Graph-based specification of access control policies
DOI10.1016/J.JCSS.2004.11.002zbMATH Open1081.68072OpenAlexW2048038716MaRDI QIDQ2486563FDOQ2486563
Authors: Manuel Koch, Luigi Vincenzo Mancini, Francesco Parisi-Presicce
Publication date: 5 August 2005
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2004.11.002
Recommendations
- scientific article; zbMATH DE number 2087433
- scientific article; zbMATH DE number 1701357
- Graph transformations for the specification of access control policies
- A graph-based framework for the analysis of access control policies
- Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs
SecurityConsistencyGraph transformationAccess controlConflict detectionGraphical constraintsPolicy verification
Graph theory (including graph drawing) in computer science (68R10) Network design and communication in computer systems (68M10)
Cites Work
- Handbook of Graph Grammars and Computing by Graph Transformation
- Formal software specification with refinements and modules of typed graph transformation systems
- Title not available (Why is that?)
- Amalgamation of graph transformations: a synchronization mechanism
- Title not available (Why is that?)
- The category of typed graph grammars and its adjunctions with categories of derivations
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A formal model for role-based access control using graph transformation
Cited In (29)
- Flexible support for multiple access control policies
- Specifying and Reasoning About Dynamic Access-Control Policies
- Graph transformations for the specification of access control policies
- -adhesive transformation systems with nested application conditions. Part 1: parallelism, concurrency and amalgamation
- A framework for the analysis of access control policies with emergency management
- Title not available (Why is that?)
- A navigational logic for reasoning about graph properties
- Title not available (Why is that?)
- Resolution-Like Theorem Proving for High-Level Conditions
- Formal specification and validation of security policies
- A formal model for role-based access control using graph transformation
- A graph-based framework for the analysis of access control policies
- Correctness of high-level transformation systems relative to nested conditions
- Graph-theoretic method for merging security system specifications
- Reasoning with graph constraints
- Development of Correct Graph Transformation Systems
- Initial conflicts for transformation rules with nested application conditions
- Transformation rules with nested application conditions: critical pairs, initial conflicts \& minimality
- On the Specification and Verification of Model Transformations
- Symbolic graphs for attributed graph constraints
- Decidability of safety in graph-based models for access control
- Parallelism and concurrency in adhesive high-level replacement systems with negative application conditions
- Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs
- Semantic access control model: a formal specification
- Specification and verification of access control policies in EB\(^{3}\)SEC: work in progress
- Layered graph logic as an assertion language for access control policy models
- High-Level Programs and Program Conditions
- Title not available (Why is that?)
- Title not available (Why is that?)
This page was built for publication: Graph-based specification of access control policies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2486563)