SlideShare a Scribd company logo
1 of 2
A Model-Driven Methodology for Developing Secure Data-
Management Applications
Abstract
We present a novel model-driven methodology for developing secure data-
management applications. System developers proceed by modeling three different
views of the desired application: its data model, security model, and GUI model.
These models formalize respectively the application’s data domain, authorization
policy, and its graphical interface together with the application’s behavior.
Afterwards a model-transformation function lifts the policy specified by the
security model to the GUI model. This allows a separation of concerns where
behavior and security are specified separately, and subsequently combined to
generate a security-aware GUI model. Finally, a code generator generates a multi-
tier application, along with all support for access control, from the security-aware
GUI model. We report on applications built using our approach and the associated
tool.
GAGNER TECHNOLOGIES
No 1. South Dhandapani Street,
(Opposite to T.Nagar Bus Stand),
T.Nagar, Chennai-600017.
Contact: 044-2432 0908, 9962221452, 8680939422.
Mail to: gagnertechnologies@yahoo.in
Website: www.gagnertechnologies.com

More Related Content

Viewers also liked (6)

Litteratura Latina
Litteratura LatinaLitteratura Latina
Litteratura Latina
 
Astu 5 year strategic plan final
Astu 5 year strategic plan  finalAstu 5 year strategic plan  final
Astu 5 year strategic plan final
 
Academic performance of college students
Academic performance of college studentsAcademic performance of college students
Academic performance of college students
 
13 chapter 4
13 chapter 413 chapter 4
13 chapter 4
 
The Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSbThe Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSb
 
Vision, Mission, Goals and Objectives: What's the Difference?
Vision, Mission, Goals and Objectives:  What's the Difference?Vision, Mission, Goals and Objectives:  What's the Difference?
Vision, Mission, Goals and Objectives: What's the Difference?
 

Similar to A model driven methodology for developing secure data-management applications

DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
cscpconf
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2
Manoo Ordeedolchest
 

Similar to A model driven methodology for developing secure data-management applications (20)

J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
 
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proofMaking your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2
 
The Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App BuildersThe Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App Builders
 
SmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfSmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdf
 

More from gagnertechnologies

NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students
gagnertechnologies
 
IEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH studentsIEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH students
gagnertechnologies
 
Mini projects for MSC computer science
Mini projects for MSC  computer science Mini projects for MSC  computer science
Mini projects for MSC computer science
gagnertechnologies
 
M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing
gagnertechnologies
 
M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking
gagnertechnologies
 
Gagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSCGagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSC
gagnertechnologies
 
Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects
gagnertechnologies
 
M.phil Dissertation for computer science
M.phil Dissertation for  computer scienceM.phil Dissertation for  computer science
M.phil Dissertation for computer science
gagnertechnologies
 
Mechanical Engineering projects in chennai
Mechanical Engineering projects in chennaiMechanical Engineering projects in chennai
Mechanical Engineering projects in chennai
gagnertechnologies
 
M.Phil Thesis for computer science
M.Phil Thesis for computer scienceM.Phil Thesis for computer science
M.Phil Thesis for computer science
gagnertechnologies
 
Final Year Matlab Projects title's list
Final Year Matlab Projects title's listFinal Year Matlab Projects title's list
Final Year Matlab Projects title's list
gagnertechnologies
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
gagnertechnologies
 

More from gagnertechnologies (20)

NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students
 
IEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH studentsIEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH students
 
Mini projects for MSC computer science
Mini projects for MSC  computer science Mini projects for MSC  computer science
Mini projects for MSC computer science
 
MCA/MSC mini projects
MCA/MSC  mini projects MCA/MSC  mini projects
MCA/MSC mini projects
 
Final year projects
Final year projectsFinal year projects
Final year projects
 
IEEE 2015 ME/
IEEE 2015 ME/IEEE 2015 ME/
IEEE 2015 ME/
 
Final year projects1
Final year projects1Final year projects1
Final year projects1
 
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSCFree workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
 
M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing
 
M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking
 
Gagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSCGagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSC
 
IEEE 2014 projects for ECE
IEEE 2014 projects for ECEIEEE 2014 projects for ECE
IEEE 2014 projects for ECE
 
Final year projects1
Final year projects1Final year projects1
Final year projects1
 
Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects
 
M.phil Dissertation for computer science
M.phil Dissertation for  computer scienceM.phil Dissertation for  computer science
M.phil Dissertation for computer science
 
Mechanical Engineering projects in chennai
Mechanical Engineering projects in chennaiMechanical Engineering projects in chennai
Mechanical Engineering projects in chennai
 
M
MM
M
 
M.Phil Thesis for computer science
M.Phil Thesis for computer scienceM.Phil Thesis for computer science
M.Phil Thesis for computer science
 
Final Year Matlab Projects title's list
Final Year Matlab Projects title's listFinal Year Matlab Projects title's list
Final Year Matlab Projects title's list
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Recently uploaded (20)

HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 

A model driven methodology for developing secure data-management applications

  • 1. A Model-Driven Methodology for Developing Secure Data- Management Applications Abstract We present a novel model-driven methodology for developing secure data- management applications. System developers proceed by modeling three different views of the desired application: its data model, security model, and GUI model. These models formalize respectively the application’s data domain, authorization policy, and its graphical interface together with the application’s behavior. Afterwards a model-transformation function lifts the policy specified by the security model to the GUI model. This allows a separation of concerns where behavior and security are specified separately, and subsequently combined to generate a security-aware GUI model. Finally, a code generator generates a multi- tier application, along with all support for access control, from the security-aware GUI model. We report on applications built using our approach and the associated tool.
  • 2. GAGNER TECHNOLOGIES No 1. South Dhandapani Street, (Opposite to T.Nagar Bus Stand), T.Nagar, Chennai-600017. Contact: 044-2432 0908, 9962221452, 8680939422. Mail to: gagnertechnologies@yahoo.in Website: www.gagnertechnologies.com