Conflicts in Policy-Based Distributed Systems Management
IEEE Transactions on Software Engineering
On the specification and evolution of access control policies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Describing Policies with Graph Constraints and Rules
ICGT '02 Proceedings of the First International Conference on Graph Transformation
Parallelism analysis in rule-based systems using graph grammars
Proceedings of the 3rd International Workshop on Graph-Grammars and Their Application to Computer Science
Hi-index | 0.00 |
Policies are used to control the behavior of large-scale systems. After policies are designed and before policies are implemented, it should be possible to analyze the policies and verify that they behave as expected. Graph transformations provide a good method to carry out the analysis and verification because of the intuitive representation of policies and the mature theory. Here, we show how graph transformations can simulate PONDER policies and use the graph tools AGG and GROOVE to do the static and dynamic analysis.