Content Based Model Transformations: Solutions to Existing Issues with Application in Information Security

  • Justinas Janulevicius Vilnius Gediminas Technical University
  • Simona Ramanauskaite Vilnius Gediminas Technical University
  • Nikolaj Goranin Vilnius Gediminas Technical University
  • Antanas Cenys Vilnius Gediminas Technical University


Model-Driven Engineering uses models in various stages of the software engineering. To reduce the cost of modelling and production, models are reused by transforming. Therefore the accuracy of model transformations plays a key role in ensuring the quality of the process. However, problems exist when trying to transform a very abstract and content dependent model. This paper describes the issues arising from such transformations. Solutions to solve problems in content based model transformation are proposed as well. The usage of proposed solutions allowing realization of semi-automatic transformations was integrated into a tool, designed for OPC/XML drawing file transformations to CySeMoL models. The accuracy of transformations in this tool has been analyzed and presented in this paper to acquire data on the proposed solutions influence to the accuracy in content based model transformation.


[1] L. Levi, M. Amrani, J. Dingel, L. Lambers, R. Salay, G. M. K. Selim, E. Syriani and M. Wimmer (2014), Model Transformation Intents and their Properties, Software Systems & Modeling, 1-38.

[2] L. M. Rose, M. Hermannsdoerfer, S. Mazanek, P. V. Gorp, S. Buchwald, T. Horn and E. Kalnina (2014), Graph and Model Transformation Tools for Model Migration, Software & Systems Modeling, 13(1): 323-359.

[3] G. M. K. Selim, S. Wang, J. R. Cordy and J. Dingel (2012), Model Transformations for Migrating Legacy Models: An Industrial Case Study, ECMFA, LNCS 7349, 90-101.

[4] S. Sen, N. Moha, V. Mahe, O. Barais, B. Baudry, J. M. Jezequel (2012), Reusable Model Transformations, Software & Systems Modeling, 11(1): 111-125.

[5] L. Lambers, S. Hildebrandt, H. Giese and F. Orejas (2012), Attribute Handling for Bidirectional Model Transformations: the Triple Graph Grammar Case, Electronic Communications of the EASST, 49: 1-16.

[6] D. Basin, M. Clavel and M. Egea (2011), A Decade of Model-driven Security, SACMAT11 Proceedings of the 16th ACM symposium on Access control models and technologies, 1-16.

[7] A. D. Brucker, J. Doser and B.Wolff (2006), A Model Transformation Semantics and Analysis Methodology for SecureUML, Lecture notes in computer science, Berlin, Springer, 306-320.

[8] R. Matulevicius and M. Dumas (2011), Towards Model Transformation Between SecureUML and UMLsec for Role-based Access Control, Databases and Information Systems, 6: 1-14.

[9] S. Friedenthal, A. Moore and R. Steiner (2014), A Practical Guide to SysML, Waltham: Elsevier, 2014.

[10] M. Chinosi and A. Trombetta (2012), BPMN: An introduction to the standard, Computer Standards & Interfaces, 34: 124-134.

[11] L. Lemaire and J. Lapon (2014), A SysML Extension for Security Analysis of Industrial Control Systems, 2nd International Symposium for ICS & SCADA Cyber Security Research 2014 (ICS-CSR 2014),1-9.

[12] E. C. Andrade, M. Alves, R. Matos, B. Silva and P. Maciel (2013), OpenMADS: An Open Source Tool for Modeling and Analysis of Distributed Systems, Computer Safety, Reliability, and Security, Lecture Notes in Computer Science, 8153: 277-284.

[13] T. Sommestad, M. Ekstedt and H. Holm (2013), The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures, Systems Journal, 7: 363-373.

[14] M. Biehl (2010), Literature study on model transformations, Royal Institute of Technology, Stockholm, 2010.

[15] K. Czarnecki and S. Helsen (2003), Classification of model transformation approaches, 2nd OOPSLA Workshop on Generative Techniques in the Context of the Model Driven Architecture, 2003.

[16] P. A. Bernstein and S. Melnik (2007), Model Management 2.0: Manipulating Richer Mappings, SIGMOD07, Proceedings of the 2007 ACM SIGMOD international conference on Management of data, 1-12.

[17] T. Frisendal (2012), Business Concept Mapping, Concept Maps: Theory, Methodology, Technology Proc. of the Fifth Int. Conference on Concept Mapping, 1-4.

[18] B. Ganter and R. Wille (2012), Formal Concept Analysis: Mathematical Foundations, Berlin: Springer Science & Business Media, 2012.

[19] T. Mens and P. V. Gorp (2015), A Taxonomy of Model Transformation, Electronic Notes in Theoretical Computer Science, 152: 125-142.

[20] K. Czarnecki and S. Helsen (2006), Feature-Based Survey of Model Transformation Approaches, IBM Syst. J., 45(3): 621-645.

[21] G. Besova, D. Steenken, and H. Wehrheim (2015), Grammar-based model transformations, Comput. Lang. Syst. Struct., 43(C): 116-138.

[22] H. Saada, X. Dolques, M. Huchard, C. Nebut and H. Sahraoui (2012), Generation of operational transformation rules from examples of model transformations, Model Driven Engineering Languages and Systems. Lecture Notes in Computer Science, 7590: 546-561.

[23] M. Wimmer, M. Strommer, H. Kargl and G Kramler (2007), Towards Model Transformation Generation By-Example, HICSS 2007, 40th Annual Hawaii International Conference on System Sciences, 285b.

[24] G. Kappel, P. Langer, W. Retschitzegger, W. Schwinge and M. Wimmer (2012), Model Transformation By-Example: A Survey of the First Wave, Conceptual Modelling and Its Theoretical Foundations, 197-215.

[25] D. Varro (2006), Model Transformation by Example, Model Driven Engineering Languages and Systems, 410-424.

[26] P. Arora and T. Bhalla (2014), A Synonym Based Approach of Data Mining in Search Engine Optimization, International Journal of Computer Trends and Technology (IJCTT), 12(4): 201-205.

[27] B. Ma, Z. Dongsong, Z. Yan and T. Kim (2013), An LDA and Synonym Lexicon Based Approach to Product Feature Extraction from Online Consumer Product Review, Journal of Electronic Commerce Research, 14(4): 304-314

[28] Y. Chang, S. Saito and M. Nakajima (2005), Example-based color transformation for image and video, Proceedings of the 3rd international conference on Computer graphics and interactive techniques in Australasia and South East Asia (GRAPHITE05). ACM, New York, NY, USA, 347-353.

[29] R. Singh and S. Gulwani (2012), Learning semantic string transformations from examples, Proc. VLDB Endow., 5(87): 740-751.

[30] International Organization for Standartization (2012), ISO 29500-2:2012 Information technology - Document description and processing languages - Office Open XML File Formats - Part 2: Open Packaging Conventions. Third Edition, Geneva: International Organization for Standartization.

[31] F. Hermann, H. Ehrig, F. Orejas and U. Golas (2010), Formal Analysis of Functional Behaviour for Model Transformations Based on Triple Graph Grammars, Graph Transformations, Berlin, Springer, 155-170.
How to Cite
JANULEVICIUS, Justinas et al. Content Based Model Transformations: Solutions to Existing Issues with Application in Information Security. INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, [S.l.], v. 11, n. 2, p. 233-247, jan. 2016. ISSN 1841-9844. Available at: <>. Date accessed: 26 sep. 2020. doi:


Cyber Security Modeling Language; Model Transformation; Model Driven Engineering