Thus, based on the security characteristics of the elements in the model and the security level of the user of the client computing device 390 attempting to access the model, the content of the model, i.e. the elements, their connections, and other information within the model, may be dynamically modified by application of the transformation rules such that elements that are not accessible by a us