Conflict Detection and Resolution in Access Control Policy Specifications
- 15 March 2002
- book chapter
- Published by Springer Nature
- p. 223-238
- https://doi.org/10.1007/3-540-45931-6_16
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- On the specification and evolution of access control policiesPublished by Association for Computing Machinery (ACM) ,2001
- Foundations for a Graph-Based Approach to the Specification of Access Control PoliciesPublished by Springer Nature ,2001
- A Formal Model for Role-Based Access Control Using Graph TransformationPublished by Springer Nature ,2000
- Refinements of Graph Transformation Systems via Rule ExpressionsPublished by Springer Nature ,2000
- Role-based Access ControlPublished by Elsevier ,1998
- Handbook of Graph Grammars and Computing by Graph TransformationPublished by World Scientific Pub Co Pte Ltd ,1997
- The category of typed graph grammars and its adjunctions with categories of derivationsPublished by Springer Nature ,1996
- Ensuring Consistency of Conditional Graph Grammars - A Constructive Approach -Electronic Notes in Theoretical Computer Science, 1995
- Access control: principle and practiceIEEE Communications Magazine, 1994
- Lattice-based access control modelsComputer, 1993