“…In this paper we use TXL [4], a source transformation tool, to transform previously recovered structural and behavioral models [5,6,7,8] to a role-based access control (RBAC) [9] model. The target model, a SecureUML [10] model expressed in XMI 2.1, can then be used to check that the desired access control properties are correctly implemented in the code.…”