Graph-theoretic method for merging security system specifications
- 1 May 2007
- journal article
- Published by Elsevier in Information Sciences
- Vol. 177 (10) , 2152-2166
- https://doi.org/10.1016/j.ins.2006.12.004
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Unauthorized inferences in semistructured databasesInformation Sciences, 2006
- Ontology-based concept similarity in Formal Concept AnalysisInformation Sciences, 2006
- Administrative scope in the graph-based frameworkPublished by Association for Computing Machinery (ACM) ,2004
- Security policy reconciliation in distributed computing environmentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- A Policy Based Approach to Security for the Semantic WebPublished by Springer Nature ,2003
- Comparing and Merging Ontologies: A Concept Type Hierarchy ApproachPublished by Springer Nature ,2003
- A graph-based formalism for RBACACM Transactions on Information and System Security, 2002
- Identifying approximately common substructures in trees based on a restricted edit distanceInformation Sciences, 1999
- Inferring a Tree from Lowest Common Ancestors with an Application to the Optimization of Relational ExpressionsSIAM Journal on Computing, 1981
- The entity-relationship model—toward a unified view of dataACM Transactions on Database Systems, 1976