Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1383))

Included in the following conference series:

  • 943 Accesses

Abstract

In the context of our work, we devote this paper to the derivation from the PIM level to the PSM level in accordance with the MDA approach. PrivUML, the meta-model that we proposed in our previous work to model the privacy protection requirements, will be transformed into XACML by relying on the QVT transformation language. This paper presents this derivation process as well as the changes made to make our transformation a success. It also discusses the concept of anonymization and our integration proposal to be able to guarantee dynamic data anonymization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. El Mokhtari, J., Abou El Kalam, A., Benhaddou, S., Medroumi, H.: PrivUML: A privacy metamodel. In: Proceedings of the 10th International Conference on Ambient Systems, Networks and Technologies, ANT 2019, pp. 53–60 (2019). https://doi.org/10.1016/j.procs.2019.04.011

  2. Atlam, H.F., Alassafi, M.O., Alenezi, A., Walters, R.J., Wills, G.B.: XACML for building access control policies in Internet of Things. In: Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security, IoTBDS 2018, pp. 253–260 (2019). https://doi.org/10.5220/0006725102530260

  3. Xu, D., Shrestha, R., Shen, N.: Strong mutation testing of XACML policies. In: Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, pp. 105–116 (2020). https://doi.org/10.1145/3381991.3395599

  4. Daoudagh, S., Lonetti, F., Marchetti, E.: XACMET: XACML testing & modeling an automated model-based testing solution for access control systems. Softw. Qual. J. 28, 249–282 (2020). https://doi.org/10.1007/s11219-019-09470-5

    Article  Google Scholar 

  5. Ahmadi, A., Nassiri, M., Rezvani, M.: XACBench: a XACML policy benchmark. Soft. Comput. 24, 16081–16096 (2020). https://doi.org/10.1007/s00500-020-04925-5

    Article  Google Scholar 

  6. OASIS eXtensible Access Control Markup Language (XACML), Version 1.0 (2003). www.oasis-open.org›committees›oasis-xacml-1.0.pdf

  7. Turkmen, F., Crispo, B.: Performance evaluation of XACML PDP implementations. In: Proceedings of the 2008 ACM Workshop on Secure Web Services, pp. 37–44 (2008). https://doi.org/10.1145/1456492.1456499

  8. Laborde, R., Desprats, T.: Gestion de conditions stables dans XACML : intérêt d’une approche par notification. In: GRES 2007, Hammamet, Tunisie, Novembre 2007 (2007). https://www.irit.fr/publis/SIERA/gres2007-desprats-laborde-Soumission.pdf

  9. OASIS eXtensible Access Control Markup Language (XACML), Version 3.0 (2013). https://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-os-en.html

  10. OASIS eXtensible Access Control Markup Language (XACML), Version 2.0 (2005). https://docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf

  11. Rozenberg, G.: Handbook of Graph Grammars and Computing by Graph Transformation (1997)

    Google Scholar 

  12. Koch, M., Pauls, K.: Engineering self-protection for autonomous systems. In: Baresi, L., Heckel, R. (eds.) Fundamental Approaches to Software Engineering. Lecture Notes in Computer Science, vol. 3922, pp. 33–47. Springer, Heidelberg (2006). https://doi.org/10.1007/11693017_5

    Chapter  Google Scholar 

  13. Czarnecki, K., Helsen, S.: Classification of model transformation approaches. In: Proceedings of the 2nd OOPSLA Workshop on Generative Techniques in the Context of Model-Driven Architecture (2003)

    Google Scholar 

  14. Combemale, B.: Ingénierie Dirigée par les Modèles (IDM) – État de l’art. In: archives-ouvertes.fr (2008). https://hal.archives-ouvertes.fr/hal-00371565

  15. Kahania, N., Bagherzadeha, M., Cordya, J.R., Dingela, J., Varro, D.: Survey and classification of model transformation tools. Softw. Syst. Model. 18, 2361–2397 (2019). https://doi.org/10.1007/s10270-018-0665-6

    Article  Google Scholar 

  16. El Kouhen, A.: Spécification d’un Métamodèle pour l’adaptation des outils UML. In: archives-ouvertes.fr (2015). https://tel.archives-ouvertes.fr/tel-00997773

  17. Bézivin, J., Jouault, F., Rosenthal, P., Valduriez, P.: Modeling in the large and modeling in the small. In: Aßmann, U., Aksit, M., Rensink, A. (eds.) Model Driven Architecture, pp. 33–46. Springer, Heidelberg (2005). https://doi.org/10.1007/11538097_3

    Chapter  Google Scholar 

  18. Muller, P.A., Fleurey, F., Vojtisek, D., Dery, Z., Pollet, D., Fondement, F., Studer, P., Jezequel, J.M.: On Executable Meta-Languages applied to Model Transformations. In: archives-ouvertes.fr (2005). https://hal.inria.fr/inria-00000381

  19. Diaw, S., Lbath, R., Bernard coulette, : État de l’art sur le développement logiciel basé sur les transformations de modèles. Techniques et sciences informatiques 29(4–5), 505–536 (2010)

    Article  Google Scholar 

  20. Lafaye, M.C., Lafaye, J.Y., Wiedemann, A.: L'approche MDA, pour la conception des bases de données relationnelles: une illusoire simplicité. In: archives-ouvertes.fr, pp. 167–181 (2007). https://hal.archives-ouvertes.fr/hal-00361087

  21. OMG Meta Object Facility (MOF) 2.0 Query/View/Transformation Specification (2011). https://www.omg.org/spec/QVT/1.1/PDF

  22. OMG MOF QVT Final Adopted Specification (2005). https://www.omg.org/spec/QVT/1.0/Beta1/PDF

  23. OMG Request for Proposal: MOF 2.0 Query/Views/Transformations RFP (2002)

    Google Scholar 

  24. Kurtev, I.: State of the art of QVT: a model transformation language standard. In: Schürr, A., Nagl, M., Zündorf, A. (eds.) Applications of Graph Transformations with Industrial Relevance, pp. 377–393. Springer, Heidelberg (2008). https://doi.org/10.1007/978-3-540-89020-1_26

    Chapter  Google Scholar 

  25. Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzziness Knowl. Based Syst. 10, 557–570 (2002)

    Article  MathSciNet  Google Scholar 

  26. Machanavajjhala, A., Kifer, D., Gehrke, J., Venkitasubramaniam, M.: l-diversity: privacy beyond k-anonymity. ACM Trans. Knowl. Discov. Data (2007). https://doi.org/10.1145/1217299.1217302

    Article  Google Scholar 

  27. Li, N., Li, T., Venkatasubramanian, S.: t-closeness: privacy beyond k-anonymity and l-diversity. In: Proceedings of the IEEE 23rd International Conference on Data Engineering (2007). https://doi.org/10.1109/ICDE.2007.367856

  28. Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Found. Trends® Theor. Comput. Sci. 9(3–4), 211–407 (2013). https://doi.org/10.1561/0400000042

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

El Mokhtari, J., Abou El Kalam, A., Benhaddou, S., Leroy, JP. (2021). Transformation of PrivUML into XACML Using QVT. In: Abraham, A., et al. Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020). SoCPaR 2020. Advances in Intelligent Systems and Computing, vol 1383. Springer, Cham. https://doi.org/10.1007/978-3-030-73689-7_93

Download citation

Publish with us

Policies and ethics