Second edition of our workshop exploring the mutual benefits of combining model-driven engineering and security techniques.
Using Robust Hashing and Locality Sensitive Hashing techniques to help instructors quickly narrow down potential plagiarisms in modeling assignments
An initial roadmap towards the holistic protection of intellectual property (IP) in collaborative modeling scenarios based on the adaptation of Cryptography, Access-control and Digital Rights Management mechanisms
We present a novel robust hashing mechanism for models. Robust hashing algorithms (i.e. hashing algorithms that generate similar outputs from similar input data) are useful as a key building block in intellectual property protection, authenticity assessment and fast comparison and retrieval solutions
Read about our access-control mechanisms for models. We rely on a new domain-specific language tailored to the definition of RBAC rules on models and on its enforcement thanks to the automatic generation of security compliant (virtual) views.