Graph-based specification of access control policies
From MaRDI portal
Publication:2486563
DOI10.1016/j.jcss.2004.11.002zbMath1081.68072OpenAlexW2048038716MaRDI QIDQ2486563
Francesco Parisi-Presicce, Manuel Koch, Luigi V. Mancini
Publication date: 5 August 2005
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2004.11.002
ConsistencySecurityGraph transformationAccess controlConflict detectionGraphical constraintsPolicy verification
Network design and communication in computer systems (68M10) Graph theory (including graph drawing) in computer science (68R10)
Related Items (12)
On the Specification and Verification of Model Transformations ⋮ Initial Conflicts for Transformation Rules with Nested Application Conditions ⋮ Symbolic graphs for attributed graph constraints ⋮ High-Level Programs and Program Conditions ⋮ Resolution-Like Theorem Proving for High-Level Conditions ⋮ Development of Correct Graph Transformation Systems ⋮ A navigational logic for reasoning about graph properties ⋮ -adhesive transformation systems with nested application conditions. Part 1: parallelism, concurrency and amalgamation ⋮ Reasoning with graph constraints ⋮ Correctness of high-level transformation systems relative to nested conditions ⋮ Transformation rules with nested application conditions: critical pairs, initial conflicts \& minimality ⋮ Parallelism and Concurrency in Adhesive High-Level Replacement Systems with Negative Application Conditions
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Formal software specification with refinements and modules of typed graph transformation systems
- Amalgamation of graph transformations: a synchronization mechanism
- Handbook of Graph Grammars and Computing by Graph Transformation
- The category of typed graph grammars and its adjunctions with categories of derivations
- A Formal Model for Role-Based Access Control Using Graph Transformation
This page was built for publication: Graph-based specification of access control policies