@article{MTMT:34300319, title = {One-Way Model Transformations in the Context of the Technology-Roadmapping Tool IRIS}, url = {https://m2.mtmt.hu/api/publication/34300319}, author = {Sihler, Florian and Tichy, Matthias and Pietron, Jakob}, doi = {10.5381/jot.2023.22.2.a2}, journal-iso = {J OBJECT TECHNOL}, journal = {JOURNAL OF OBJECT TECHNOLOGY}, volume = {22}, unique-id = {34300319}, issn = {1660-1769}, abstract = {CONTEXT: Today's industry heavily depends on the collaboration of multiple companies that have to exchange a lot of information. When these companies use technology roadmapping and model-driven development, this leads to the exchange of very large models, which is governed by competition laws, and the companies' interest in protecting their intellectual property. OBJECTIVE: We suggest an automated one-way model transformation approach to remove content worth protecting from a given model in the context of the graphical technology-roadmapping modeling tool IRIS. MET HOD: We elaborate constraints that an obfuscated model must fulfill. Based on these, we systematically identify and analyze appropriate one-way transformations to enable the desired level of obfuscation, implementing a proof of concept implementation in IRIS. Our approach first transforms the model into a flattened constraint system and uses nine selected transformations-ranging from constant folding to the tailoring of expressions-to create a new model without the sensitive content. We evaluate our transformations according to a set of predefined properties and constraints regarding their effects on the behavior of the model and the inferable information. LIM ITATIONS: Our obfuscation concerns the model and the embedded formulas but does not deal with individual data, which may be subject to privacy-related issues. RESULTS: We find that the identified transformations are applicable in practice and that they can remove a lot of sensitive information from a given model. Future work includes dealing with individual data and protecting against reverse-engineering attacks by domain experts.}, keywords = {model transformation; Compliance; Technology roadmapping; Model Obfuscation; IP-Protection}, year = {2023}, orcid-numbers = {Sihler, Florian/0000-0001-7195-7801} } @inproceedings{MTMT:33003762, title = {EOQ: An Open Source Interface for a More DAMMMMN Domain-specific Model Utilization}, url = {https://m2.mtmt.hu/api/publication/33003762}, author = {Annighoefer, Bjoern and Brunner, Matthias and Luettig, Bastian and Schoepf, Julian}, booktitle = {2021 ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C)}, doi = {10.1109/MODELS-C53483.2021.00075}, unique-id = {33003762}, abstract = {Determinism, automation, multi-element, multimodel, multi-computer, multi-user support and neutrality (DAMMMMN) are in our opinion important qualities of domain-specific modeling, and are enablers for highly automated workflows and collaborative modeling. An improvement in any of these qualities eases the development of software using domain-specific models, and enables the design of more sophisticated Model-based Engineering Environments (MBEE). In the context of current programmatic interfaces for domain-specific models, we see room for improvement, and propose Essential Object Query (EOQ) as a generic interface between domain-specific (meta-)models and their users. This interface integrates ACID transactions, complex commands, model queries, reflection abstractions, mass data manipulation, object serialization, automation, notifications, change tracking, and a model database, such that a progranunatic decoupling between models and their usage is achieved. Our interface is agnostic with respect to the programming language(s) and domain-specific modeling framework(s). A prototype is implemented with Python on top of EMF's meta-model ECORE. An example of a signal routing application in an architecture model of a cyber-physical system is used to demonstrate our interface and to evaluate its impact on the individual DAMMMMN qualities.}, keywords = {EVENT; query language; Meta-model; collaborative modeling; transaction; Domain-specific; model interface; scripting language; model database; change-based}, year = {2021}, pages = {484-493} } @inproceedings{MTMT:33141415, title = {Collaborative Model-Driven Software Engineering: A Systematic Update}, url = {https://m2.mtmt.hu/api/publication/33141415}, author = {David, Istvan and Aslam, Kousar and Faridmoayer, Sogol and Malavolta, Ivano and Syriani, Eugene and Lago, Patricia}, booktitle = {2021 ACM/IEEE 24th International Conference on Model Driven Engineering Languages and Systems (MODELS)}, doi = {10.1109/MODELS50736.2021.00035}, unique-id = {33141415}, year = {2021}, pages = {273-284} } @article{MTMT:32403024, title = {Facet-oriented Modelling}, url = {https://m2.mtmt.hu/api/publication/32403024}, author = {De Lara, Juan and Guerra, Esther and Kienzle, Jorg}, doi = {10.1145/3428076}, journal-iso = {ACM T SOFTW ENG METH}, journal = {ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY}, volume = {30}, unique-id = {32403024}, issn = {1049-331X}, abstract = {Models are the central assets in model-driven engineering (MDE), as they are actively used in all phases of software development. Models are built using metamodel-based languages, and so objects in models are typed by a metamodel class. This typing is static, established at creation time, and cannot be changed later. Therefore, objects in MDE are closed and fixed with respect to the class they conform to, the fields they have, and the well-formedness constraints they must comply with. This hampers many MDE activities, like the reuse of model-related artefacts such as transformations, the opportunistic or dynamic combination of metamodels, or the dynamic reconfiguration of models.To alleviate this rigidity, we propose making model objects open so that they can acquire or drop so-called facets. These contribute with a type, fields and constraints to the objects holding them. Facets are defined by regular metamodels, hence being a lightweight extension of standard metamodelling. Facet metamodels may declare usage interfaces, as well as laws that govern the assignment of facets to objects (or classes).This article describes our proposal, reporting on a theory, analysis techniques, and an implementation. The benefits of the approach are validated on the basis of five case studies dealing with annotation models, transformation reuse, multi-view modelling, multi-level modelling, and language product lines.}, keywords = {Flexible modelling; Metamodelling; role-based modelling; MetaDepth}, year = {2021}, eissn = {1557-7392}, orcid-numbers = {Guerra, Esther/0000-0002-2818-2278} } @article{MTMT:31128076, title = {Scalable modeling technologies in the wild: an experience report on wind turbines control applications development}, url = {https://m2.mtmt.hu/api/publication/31128076}, author = {Abel, Gómez and ·Xabier, Mendialdua and ·Konstantinos, Barmpis and Bergmann, Gábor and Jordi, Cabot and ·Xabier, de Carlos and Debreceni, Csaba and ·Antonio, Garmendia and ·Dimitrios, S. Kolovos and ·Juan, de Lara}, doi = {10.1007/s10270-020-00776-8}, journal-iso = {SOFTW SYST MODEL}, journal = {SOFTWARE AND SYSTEMS MODELING}, volume = {19}, unique-id = {31128076}, issn = {1619-1366}, year = {2020}, eissn = {1619-1374}, pages = {1229-1261}, orcid-numbers = {Bergmann, Gábor/0000-0002-2556-2582; Debreceni, Csaba/0000-0002-6263-7758} } @inproceedings{MTMT:33141416, title = {Towards access control for collaborative modelling apps}, url = {https://m2.mtmt.hu/api/publication/33141416}, author = {Brunschwig, Léa and Guerra, Esther and de Lara, Juan}, booktitle = {Proceedings of the 23rd ACM/IEEE International Conference on Model Driven Engineering Languages and Systems: Companion Proceedings}, doi = {10.1145/3417990.3420201}, unique-id = {33141416}, year = {2020}, pages = {1-10} } @article{MTMT:31707149, title = {Model-based characterization of fine-grained access control authorization for SQL queries}, url = {https://m2.mtmt.hu/api/publication/31707149}, author = {Hoang Nguyen Phuoc Bao and Clavel, Manuel}, doi = {10.5381/jot.2020.19.3.a15}, journal-iso = {J OBJECT TECHNOL}, journal = {JOURNAL OF OBJECT TECHNOLOGY}, volume = {19}, unique-id = {31707149}, issn = {1660-1769}, abstract = {We propose a model-based characterization of fine-grained access control (FGAC) authorization for SQL queries. More specifically, we define a predicate AuthQuery() that represents whether a user is authorized by an FGAC-policy to execute a SQL query on a database. It is characteristic of FGAC-policies that access control decisions depend on dynamic information, namely whether the current state of the system satisfies some "authorization constraints". In our proposal, FGAC-policies are modeled using a dialect of SecureUML, and authorization constraints are specified using the Object Constraint Language (OCL). To illustrate our definition of the predicate AuthQuery(), we provide examples of authorization decisions for different SQL queries, attempted by different users, in different scenarios, and with respect to different FGAC-policies. Interestingly, the availability of mappings from OCL to SQL opens up the possibility of implementing AuthQuery() within the database and, consequently, of enforcing FGAC-policies following a model-driven approach.}, keywords = {authorization; OCL; SQL; Fine-grained access control; Model-driven security; SecureUML}, year = {2020} } @article{MTMT:30748493, title = {Diversity of Graph Models and Graph Generators in Mutation Testing}, url = {https://m2.mtmt.hu/api/publication/30748493}, author = {Semeráth, Oszkár and Farkas, Rebeka and Bergmann, Gábor and Varró, Dániel}, doi = {10.1007/s10009-019-00530-6}, journal-iso = {INT J SOFTW TOOLS TECHN TRANSFER}, journal = {INTERNATIONAL JOURNAL ON SOFTWARE TOOLS FOR TECHNOLOGY TRANSFER}, volume = {22}, unique-id = {30748493}, issn = {1433-2779}, year = {2020}, eissn = {1433-2787}, pages = {57-78}, orcid-numbers = {Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} } @article{MTMT:3330414, title = {Enforcing Fine-grained Access Control for Secure Collaborative Modelling using Bidirectional Transformations}, url = {https://m2.mtmt.hu/api/publication/3330414}, author = {Debreceni, Csaba and Bergmann, Gábor and Ráth, István Zoltán and Varró, Dániel}, doi = {10.1007/s10270-017-0631-8}, journal-iso = {SOFTW SYST MODEL}, journal = {SOFTWARE AND SYSTEMS MODELING}, volume = {18}, unique-id = {3330414}, issn = {1619-1366}, year = {2019}, eissn = {1619-1374}, pages = {1737-1769}, orcid-numbers = {Debreceni, Csaba/0000-0002-6263-7758; Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} } @article{MTMT:30413286, title = {Declarative Specification of Bidirectional Transformations Using Design Patterns}, url = {https://m2.mtmt.hu/api/publication/30413286}, author = {Lano, Kevin and Kolahdouz-Rahimi, Shekoufeh and Yassipour-Tehrani, Sobhan}, doi = {10.1109/ACCESS.2018.2889399}, journal-iso = {IEEE ACCESS}, journal = {IEEE ACCESS}, volume = {7}, unique-id = {30413286}, issn = {2169-3536}, year = {2019}, eissn = {2169-3536}, pages = {5222-5249} } @article{MTMT:3394459, title = {Secure Views for Collaborative Modeling}, url = {https://m2.mtmt.hu/api/publication/3394459}, author = {Debreceni, Csaba and Bergmann, Gábor and Ráth, István Zoltán and Varró, Dániel}, doi = {10.1109/MS.2018.290101728}, journal-iso = {IEEE SOFTWARE}, journal = {IEEE SOFTWARE}, volume = {35}, unique-id = {3394459}, issn = {0740-7459}, year = {2018}, eissn = {1937-4194}, pages = {32-38}, orcid-numbers = {Debreceni, Csaba/0000-0002-6263-7758; Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} } @inproceedings{MTMT:30710828, title = {Facet-oriented modelling: open objects for model-driven engineering}, url = {https://m2.mtmt.hu/api/publication/30710828}, author = {de Lara, Juan and Guerra, Esther and Kienzle, Jörg and Hattab, Yanis}, booktitle = {Proceedings of the 11th ACM SIGPLAN International Conference on Software Language Engineering - SLE 2018}, doi = {10.1145/3276604.3276610}, unique-id = {30710828}, year = {2018}, pages = {147-159} } @article{MTMT:30710834, title = {An improved privacy preservation technique in health-cloud}, url = {https://m2.mtmt.hu/api/publication/30710834}, author = {Kundalwal, Mayank Kumar and Chatterjee, Kakali and Singh, Ashish}, doi = {10.1016/j.icte.2018.10.002}, journal-iso = {ICT EXPRESS}, journal = {INFORMATION & COMMUNICATIONS TECHNOLOGY EXPRESS}, volume = {online}, unique-id = {30710834}, issn = {2405-9595}, year = {2018}, eissn = {2405-9595}, pages = {https://www.sciencedirect.com/science/article/pii/S2405959518303850} } @article{MTMT:27470687, title = {A survey of model transformation design patterns in practice}, url = {https://m2.mtmt.hu/api/publication/27470687}, author = {Lano, Kevin and Kolahdouz-Rahimi, Shekoufeh and Yassipour-Tehrani, Sobhan and Sharbaf, Mohammadreza}, doi = {10.1016/j.jss.2018.03.001}, journal-iso = {J SYST SOFTWARE}, journal = {JOURNAL OF SYSTEMS AND SOFTWARE}, volume = {140}, unique-id = {27470687}, issn = {0164-1212}, year = {2018}, eissn = {1873-1228}, pages = {48-73} } @article{MTMT:27463092, title = {On Watermarking for Collaborative Model-Driven Engineering}, url = {https://m2.mtmt.hu/api/publication/27463092}, author = {Martínez, Salvador and Sébastien, Gérard and Jordi, Cabot}, doi = {10.1109/ACCESS.2018.2841020}, journal-iso = {IEEE ACCESS}, journal = {IEEE ACCESS}, volume = {6}, unique-id = {27463092}, issn = {2169-3536}, year = {2018}, eissn = {2169-3536}, pages = {29715-29728} } @inproceedings{MTMT:33141421, title = {Towards efficient evaluation of rule-based permissions for fine-grained access control in collaborative modeling}, url = {https://m2.mtmt.hu/api/publication/33141421}, author = {Bergmann, Gábor and Debreceni, Csaba and Ráth, István and Varr, Dániel}, volume = {2019}, unique-id = {33141421}, abstract = {In case of collaborative modeling, complex systems are developed by different stakeholders, in offline submissions or online sessions. To guarantee security, access control policies need to be enforced during the collaboration. As levels of required confidentiality and integrity may vary across model parts, we have previously proposed fine-grained rule-based access control, and shown how to consistently interpret flexible access control policies. Now we present an improvement on the previous results allowing for incremental recomputation, which is vital for online collaboration scenarios. Our approach is illustrated using a case study of the MONDO EU project.}, year = {2017}, pages = {135-144} } @article{MTMT:30380195, title = {BME VIK annual research report on electrical engineering and computer science 2016}, url = {https://m2.mtmt.hu/api/publication/30380195}, author = {Charaf, Hassan and Harsányi, Gábor and Poppe, András and Imre, Sándor and Kiss, Bálint and Dabóczi, Tamás and Katona, Gyula Y. and Nagy, Lajos and Magyar, Gábor and Kiss, István}, doi = {10.3311/PPee.11067}, journal-iso = {PERIOD POLYTECH ELECTR ENG COMP SCI}, journal = {PERIODICA POLYTECHNICA-ELECTRICAL ENGINEERING AND COMPUTER SCIENCE}, volume = {61}, unique-id = {30380195}, issn = {2064-5260}, year = {2017}, eissn = {2064-5279}, pages = {83-115}, orcid-numbers = {Harsányi, Gábor/0000-0002-8514-8842; Poppe, András/0000-0002-9381-6716; Imre, Sándor/0000-0002-2883-8919; Dabóczi, Tamás/0000-0002-7371-2186; Katona, Gyula Y./0000-0002-5119-8681} } @inproceedings{MTMT:3330401, title = {Property-based Locking in Collaborative Modeling}, url = {https://m2.mtmt.hu/api/publication/3330401}, author = {Debreceni, Csaba and Bergmann, Gábor and Ráth, István Zoltán and Varró, Dániel}, booktitle = {2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS 2017)}, doi = {10.1109/MODELS.2017.33}, unique-id = {3330401}, year = {2017}, pages = {199-209}, orcid-numbers = {Debreceni, Csaba/0000-0002-6263-7758; Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} } @inproceedings{MTMT:3350095, title = {The MONDO Collaboration Framework: Secure Collaborative Modeling over Existing Version Control Systems}, url = {https://m2.mtmt.hu/api/publication/3350095}, author = {Debreceni, Csaba and Bergmann, Gábor and Búr, Márton and Ráth, István Zoltán and Varró, Dániel}, booktitle = {ESEC/FSE 2017: PROCEEDINGS OF THE 2017 11TH JOINT MEETING ON FOUNDATIONS OF SOFTWARE ENGINEERING}, doi = {10.1145/3106237.3122829}, unique-id = {3350095}, year = {2017}, pages = {984-988}, orcid-numbers = {Debreceni, Csaba/0000-0002-6263-7758; Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} } @inproceedings{MTMT:33141419, title = {Advanced techniques and tools for secure collaborative modeling}, url = {https://m2.mtmt.hu/api/publication/33141419}, author = {Debreceni, Csaba}, volume = {2019}, unique-id = {33141419}, abstract = {Model-based systems engineering of critical cyber-physical systems necessitates effective collaboration between different collaborators, teams, stakeholders. Engineering artifacts stored in model repositories are concurrently developed in either offline (checkout-modify-commit) or online (GoogleDoc-style) scenario where the confidentiality and integrity of design artifacts need to be protected by access control policies. Unfortunately, traditional approaches for managing concurrent code development do not naturally extend to collaborative modeling which implies novel challenges. My research focuses on developing (i) a general secure collaboration scheme that guarantees that high-level access control policies are respected during collaboration and it can be integrated into existing version control systems (e.g. SVN) to support offline scenario; (ii) automated merging and fine-grained locking to enhance the efficiency of conflict resolution and prevention upon concurrent modification of the models; (iii) derivation and incremental maintenance of view models to provide specific focus of the designers by abstracting from unnecessary details of the underlying system model.}, year = {2017}, pages = {549-554} } @inproceedings{MTMT:26697376, title = {Envisioning the future of collaborative model-driven software engineering}, url = {https://m2.mtmt.hu/api/publication/26697376}, author = {Di Ruscio, Davide and Franzago, Mirco and Muccini, Henry and Malavolta, Ivano}, booktitle = {Proceedings of the 39th International Conference on Software Engineering Companion}, doi = {10.1109/ICSE-C.2017.143}, publisher = {IEEE Press}, unique-id = {26697376}, year = {2017}, pages = {219-221} } @inproceedings{MTMT:3277952, title = {On the opportunities of scalable modeling technologies: An experience report on wind turbines control applications development}, url = {https://m2.mtmt.hu/api/publication/3277952}, author = {Gómez, A and Mendialdua, X and Bergmann, Gábor and Cabot, J and Debreceni, Csaba and Garmendia, A and Kolovos, DS and de Lara, J and Trujillo, S}, booktitle = {Modelling Foundations and Applications}, doi = {10.1007/978-3-319-61482-3_18}, unique-id = {3277952}, year = {2017}, pages = {300-315}, orcid-numbers = {Bergmann, Gábor/0000-0002-2556-2582; Debreceni, Csaba/0000-0002-6263-7758} } @inproceedings{MTMT:27167613, title = {Active Domain-Specific Languages: making every mobile user a modeller}, url = {https://m2.mtmt.hu/api/publication/27167613}, author = {Vaquero-Melchor, Diego and Palomares, Javier and Guerra, Esther and de Lara, Juan}, booktitle = {2017 ACM/IEEE 20th International Conference on Model Driven Engineering Languages and Systems (MODELS)}, doi = {10.1109/MODELS.2017.13}, publisher = {IEEE Computer Society}, unique-id = {27167613}, year = {2017}, pages = {75-82} } @CONFERENCE{MTMT:3161893, title = {Deriving Effective Permissions for Modeling Artifacts from Fine-grained Access Control Rules}, url = {https://m2.mtmt.hu/api/publication/3161893}, author = {Debreceni, Csaba and Bergmann, Gábor and Ráth, István Zoltán and Varró, Dániel}, booktitle = {Proceedings of the 1st International Workshop on Collaborative Modelling in MDE (COMMitMDE 2016)}, unique-id = {3161893}, abstract = {In case of collaborative modeling, complex systems are developed by different stakeholders. To guarantee security, access control policies need to be enforced during the collaboration. Levels of required confidentiality and integrity may vary across modeling artifacts, and even features of a single model element. Fine-grained rule-based access control was proposed to meet the needs of exible and concise access control. Rulebased policies are inherently subject to conicts between the rules; these conicts should be interpreted in a consistent but also predictable way that caters to the preferences of the policy engineer. We propose a deterministic, parameterizable resolution strategy between conicting rules to calculate effective access permissions for each fact in the model. Our approach is illustrated using a case study of the MONDO EU project.}, year = {2016}, pages = {17-26}, orcid-numbers = {Debreceni, Csaba/0000-0002-6263-7758; Bergmann, Gábor/0000-0002-2556-2582; Varró, Dániel/0000-0002-8790-252X} }