Graph-based specification of access control policies
DOI10.1016/J.JCSS.2004.11.002zbMATH Open1081.68072OpenAlexW2048038716MaRDI QIDQ2486563FDOQ2486563
Francesco Parisi-Presicce, Manuel Koch, Luigi Vincenzo Mancini
Publication date: 5 August 2005
Published in: Journal of Computer and System Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jcss.2004.11.002
SecurityConsistencyGraph transformationAccess controlConflict detectionGraphical constraintsPolicy verification
Graph theory (including graph drawing) in computer science (68R10) Network design and communication in computer systems (68M10)
Cites Work
- Handbook of Graph Grammars and Computing by Graph Transformation
- Formal software specification with refinements and modules of typed graph transformation systems
- Title not available (Why is that?)
- Amalgamation of graph transformations: a synchronization mechanism
- Title not available (Why is that?)
- The category of typed graph grammars and its adjunctions with categories of derivations
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- A Formal Model for Role-Based Access Control Using Graph Transformation
Cited In (16)
- -adhesive transformation systems with nested application conditions. Part 1: parallelism, concurrency and amalgamation
- Title not available (Why is that?)
- A navigational logic for reasoning about graph properties
- Initial Conflicts for Transformation Rules with Nested Application Conditions
- Title not available (Why is that?)
- Resolution-Like Theorem Proving for High-Level Conditions
- Correctness of high-level transformation systems relative to nested conditions
- Reasoning with graph constraints
- Development of Correct Graph Transformation Systems
- Transformation rules with nested application conditions: critical pairs, initial conflicts \& minimality
- On the Specification and Verification of Model Transformations
- Symbolic graphs for attributed graph constraints
- Parallelism and concurrency in adhesive high-level replacement systems with negative application conditions
- High-Level Programs and Program Conditions
- Title not available (Why is that?)
- Title not available (Why is that?)
Recommendations
- Title not available (Why is that?) π π
- Title not available (Why is that?) π π
- Graph Transformations for the Specification of Access Control Policies π π
- A graph-based framework for the analysis of access control policies π π
- Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs π π
This page was built for publication: Graph-based specification of access control policies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2486563)