SlideShare a Scribd company logo
A Model-Driven Methodology for Developing Secure Data-
Management Applications
Abstract
We present a novel model-driven methodology for developing secure data-
management applications. System developers proceed by modeling three different
views of the desired application: its data model, security model, and GUI model.
These models formalize respectively the application’s data domain, authorization
policy, and its graphical interface together with the application’s behavior.
Afterwards a model-transformation function lifts the policy specified by the
security model to the GUI model. This allows a separation of concerns where
behavior and security are specified separately, and subsequently combined to
generate a security-aware GUI model. Finally, a code generator generates a multi-
tier application, along with all support for access control, from the security-aware
GUI model. We report on applications built using our approach and the associated
tool.
GAGNER TECHNOLOGIES
No 1. South Dhandapani Street,
(Opposite to T.Nagar Bus Stand),
T.Nagar, Chennai-600017.
Contact: 044-2432 0908, 9962221452, 8680939422.
Mail to: gagnertechnologies@yahoo.in
Website: www.gagnertechnologies.com

More Related Content

Viewers also liked

Litteratura Latina
Litteratura LatinaLitteratura Latina
Litteratura Latina
Ramon Osinaga
 
Astu 5 year strategic plan final
Astu 5 year strategic plan  finalAstu 5 year strategic plan  final
Astu 5 year strategic plan final
Biruk Hailu
 
Academic performance of college students
Academic performance of college studentsAcademic performance of college students
Academic performance of college students
Aaron James Mabuyo
 
13 chapter 4
13 chapter 413 chapter 4
13 chapter 4
varsha nihanth lade
 
The Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSbThe Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSb
Don Barker
 
Vision, Mission, Goals and Objectives: What's the Difference?
Vision, Mission, Goals and Objectives:  What's the Difference?Vision, Mission, Goals and Objectives:  What's the Difference?
Vision, Mission, Goals and Objectives: What's the Difference?
Johan Koren
 

Viewers also liked (6)

Litteratura Latina
Litteratura LatinaLitteratura Latina
Litteratura Latina
 
Astu 5 year strategic plan final
Astu 5 year strategic plan  finalAstu 5 year strategic plan  final
Astu 5 year strategic plan final
 
Academic performance of college students
Academic performance of college studentsAcademic performance of college students
Academic performance of college students
 
13 chapter 4
13 chapter 413 chapter 4
13 chapter 4
 
The Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSbThe Dating of New Testament Papyri NTSb
The Dating of New Testament Papyri NTSb
 
Vision, Mission, Goals and Objectives: What's the Difference?
Vision, Mission, Goals and Objectives:  What's the Difference?Vision, Mission, Goals and Objectives:  What's the Difference?
Vision, Mission, Goals and Objectives: What's the Difference?
 

Similar to A model driven methodology for developing secure data-management applications

J017325660
J017325660J017325660
J017325660
IOSR Journals
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
iosrjce
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
IJECEIAES
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
ijitjournal
 
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proofMaking your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
Nagarro
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
cscpconf
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
IJSRED
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
Sujata Raskar
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
ijbuiiir1
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
Aujas Networks Pvt. Ltd.
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
idescitation
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
ijwscjournal
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
DMI
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
Vanya Vladeva
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
IRJET Journal
 
Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2
Manoo Ordeedolchest
 
The Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App BuildersThe Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App Builders
WNS Vuram
 
SmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfSmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdf
CodingMzansi
 

Similar to A model driven methodology for developing secure data-management applications (20)

J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation A UML Profile for Security and Code Generation
A UML Profile for Security and Code Generation
 
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...Decision Making Framework in e-Business Cloud Environment Using Software Metr...
Decision Making Framework in e-Business Cloud Environment Using Software Metr...
 
Making your mobile testing strategy future-proof
Making your mobile testing strategy future-proofMaking your mobile testing strategy future-proof
Making your mobile testing strategy future-proof
 
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
DEPENDABLE PRIVACY REQUIREMENTS BY AGILE MODELED LAYERED SECURITY ARCHITECTUR...
 
Ijsred v2 i5p95
Ijsred v2 i5p95Ijsred v2 i5p95
Ijsred v2 i5p95
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Secured Cloud ERP
Secured Cloud ERPSecured Cloud ERP
Secured Cloud ERP
 
Application Security in Times of Globalization
Application Security in Times of GlobalizationApplication Security in Times of Globalization
Application Security in Times of Globalization
 
micE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile StrategymicE Model for Defining Enterprise Mobile Strategy
micE Model for Defining Enterprise Mobile Strategy
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICESMODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
MODEL-DRIVEN SECURITY ASSESSMENT AND VERIFICATION FOR BUSINESS SERVICES
 
Mobile Application Security by Design
Mobile Application Security by DesignMobile Application Security by Design
Mobile Application Security by Design
 
Privacy and security policies in supply chain
Privacy and security policies in supply chainPrivacy and security policies in supply chain
Privacy and security policies in supply chain
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2Towards smart service research 2020 1010 v2
Towards smart service research 2020 1010 v2
 
The Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App BuildersThe Future of App Development: Trends in No Code App Builders
The Future of App Development: Trends in No Code App Builders
 
SmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdfSmartMeterPaper_csicc21.pdf
SmartMeterPaper_csicc21.pdf
 

More from gagnertechnologies

NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students
gagnertechnologies
 
IEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH studentsIEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH studentsgagnertechnologies
 
Mini projects for MSC computer science
Mini projects for MSC  computer science Mini projects for MSC  computer science
Mini projects for MSC computer science gagnertechnologies
 
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSCFree workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
gagnertechnologies
 
M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing gagnertechnologies
 
M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking gagnertechnologies
 
Gagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSCGagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSC
gagnertechnologies
 
Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects gagnertechnologies
 
M.phil Dissertation for computer science
M.phil Dissertation for  computer scienceM.phil Dissertation for  computer science
M.phil Dissertation for computer sciencegagnertechnologies
 
Mechanical Engineering projects in chennai
Mechanical Engineering projects in chennaiMechanical Engineering projects in chennai
Mechanical Engineering projects in chennaigagnertechnologies
 
M.Phil Thesis for computer science
M.Phil Thesis for computer scienceM.Phil Thesis for computer science
M.Phil Thesis for computer sciencegagnertechnologies
 
Final Year Matlab Projects title's list
Final Year Matlab Projects title's listFinal Year Matlab Projects title's list
Final Year Matlab Projects title's list
gagnertechnologies
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
gagnertechnologies
 

More from gagnertechnologies (20)

NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students NS2 projects for BE/B.TECH/ME.M.TECH students
NS2 projects for BE/B.TECH/ME.M.TECH students
 
IEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH studentsIEEE 2015 NS2 projects for ME/M.TECH students
IEEE 2015 NS2 projects for ME/M.TECH students
 
Mini projects for MSC computer science
Mini projects for MSC  computer science Mini projects for MSC  computer science
Mini projects for MSC computer science
 
MCA/MSC mini projects
MCA/MSC  mini projects MCA/MSC  mini projects
MCA/MSC mini projects
 
Final year projects
Final year projectsFinal year projects
Final year projects
 
IEEE 2015 ME/
IEEE 2015 ME/IEEE 2015 ME/
IEEE 2015 ME/
 
Final year projects1
Final year projects1Final year projects1
Final year projects1
 
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSCFree workshop for CSE/IT/EEE/ECE/MCA/MSC
Free workshop for CSE/IT/EEE/ECE/MCA/MSC
 
M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing M.phil thesis and projects in cloud computing
M.phil thesis and projects in cloud computing
 
M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking M.Phil thesis and projects in Networking
M.Phil thesis and projects in Networking
 
Gagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSCGagner technologies offers internship projects for MCA/MSC
Gagner technologies offers internship projects for MCA/MSC
 
IEEE 2014 projects for ECE
IEEE 2014 projects for ECEIEEE 2014 projects for ECE
IEEE 2014 projects for ECE
 
Final year projects1
Final year projects1Final year projects1
Final year projects1
 
Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects Final year IEEE 2014 BE CSE projects
Final year IEEE 2014 BE CSE projects
 
M.phil Dissertation for computer science
M.phil Dissertation for  computer scienceM.phil Dissertation for  computer science
M.phil Dissertation for computer science
 
Mechanical Engineering projects in chennai
Mechanical Engineering projects in chennaiMechanical Engineering projects in chennai
Mechanical Engineering projects in chennai
 
M
MM
M
 
M.Phil Thesis for computer science
M.Phil Thesis for computer scienceM.Phil Thesis for computer science
M.Phil Thesis for computer science
 
Final Year Matlab Projects title's list
Final Year Matlab Projects title's listFinal Year Matlab Projects title's list
Final Year Matlab Projects title's list
 
IEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's listIEEE 2014 Network security projects title's list
IEEE 2014 Network security projects title's list
 

Recently uploaded

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
Denish Jangid
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
TechSoup
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
HajraNaeem15
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
S. Raj Kumar
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
EduSkills OECD
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
ssuser13ffe4
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
MysoreMuleSoftMeetup
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
Himanshu Rai
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
Nguyen Thanh Tu Collection
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
eBook.com.bd (প্রয়োজনীয় বাংলা বই)
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
iammrhaywood
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
PsychoTech Services
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
Krassimira Luka
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Fajar Baskoro
 

Recently uploaded (20)

Chapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptxChapter wise All Notes of First year Basic Civil Engineering.pptx
Chapter wise All Notes of First year Basic Civil Engineering.pptx
 
Leveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit InnovationLeveraging Generative AI to Drive Nonprofit Innovation
Leveraging Generative AI to Drive Nonprofit Innovation
 
How to deliver Powerpoint Presentations.pptx
How to deliver Powerpoint  Presentations.pptxHow to deliver Powerpoint  Presentations.pptx
How to deliver Powerpoint Presentations.pptx
 
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching AptitudeUGC NET Exam Paper 1- Unit 1:Teaching Aptitude
UGC NET Exam Paper 1- Unit 1:Teaching Aptitude
 
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptxBeyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
Beyond Degrees - Empowering the Workforce in the Context of Skills-First.pptx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
math operations ued in python and all used
math operations ued in python and all usedmath operations ued in python and all used
math operations ued in python and all used
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47Mule event processing models | MuleSoft Mysore Meetup #47
Mule event processing models | MuleSoft Mysore Meetup #47
 
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem studentsRHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
RHEOLOGY Physical pharmaceutics-II notes for B.pharm 4th sem students
 
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
BÀI TẬP BỔ TRỢ TIẾNG ANH LỚP 9 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2024-2025 - ...
 
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdfবাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
বাংলাদেশ অর্থনৈতিক সমীক্ষা (Economic Review) ২০২৪ UJS App.pdf
 
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptxNEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
NEWSPAPERS - QUESTION 1 - REVISION POWERPOINT.pptx
 
Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...Gender and Mental Health - Counselling and Family Therapy Applications and In...
Gender and Mental Health - Counselling and Family Therapy Applications and In...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Temple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation resultsTemple of Asclepius in Thrace. Excavation results
Temple of Asclepius in Thrace. Excavation results
 
Pengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptxPengantar Penggunaan Flutter - Dart programming language1.pptx
Pengantar Penggunaan Flutter - Dart programming language1.pptx
 

A model driven methodology for developing secure data-management applications

  • 1. A Model-Driven Methodology for Developing Secure Data- Management Applications Abstract We present a novel model-driven methodology for developing secure data- management applications. System developers proceed by modeling three different views of the desired application: its data model, security model, and GUI model. These models formalize respectively the application’s data domain, authorization policy, and its graphical interface together with the application’s behavior. Afterwards a model-transformation function lifts the policy specified by the security model to the GUI model. This allows a separation of concerns where behavior and security are specified separately, and subsequently combined to generate a security-aware GUI model. Finally, a code generator generates a multi- tier application, along with all support for access control, from the security-aware GUI model. We report on applications built using our approach and the associated tool.
  • 2. GAGNER TECHNOLOGIES No 1. South Dhandapani Street, (Opposite to T.Nagar Bus Stand), T.Nagar, Chennai-600017. Contact: 044-2432 0908, 9962221452, 8680939422. Mail to: gagnertechnologies@yahoo.in Website: www.gagnertechnologies.com