Foundations for a Graph-Based Approach to the Specification of Access Control Policies
- 23 March 2001
- book chapter
- Published by Springer Nature
- p. 287-302
- https://doi.org/10.1007/3-540-45315-6_19
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A modular approach to composing access control policiesPublished by Association for Computing Machinery (ACM) ,2000
- A Formal Model for Role-Based Access Control Using Graph TransformationPublished by Springer Nature ,2000
- Role-based Access ControlPublished by Elsevier ,1998
- Spatial and temporal refinement of typed graph transformation systemsPublished by Springer Nature ,1998
- ALGEBRAIC APPROACHES TO GRAPH TRANSFORMATION – PART II: SINGLE PUSHOUT APPROACH AND COMPARISON WITH DOUBLE PUSHOUT APPROACHPublished by World Scientific Pub Co Pte Ltd ,1997
- Handbook of Graph Grammars and Computing by Graph TransformationPublished by World Scientific Pub Co Pte Ltd ,1997
- The category of typed graph grammars and its adjunctions with categories of derivationsPublished by Springer Nature ,1996
- Access control: principle and practiceIEEE Communications Magazine, 1994
- Lattice-based access control modelsComputer, 1993
- Graph rewriting with unification and compositionPublished by Springer Nature ,1987