A transformation-driven approach to the verification of security policies in web designs

12Citations
Citations of this article
11Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper, we present a verification framework for security policies of Web designs. The framework is based on the transformation of the models that conform the system design into a formalism where further analysis can be performed. The transformation is specified as a triple graph transformation system, which in addition creates mappings between the elements in the source and target models. This allows the back-annotation of the analysis results to the original model by means of triple graphical patterns. The verification mechanisms are provided by the designer of the Web design language, together with the language specification. However, the complexities of the formalisms are hidden to the developer who uses the language. As case study, we apply these ideas to Labyrinth, a domain specific language oriented to the design of Web applications. The analysis is done by a transformation into the Petri nets formalism, and then performing model checking on the coverability graph. The framework is supported by the meta-modelling tool AToM3. © Springer-Verlag Berlin Heidelberg 2007.

References Powered by Scopus

Petri Nets: Properties, Analysis and Applications

8599Citations
N/AReaders
Get full text

Atom<sup>3</sup>: A tool for multi-formalism and meta-modelling

355Citations
N/AReaders
Get full text

Designing Data-Intensive Web Applications

151Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Supporting user-oriented analysis for multi-view domain-specific visual languages

56Citations
N/AReaders
Get full text

Modelling methods for web application verification and testing: State of the art

51Citations
N/AReaders
Get full text

Round-trip support for extra-functional property management in model-driven engineering of embedded systems

21Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Guerra, E., Sanz, D., Díaz, P., & Aedo, I. (2007). A transformation-driven approach to the verification of security policies in web designs. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4607 LNCS, pp. 269–284). Springer Verlag. https://doi.org/10.1007/978-3-540-73597-7_22

Readers over time

‘10‘11‘12‘14‘15‘17‘18‘19‘21‘2300.751.52.253

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 6

60%

Professor / Associate Prof. 3

30%

Lecturer / Post doc 1

10%

Readers' Discipline

Tooltip

Computer Science 7

78%

Decision Sciences 1

11%

Engineering 1

11%

Save time finding and organizing research with Mendeley

Sign up for free
0