Access-control is a key element to manage security in any user interface. This is the first attempt to extend conversational user interfaces with access-control capabilities.
Model powerful security policies for your software designs with our DSL based on the UCON usage control model
We present a novel robust hashing mechanism for models. Robust hashing algorithms (i.e. hashing algorithms that generate similar outputs from similar input data) are useful as a key building block in intellectual property protection, authenticity assessment and fast comparison and retrieval solutions
Model-driven development has become a leading paradigm for developing CPS because it enables the developer to verify safety requirements in early development phases and refine the models into an implementation preserving the verified requirements.
Second edition of our workshop exploring the mutual benefits of combining model-driven engineering and security techniques.
An initial roadmap towards the holistic protection of intellectual property (IP) in collaborative modeling scenarios based on the adaptation of Cryptography, Access-control and Digital Rights Management mechanisms