Graph Transformations for the Specification of Access Control Policies
From MaRDI portal
Publication:4923543
DOI10.1016/S1571-0661(04)80205-6zbMath1263.68083OpenAlexW2019019735MaRDI QIDQ4923543
Francesco Parisi-Presicce, Manuel Koch, Luigi V. Mancini
Publication date: 24 May 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s1571-0661(04)80205-6
Specification and verification (program logics, model checking, etc.) (68Q60) Grammars and rewriting systems (68Q42)
Related Items (1)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Protection in operating systems
- Handbook of Graph Grammars and Computing by Graph Transformation
- The category of typed graph grammars and its adjunctions with categories of derivations
- A Formal Model for Role-Based Access Control Using Graph Transformation
This page was built for publication: Graph Transformations for the Specification of Access Control Policies