메뉴 건너뛰기




Volumn 2505, Issue , 2002, Pages 223-238

Describing policies with graph constraints and rules

Author keywords

[No Author keywords available]

Indexed keywords

ANALYSIS AND VERIFICATIONS; GENERAL GRAPH; GRAPH CONSTRAINTS; GRAPH TRANSFORMATION RULES; GRAPHICAL CONSTRAINTS; VISUAL FORMALISM;

EID: 84937199265     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45832-8_18     Document Type: Conference Paper
Times cited : (20)

References (18)
  • 2
    • 0002848811 scopus 로고    scopus 로고
    • The Specification and Enforcement of Authotization Constraints in Workflow Management Systems
    • February
    • Elisa Bertino, Elena Ferrari, and Vijay Atluri. The Specification and Enforcement of Authotization Constraints in Workflow Management Systems. ACM Trancactions on Information and System Security, 2(1):65–104, February 1999.
    • (1999) ACM Trancactions on Information and System Security , vol.2 , Issue.1 , pp. 65-104
    • Bertino, E.1    Ferrari, E.2    Atluri, V.3
  • 4
    • 84956983027 scopus 로고    scopus 로고
    • Consistency checking and visualization of OCL constraints
    • A. Evans and S. Kent, editors, Springer
    • P. Bottoni, M. Koch, F. Parisi-Presicce, and G. Taentzer. Consistency checking and visualization of OCL constraints. In A. Evans and S. Kent, editors, UML 2000, number 1939 in LNCS, pages 294–308. Springer, 2000.
    • (2000) UML 2000, Number 1939 in LNCS , pp. 294-308
    • Bottoni, P.1    Koch, M.2    Parisi-Presicce, F.3    Taentzer, G.4
  • 6
    • 84949964856 scopus 로고    scopus 로고
    • A fully abstract model for graph-interpreted temporal logic
    • H. Ehrig, G. Engels, H.J. Kreowski, and G. Rozenberg, editors, number 1764 in LNCS. Springer
    • F. Gadducci, R. Heckel, and M. Koch. A fully abstract model for graph-interpreted temporal logic. In H. Ehrig, G. Engels, H.J. Kreowski, and G. Rozenberg, editors, Proc. of 6th Int. Workshop on Theory and Graph Transformation, number 1764 in LNCS. Springer, 2000.
    • (2000) Proc. Of 6Th Int. Workshop on Theory and Graph Transformation
    • Gadducci, F.1    Heckel, R.2    Koch, M.3
  • 8
    • 84944046313 scopus 로고    scopus 로고
    • Taxonomy and Description of Policy Combination Methods
    • Y. Kanada. Taxonomy and Description of Policy Combination Methods. In Proc. of POLICY 2001 [1], pages 171–184.
    • In Proc. Of POLICY 2001 , pp. 171-184
    • Kanada, Y.1
  • 10
    • 84944075708 scopus 로고    scopus 로고
    • A Formal Model for Role- Based Access Control using Graph Transformation
    • F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, number 1895 in Lect. Notes in Comp. Sci, Springer
    • M. Koch, L.V. Mancini, and F. Parisi-Presicce. A Formal Model for Role- Based Access Control using Graph Transformation. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), number 1895 in Lect. Notes in Comp. Sci., pages 122–139. Springer, 2000.
    • (2000) , Proc. Of the 6Th European Symposium on Research in Computer Security (ESORICS 2000) , pp. 122-139
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 11
    • 84945261571 scopus 로고    scopus 로고
    • Foundations for a graph-based approach to the Specification of Access Control Policies
    • F.Honsell and M.Miculan, editors, (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March
    • M. Koch, L.V. Mancini, and F. Parisi-Presicce. Foundations for a graph-based approach to the Specification of Access Control Policies. In F.Honsell and M.Miculan, editors, Proc. of Foundations of Software Science and Computation Structures (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March 2001.
    • (2001) Proc. Of Foundations Of Software Science and Computation Structures
    • Koch, M.1    Mancini, L.V.2    Parisi-Presicce, F.3
  • 13
    • 0009301799 scopus 로고    scopus 로고
    • Graph transformation units and modules
    • H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors
    • H.-J. Kreowski and S. Kuske. Graph transformation units and modules. In H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors, Handbook of Graph Grammars and Computing by Graph Transformation, volume 2, chapter 15, pages 607–638. 1999.
    • (1999) Handbook of Graph Grammars and Computing by Graph Transformation , vol.2 , Issue.15 , pp. 607-638
    • Kreowski, H.-J.1    Kuske, S.2
  • 14
    • 0004063990 scopus 로고    scopus 로고
    • Handbook of Graph Grammars and Computing by Graph Transformations
    • editor, World Scientific
    • G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations. World Scientific, 1997.
    • (1997) Vol. I: Foundations
    • Rozenberg, G.1
  • 15
    • 19344364618 scopus 로고    scopus 로고
    • Role-Based Access Control
    • Academic Press
    • R. S. Sandhu. Role-Based Access Control. In Advances in Computers, volume 46. Academic Press, 1998.
    • (1998) Advances in Computers , vol.46
    • Sandhu, R.S.1
  • 16
    • 0028726831 scopus 로고
    • Policy Driven Management for Distributed Systems
    • M. S. Sloman. Policy Driven Management for Distributed Systems. Network and Systems Management, 2(4):333–360, 1994.
    • (1994) Network and Systems Management , vol.2 , Issue.4 , pp. 333-360
    • Sloman, M.S.1
  • 17
    • 0000832186 scopus 로고
    • Modal and Temporal Logics
    • Clarendon Press
    • C. Stirling. Modal and Temporal Logics. In Background: Computational structures, volume 2, pages 477–563. Clarendon Press, 1992.
    • (1992) Background: Computational Structures , vol.2 , pp. 477-563
    • Stirling, C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.