats-laborde-Soumission.pdf
OASIS eXtensible Access Control Markup Language (XACML), Version 3.0 (2013). https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html
OASIS eXtensible Access Control Markup Language (XACML), Version 2.0 (2005). https://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf
Rozenberg, G.: Handbook of Graph Grammars and Computing by Graph Transformation (1997)
Koch, M., Pauls, K.: Engineering self-protection for autonomous systems. In: Baresi, L., Heckel, R. (eds.) Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, vol. 3922, pp. 33–47. Springer, Heidelberg (2006). https://doi.org/10.1007/11693017_5
Czarnecki, K., Helsen, S.: Classification of model transformation approaches. In: Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of Model-Driven Architecture (2003)
Combemale, B.: Ingénierie Dirigée par les Modèles (IDM) – État de l’art. In: archives-ouvertes.fr (2008). https://hal.archives-ouvertes.fr/hal-00371565
Kahania, N., Bagherzadeha, M., Cordya, J.R., Dingela, J., Varro, D.: Survey and classification of model transformation tools. Softw. Syst. Model. 18, 2361–2397 (2019). https://doi.org/10.1007/s10270-018-0665-6
El Kouhen, A.: Spécification d’un Métamodèle pour l’adaptation des outils UML. In: archives-ouvertes.fr (2015). https://tel.archives-ouvertes.fr/tel-00997773
Bézivin, J., Jouault, F., Rosenthal, P., Valduriez, P.: Modeling in the large and modeling in the small. In: Aßmann, U., Aksit, M., Rensink, A. (eds.) Model Driven Architecture, pp. 33–46. Springer, Heidelberg (2005). https://doi.org/10.1007/11538097_3
Muller, P.A., Fleurey, F., Vojtisek, D., Dery, Z., Pollet, D., Fondement, F., Studer, P., Jezequel, J.M.: On Executable Meta-Languages applied to Model Transformations. In: archives-ouvertes.fr (2005). https://hal.inria.fr/inria-00000381
Diaw, S., Lbath, R., Bernard coulette, : État de l’art sur le développement logiciel basé sur les transformations de modèles. Techniques et sciences informatiques 29(4–5), 505–536 (2010)
Lafaye, M.C., Lafaye, J.Y., Wiedemann, A.: L'approche MDA, pour la conception des bases de données relationnelles: une illusoire simplicité. In: archives-ouvertes.fr, pp. 167–181 (2007). https://hal.archives-ouvertes.fr/hal-00361087
OMG Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (2011). https://www.omg.org/spec/QVT/1.1/PDF
OMG MOF QVT Final Adopted Specification (2005). https://www.omg.org/spec/QVT/1.0/Beta1/PDF
OMG Request for Proposal: MOF 2.0 Query/Views/Transformations RFP (2002)
Kurtev, I.: State of the art of QVT: a model transformation language standard. In: Schürr, A., Nagl, M., Zündorf, A. (eds.) Applications of Graph Transformations with Industrial Relevance, pp. 377–393. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89020-1_26
Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557–570 (2002)
Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (2007). https://doi.org/10.1145/1217299.1217302
Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (2007). https://doi.org/10.1109/ICDE.2007.367856
Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2013). https://doi.org/10.1561/0400000042
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
El Mokhtari, J., Abou El Kalam, A., Benhaddou, S., Leroy, JP. (2021). Transformation of PrivUML into XACML Using QVT. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_93
Download citation
DOI: https://doi.org/10.1007/978-3-030-73689-7_93
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-73688-0
Online ISBN: 978-3-030-73689-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)