\documentclass{llncs}

\usepackage{makeidx}  % allows for indexgeneration
\usepackage{graphicx}
\usepackage{tabularx}
\usepackage{booktabs}
\usepackage{dsfont,xspace,boxedminipage}
\usepackage{amsmath,amsfonts,amssymb,here}
\usepackage{enumerate}
\usepackage{mymacros}
%toto

% Macros for proof-reading & corrections
\usepackage[normalem]{ulem} % for \sout
\usepackage{xcolor}
\usepackage{booktabs}
\usepackage{textcomp}
\usepackage{caption,epsfig}
%\usepackage{subcaption}
\usepackage{boxedminipage}
%\DeclareCaptionType{copyrightbox}

\makeatletter
 \let\@copyrightspace\relax
 \makeatother
 
\newcommand{\chunk}[2]{%
	\fcolorbox{black}{yellow}{\bfseries\sffamily\scriptsize#1}%
   {$\blacktriangleright$#2$\blacktriangleleft$}%
}
\newcommand{\yehia}[1]{\chunk{Yehia}{\textbf{\textcolor{red}{\textsl{#1}}}}}
\newcommand{\yves}[1]{\chunk{Yves}{\textbf{\textcolor{blue}{\textsl{#1}}}}}
\newcommand{\moussa}[1]{\chunk{Moussa}{\textbf{\textcolor{violet}{\textsl{#1}}}}}

\newcommand{\cc}[1]{\multicolumn{1}{c}{#1}}

\graphicspath{{Figures/}}


\graphicspath{{Figures/}}

\newcommand{\SAR}{\textsl{S\symbol{64}R}\xspace}
\newcommand{\yes}{\multicolumn{1}{c}{$\checkmark$}}
\newcommand{\no}{\multicolumn{1}{c}{\texttimes}}
\newcommand{\kinda}{\multicolumn{1}{c}{$\circ$}}
\newcommand{\alc}{\hspace{1cm}}
\newcommand{\alcx}{\hspace{0.9cm}}

\begin{document}

\title{\emph{Security@Runtime}: A Flexible MDE approach to Enforce Fine-grained Security Policies
 }

\author{Yehia Elrakaiby, Moussa Amrani \and Yves Le Traon}

\institute{University of Luxembourg, 4 Alphonse Weicker L-2721, Luxembourg,\\
\email{\{yehia.elrakaiby, moussa.amrani, yves.letraon\}@uni.lu}}


\maketitle              % typeset the title of the contribution
\input{Abstract}
\input{Introduction}
\input{Approach}
\input{DSL}
\input{Implementation}

\input{Validation}
\input{RW}
\input{Conclusion}

%\clearpage
%\input{References}

 \begin{thebibliography}{10}

\bibitem{Park2004}
Sandhu, R., Park, J.:
\newblock {The UCON ABC usage control model}.
\newblock In: ACM Transactions on Information and System Security (TISSEC)
  \textbf{7}(1) (2004)  128--174

\bibitem{Ni2008}
Ni, Q., Bertino, E., Lobo, J.:
\newblock {An obligation model bridging access control policies and privacy
  policies}.
\newblock In: SACMAT'08 (2008)  133

\bibitem{Mont2004a}
Mont, M.:
\newblock {Dealing with privacy obligations in enterprises}.
\newblock In: ISSE 2004 — Securing Electronic Business Processes (2004)
   28--30

\bibitem{Erlingsson2000}
Erlingsson, U., Schneider, F.B.:
\newblock {SASI enforcement of security policies}.
\newblock In: NSPW (2000)  87--95

\bibitem{Bauer2005}
Bauer, L., Ligatti, J., Walker, D.:
\newblock {Composing security policies with polymer}.
\newblock In: ACM SIGPLAN Notices \textbf{40}(6) (June 2005)  305

\bibitem{DeOliveira2007}
de~Oliveira, A.S., Wang, E.K., Kirchner, C., Kirchner, H.:
\newblock {Weaving rewrite-based access control policies}.
\newblock In: FMSE (2007)  71--80

\bibitem{Hamlen2008}
Hamlen, K.W., Jones, M.:
\newblock {Aspect-oriented in-lined reference monitors}.
\newblock In: PLAS (2008) ~11

\bibitem{Hussein2012}
Hussein, S., Meredith, P., Roşlu, G.:
\newblock {Security-policy monitoring and enforcement with JavaMOP}.
\newblock In: PLAS (2012)  1--11

\bibitem{Kiczales1997}
Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C.~V., Loingtier, J.-m.:
  J.~Irwin, and C.~Lopes, 
  \newblock {Aspect-Oriented Programming}.
\newblock In: ECOOP (1997) 

  
\bibitem{Lodderstedt2002}
Lodderstedt, T., Basin, D.:
\newblock {SecureUML : A UML-Based Modeling Language for Model-Driven
  Security}.
\newblock In: Proceedings of the 5th International Conference on The
  Unified Modeling Language (2002)  426--441

\bibitem{Mouelhi2008}
Mouelhi, T., Fleurey, F., Baudry, B., Traon, Y.L.:
\newblock {A model-based framework for security policy specification,
  deployment and testing}.
\newblock In: Model Driven Engineering Languages and Systems (1) (2008)  537--552

\bibitem{Morin2010a}
Morin, B., Mouelhi, T., Fleurey, F., {Le Traon}, Y., Barais, O.,
  J\'{e}z\'{e}quel, J.M.:
\newblock {Security-driven model-based dynamic adaptation}.
\newblock In: ASE '10 (2010) 

\bibitem{Basin2011}
Basin, D., Clavel, M., Egea, M.:
\newblock {A decade of model-driven security}.
\newblock In: SACMAT'11, (2011)  1--10

\bibitem{Basin2007a}
Basin, D., Clavel, M., Egea, M.:
\newblock {A Metamodel-Based Approach for Analyzing Security-Design Models}.
\newblock In: MODELS (2007)  420--435

\bibitem{May2006}
May, M., Gunter, C., Lee, I.:
\newblock {Privacy APIs: Access control techniques to analyze and verify legal
  privacy policies}.
\newblock In: 19th IEEE Computer Security Foundations Workshop (CSFW'06).
  (2006)  

\bibitem{Barth2006}
Barth, a., Datta, a., Mitchell, J., Nissenbaum, H.:
\newblock {Privacy and contextual integrity: framework and applications}.
\newblock In: IEEE Symposium on Security and Privacy (2006)  

\bibitem{Barth2007}
Barth, A., Mitchell, J., Datta, A., Sundaram, S.:
\newblock {Privacy and Utility in Business Processes}.
\newblock In: 20th IEEE Computer Security Foundations Symposium
  (2007) 279--294

\bibitem{Lam2009}
Lam, P., Mitchell, J.:
\newblock {A formalization of HIPAA for a medical messaging system}.
\newblock In: Trust, Privacy and Security in Digital Business (2009)  73--85

\bibitem{Basin2006a}
Basin, D., Doser, J., Lodderstedt, T.:
\newblock {Model driven security: From UML models to access control
  infrastructures}.
\newblock In: ACM Transactions on Software Engineering and Methodology (TOSEM)
  \textbf{15}(1) (2006)  39--91

\bibitem{Jan2002}
J\"{u}rjens, J.:
\newblock {UMLsec: Extending UML for secure systems development}.
\newblock In: UML '02 Proceedings of the 5th International Conference on The
  Unified Modeling Language (2002)  412--425

\bibitem{moebius_securemdd:_2009}
Moebius, N., Stenzel, K., Grandy, H., Reif, W.:
\newblock {SecureMDD:} a model-driven development method for secure smart card
  applications.
\newblock In: International Conference on Availability, Reliability and
  Security, 2009. {ARES} '09. (March 2009)  841--846

\bibitem{Cuppens2003}
Cuppens, F., Mi\`{e}ge, A.:
\newblock {Modelling contexts in the Or-BAC model}.
\newblock In: ACSAC (2003)  416--425

\bibitem{Elrakaiby2011}
Elrakaiby, Y., Cuppens, F., Cuppens-Boulahia, N.:
\newblock {Formal enforcement and management of obligation policies}.
\newblock In: Data \& Knowledge Engineering (2011)  1--21

\bibitem{Jajodia1997a}
Jajodia, S., Samarati, P., Subrahmanian, V.:
\newblock {A logical language for expressing authorizations}.
\newblock Proceedings. 1997 IEEE Symposium on Security and Privacy (1997)
  31--42

\bibitem{Kagal2003}
Kagal, L., Finin, T.:
\newblock {A policy language for a pervasive computing environment}.
\newblock In: IEEE 4th International Workshop on Policies
  for Distributed Systems and Networks (2003)  63--74

\bibitem{B:Gosling-etAl}
{G}osling, J., {J}oy, B., {S}teele, G., {B}racha, G., Buckley, A.:
\newblock {T}he {J}ava {L}anguage {S}pecification.
\newblock Addison-Wesley Longman (2013)

\bibitem{Ben-Ghorbel-Talbi2010}
Ben-Ghorbel-Talbi, M., Cuppens, F., Cuppens-Boulahia, N., Bouhoula, A.:
\newblock {A delegation model for extended RBAC}.
\newblock In: International Journal of Information Security \textbf{9}(3) (2010)  209--236

\bibitem{Cuppens2007c}
Cuppens, F., Cuppens-Boulahia, N., Ghorbel, M.B.:
\newblock {High Level Conflict Management Strategies in Advanced Access Control
  Models}.
\newblock In: Electronic Notes in Theoretical Computer Science \textbf{186} (July
  2007)  3--26

\bibitem{autrel2008motorbac}
Autrel, F., Cuppens, F., Cuppens-Boulahia, N., Coma, C.:
\newblock Motorbac 2: a security policy tool.
\newblock In: 3rd Conference on Security in Network Architectures and
  Information Systems (SAR-SSI 2008), Loctudy, France. (2008)  273--288

\bibitem{KatebMTHX12}
Kateb, D.E., Mouelhi, T., Traon, Y.L., Hwang, J., Xie, T.:
\newblock Refactoring access control policies for performance improvement.
\newblock In: ICPE. (2012)  323--334

\bibitem{sanchez_modelsec}
Molina, F., Toval, A., S\'{a}nchez, O., Garcıa-Molina, J.:
\newblock {ModelSec: A Generative Architecture for Model-Driven Security}.
\newblock In: Journal of Universal Computer Science \textbf{15}(15) (2009)
  2957--2980

\bibitem{Breu2007a}
Breu, R., Popp, G., Alam, M.:
\newblock {Model based development of access policies}.
\newblock In: International Journal on Software Tools for Technology Transfer
  \textbf{9}(5-6) (2007)  457--470

\bibitem{emfText}
\newblock {emfText}.
\newblock \url{http://www.emftext.org/index.php/EMFText}

\bibitem{XSB}
\newblock {XSB Porlog}.
\newblock \url{http://xsb.sourceforge.net}

\bibitem{interProlog}
\newblock {interProlog}.
\newblock \url{http://www.declarativa.com/interprolog}


\bibitem{XACML}
\newblock {Extensible Access Control Markup Language (XACML) version 3.0}.
 \url{http://docs.oasis-open.org/xacml/3.0/xacml-3.0-core-spec-cs-01-en.pdf}

\end{thebibliography}

 
\end{document}
