A formal model for role-based access control using graph transformation
From MaRDI portal
Publication:5862299
DOI10.1007/10722599_8zbMATH Open1487.68067OpenAlexW1510922387MaRDI QIDQ5862299FDOQ5862299
Authors: Manuel Koch, Francesco Parisi-Presicce, Luigi Vincenzo Mancini
Publication date: 7 March 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/10722599_8
Recommendations
- Theoretical Aspects of Computing – ICTAC 2005
- Graph transformations for the specification of access control policies
- scientific article; zbMATH DE number 1701357
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
- Graph-based specification of access control policies
Cites Work
- Handbook of Graph Grammars and Computing by Graph Transformation
- Handbook of Graph Grammars and Computing by Graph Transformation
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Graph transformations for the specification of access control policies
Cited In (16)
- The design of role-based access control models. A formal approach to the derivation of access rights
- Graph transformations for the specification of access control policies
- Graph-based specification of access control policies
- Representation of semantic role based access control system by a colored Petri net
- Integrating role graphs: a tool for security integration
- A Formal Framework for Adaptive Access Control Models
- Theoretical Aspects of Computing – ICTAC 2005
- Data flow analysis from capability lists, with application to RBAC
- GETGRATS: a summary of scientific results (with annotated bibliography)
- Title not available (Why is that?)
- A Verifiable Formal Specification for RBAC Model with Constraints of Separation of Duty
- A role-based access control Petri net and a negotiation tree model
- Decidability of safety in graph-based models for access control
- Representation and Reasoning on Role-Based Access Control Policies with Conceptual Graphs
- Title not available (Why is that?)
- Towards Modal Logic Formalization of Role-Based Access Control with Object Classes
This page was built for publication: A formal model for role-based access control using graph transformation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5862299)