Logic programming as hypergraph rewriting
TAPSOFT '91 Proceedings of the international joint conference on theory and practice of software development on Colloquium on trees in algebra and programming (CAAP '91): vol 1
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: vol. 2: applications, languages, and tools
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
Lattice-Based Access Control Models
Computer
Spatial and Temporal Refinement of Typed Graph Transformation Systems
MFCS '98 Proceedings of the 23rd International Symposium on Mathematical Foundations of Computer Science
A Formal Model for Role-Based Access Control Using Graph Transformation
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
A graph-based formalism for RBAC
ACM Transactions on Information and System Security (TISSEC)
A logical framework for reasoning about access control models
ACM Transactions on Information and System Security (TISSEC)
Decidability of Safety in Graph-Based Models for Access Control
ESORICS '02 Proceedings of the 7th European Symposium on Research in Computer Security
Conflict Detection and Resolution in Access Control Policy Specifications
FoSSaCS '02 Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures
Describing Policies with Graph Constraints and Rules
ICGT '02 Proceedings of the First International Conference on Graph Transformation
Dynamic access control: preserving safety and trust for network defense operations
Proceedings of the eighth ACM symposium on Access control models and technologies
Access control and trust in the use of widely distributed services
Software—Practice & Experience - Special issue: Middleware
A System to Specify and Manage Multipolicy Access Control Models
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Meta-Policies for Distributed Role-Based Access Control Systems
POLICY '02 Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY'02)
Formal access control analysis in the software development process
Proceedings of the 2003 ACM workshop on Formal methods in security engineering
Verification and change-impact analysis of access-control policies
Proceedings of the 27th international conference on Software engineering
Graph-based specification of access control policies
Journal of Computer and System Sciences
An approach to evaluate policy similarity
Proceedings of the 12th ACM symposium on Access control models and technologies
Verifying compliance of trusted programs
SS'08 Proceedings of the 17th conference on Security symposium
Security and privacy for geospatial data: concepts and research directions
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
Analysis of virtual machine system policies
Proceedings of the 14th ACM symposium on Access control models and technologies
Policy Analysis and Verification by Graph Transformation Tools
Electronic Notes in Theoretical Computer Science (ENTCS)
A logical specification and analysis for SELinux MLS policy
ACM Transactions on Information and System Security (TISSEC)
ICISS'05 Proceedings of the First international conference on Information Systems Security
A graph-based formalism for controlling access to a digital library ontology
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Hi-index | 0.00 |
A uniform and precise framework for the specification of access control policies is proposed. The uniform framework allows the detailed comparison of different policy models, the precise description of the evolution of a policy, and an accurate analysis of the interaction between policies and of the behavior of their integration. The evolution and integration of policies are illustrated using a Discretionary Access Control policy and a Lattice Based Access Control policy. The framework is based on the theory of graph transformations.