## An MDA framework supporting OCL (2006)

### Cached

### Download Links

Venue: | ELECTRONIC COMMUNICATIONS OF THE EASST |

Citations: | 9 - 5 self |

### BibTeX

@ARTICLE{Brucker06anmda,

author = {Achim D. Brucker and Jürgen Doser and Burkhart Wolff},

title = { An MDA framework supporting OCL},

journal = {ELECTRONIC COMMUNICATIONS OF THE EASST},

year = {2006}

}

### OpenURL

### Abstract

We present an mda framework, developed in the functional programming language sml, that tries to bridge the gap between formal software development and the needs of industrial software development, e.g., code generation. Overall, our toolchain provides support for software modeling using uml/ocl and guides the user from type-checking and model transformations to code generation and formal analysis of the uml/ocl model. We conclude with a report on our experiences in using a functional language for implementing mda tools.

### Citations

1220 | Role-based access control models
- Sandhu, Coyne, et al.
- 1996
(Show Context)
Citation Context ...in in which it can be used. As a prerequisite, we introduce the tools and technologies our framework is based on. 2.1 Background SecureUML. SecureUML [2] is a security modeling language based on rbac =-=[12]-=-. In particular, SecureUML supports notions of users, roles and permissions, as well as assignments between them: Users can be assigned to roles, and roles are assigned to specific permission. Users a... |

384 |
ML for the Working Programmer
- Paulson
- 1996
(Show Context)
Citation Context ...is model can be directly transformed into a (formal) model for the theorem proving environment hol-ocl [4]. As a distinguishing feature, su4sml is developed in the functional programming language sml =-=[11]-=-. For this reason, implementers of model transformations can profit from several techniques that have proven to be of major importance B. Demuth, D. Chiorean, M. Gogolla, J. Warmer (Eds.): OCL for (Me... |

187 |
The object constraint language : getting your models ready for MDA
- Warmer, Kleppe
(Show Context)
Citation Context ...of the “Company” model (including the ocl specification) presented in the ocl standard [9, Chapter 7] generates 1147 conservative definitions and proven theorems, the larger “Royals and Loyals” model =-=[13]-=- model generates 2472 conservative definitions and proven theorems. The load process usually proceeds in reasonable times. Using hol-ocl (see Figure 3) one can formally prove certain properties of uml... |

174 |
Secure Systems Development With UML
- Jürjens
- 2005
(Show Context)
Citation Context ... of compliance to the semantic foundations of ocl—the underlying semantics is a two-valued dynamic logic with an axiomatic representation of the data-models resulting from class diagrams. With UMLsec =-=[6]-=- we share the conviction that security models should be integrated into the software engineering development process by using uml. However, although UMLsec provides a formal semantics, it does only pr... |

139 |
Using Z: specification, refinement and proof
- Davies, Woodcock
- 1996
(Show Context)
Citation Context ...e exist functions for all operation specifications satisfying the pre- and postconditions for legal states) of a model. Another important property is the refinement relation (e.g., forward-simulation =-=[14]-=-) between two class diagrams, stating that one model is a refinement of the other. A further interesting formal technique allows for proving that an implementation (i.e., a “method” in uml terminology... |

91 | Model driven security: From UML models to access control infrastructures
- Basin, Doser, et al.
(Show Context)
Citation Context ...d language helps to detect many errors at compile time. We also present an implementation of one particular extension of our framework for uml/ocl: namely support for the uml-based language SecureUML =-=[2]-=-. SecureUML is designed to enrich the business logic of a system (represented by a class diagram or a statechart) with a concrete access control model for objects and operations. By a model transforma... |

36 |
The HOL-OCL book
- Brucker, Wolff
- 2006
(Show Context)
Citation Context ...enriched by ocl specifications and access control policies specified using SecureUML. Further, this model can be directly transformed into a (formal) model for the theorem proving environment hol-ocl =-=[4]-=-. As a distinguishing feature, su4sml is developed in the functional programming language sml [11]. For this reason, implementers of model transformations can profit from several techniques that have ... |

30 | A package for inductive relation definitions in HOL
- Melham
- 1991
(Show Context)
Citation Context ...-prone activity to be automated. In this section, we give an overview of the su4sml-based datatype package we implemented to automate this process. In the theorem prover community, a datatype package =-=[7]-=- is a module that allows one to introduce new datatypes and automatically derive certain properties over them. A (conservative) datatype package has two main tasks: 1. generate all required (conservat... |

24 | Symbolic test case generation for primitive recursive functions - Brucker, Wolff - 2004 |

17 | Test-sequence generation with hol-testgen – with an application to firewall testing - Brucker, Wolff - 2007 |

15 | A Model Transformation Semantics and Analysis Methodology for SecureUML
- Brucker, Doser, et al.
- 2006
(Show Context)
Citation Context ...ureUML is designed to enrich the business logic of a system (represented by a class diagram or a statechart) with a concrete access control model for objects and operations. By a model transformation =-=[3]-=-, class systems and operation specifications are transformed such that a combined model is generated, incorporating security and functional aspects. During the transformation, several proof obligation... |

9 | A package for extensible object-oriented data models with an application to IMP
- Brucker, Wolff
- 2006
(Show Context)
Citation Context ...7 a specification (i.e., a pair of pre- and postconditions). An in-depth discussion of these issues is out of the scope of this paper; with respect to the compliance problem, the reader might consult =-=[5]-=-. 6 SecureUML Support As we want to not only support standard uml/ocl models in our framework, but also SecureUML models, we have to extend the framework accordingly. We describe these extensions in t... |

7 | Interactive Testing using HOL-TESTGEN - Brucker, Wolff - 2005 |

4 | Refinement and Retrenchment for Programming Language Data Types. Formal Aspects of Computing 17(4):423–442 - Beckert, Schlager - 2005 |

3 |
Isabelle/ HOL—A Proof Assistant for Higher-Order Logic
- Nipkow, Paulson, et al.
- 2002
(Show Context)
Citation Context ...on over object-oriented models. On the theoretical side, this is achieved by representing uml/ocl as a conservative, shallow embedding into the hol instance of the interactive theorem prover Isabelle =-=[8]-=- while following the standard [9] as closely as possible; in particular, we prove that inheritance can be represented inside the typed λ-calculus with parametric polymorphism. As a consequence of cons... |

2 | The KeY Tool. Software and System Modeling 4:32–54 - Ahrendt, Baar, et al. - 2005 |