We propose the integration of digital watermarking techniques in the model-driven engineering development lifecycle as way to protect the intellectual property of your modeling artefacts in collaborative modeling scenarios
Our work helps security experts to visualize, (automatically) analyse and manipulate web security access-control policies, specially for Java EE
Automatic extraction of security policies that generates an RBAC security model from an existing database by analyzing its dictionary, views, triggers,…
Have you ever thought about using model transformations to specify and enforce access-control policies? Check how we do it
Definition of security policies is perceived as an important activity by developers, but at the same time they say it’s complex and error prone. Read the full results
Help us (the researchers) to help you by answering this survey so that we can then target our security analysis algorithms to what you need!