Handbook of logic in computer science (vol. 2)
Handbook of graph grammars and computing by graph transformation: volume I. foundations
Handbook of graph grammars and computing by graph transformation: volume I. foundations
The specification and enforcement of authorization constraints in workflow management systems
ACM Transactions on Information and System Security (TISSEC) - Special issue on role-based access control
Graph transformation units and modules
Handbook of graph grammars and computing by graph transformation
A modular approach to composing access control policies
Proceedings of the 7th ACM conference on Computer and communications security
On the specification and evolution of access control policies
SACMAT '01 Proceedings of the sixth ACM symposium on Access control models and technologies
Policy algebras for access control: the propositional case
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Formal software specification with refinements and modules of typed graph transformation systems
Journal of Computer and System Sciences
A Fully Abstract Model for Graph-Interpreted Temporal Logic
TAGT'98 Selected papers from the 6th International Workshop on Theory and Application of Graph Transformations
A Formal Model for Role-Based Access Control Using Graph Transformation
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
Conflict Detection and Resolution in Access Control Policy Specifications
FoSSaCS '02 Proceedings of the 5th International Conference on Foundations of Software Science and Computation Structures
The Ponder Policy Specification Language
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Taxonomy and Description of Policy Combination Methods
POLICY '01 Proceedings of the International Workshop on Policies for Distributed Systems and Networks
Foundations for a Graph-Based Approach to the Specification of Access Control Policies
FoSSaCS '01 Proceedings of the 4th International Conference on Foundations of Software Science and Computation Structures
Consistency checking and visualization of OCL constraints
UML'00 Proceedings of the 3rd international conference on The unified modeling language: advancing the standard
Theory of Constraints and Application Conditions: From Graphs to High-Level Structures
Fundamenta Informaticae - SPECIAL ISSUE ON ICGT 2004
Correctness of high-level transformation systems relative to nested conditions†
Mathematical Structures in Computer Science
Policy Analysis and Verification by Graph Transformation Tools
Electronic Notes in Theoretical Computer Science (ENTCS)
Graph-based delegation authorization in workflow
CCDC'09 Proceedings of the 21st annual international conference on Chinese control and decision conference
Nested constraints and application conditions for high-level structures
Formal Methods in Software and Systems Modeling
Theory of Constraints and Application Conditions: From Graphs to High-Level Structures
Fundamenta Informaticae - SPECIAL ISSUE ON ICGT 2004
Hi-index | 0.00 |
Policies are used to control the behavior of complex systems. In order to support reasoning about the behavior, it is necessary to have a precise specification of the policy, better if described in an intuitive visual formalism. Graphical constraints and graph transformation rules provide such a combination of a natural yet semantically sound formalization. Furthermore, the evolution of policies, the combination of policies and the stepwise development of policies can be given a solid foundation and their analysis and verification can benefit from the use of existing general graph transformation engines.