-
2
-
-
84976073050
-
Logic programming as hypergraph rewriting
-
Springer
-
[CRPP91] A. Corradini, F. Rossi, and F. Parisi-Presicce. Logic programming as hypergraph rewriting. In Proc. of CAAP91, volume 493 of LNCS, pages 275–295. Springer, 1991.
-
(1991)
Proc. Of CAAP91, Volume 493 Of LNCS
, pp. 275-295
-
-
Corradini, A.1
Rossi, F.2
Parisi-Presicce, F.3
-
3
-
-
34548150508
-
Handbook of Graph Grammars and Computing by Graph Transformations
-
[EEKR99] H. Ehrig, G. Engels, H.-J. Kreowski, and G. Rozenberg, editors. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. II: Applications, Languages, and Tools. World Scientific, 1999.
-
(1999)
Vol. II: Applications, Languages, and Tools. World Scientific
-
-
Ehrig, H.1
Engels, G.2
Kreowski, H.-J.3
Rozenberg, G.4
-
4
-
-
0016984825
-
Protection in operating systems
-
[HRU76] M.A. Harrison, M. L. Ruzzo, and J.D. Ullman. Protection in operating systems. Communications of the ACM, 19(8):461–471, 1976.
-
(1976)
Communications of the ACM
, vol.19
, Issue.8
, pp. 461-471
-
-
Harrison, M.A.1
Ruzzo, M.L.2
Ullman, J.D.3
-
6
-
-
84944075708
-
A Formal Model for Role-Based Access Control using Graph Transformation
-
F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Springer
-
[KMPP00] M. Koch, L.V. Mancini, and F. Parisi-Presicce. A Formal Model for Role-Based Access Control using Graph Transformation. In F. Cuppens, Y. Deswarte, D. Gollmann, and M. Waidner, editors, Proc. of the 6th European Symposium on Research in Computer Security (ESORICS 2000), number 1895 in Lect. Notes in Comp. Sci., pages 122–139. Springer, 2000.
-
(2000)
Proc. Of the 6Th European Symposium on Research in Computer Security (ESORICS 2000), Number 1895 in Lect. Notes in Comp. Sci
, pp. 122-139
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
7
-
-
0035790747
-
On the Specification and Evolution of Access Control Policies
-
S. Osborne, editor, ACM, May
-
[KMPP01a] M. Koch, L.V. Mancini, and F. Parisi-Presicce. On the Specification and Evolution of Access Control Policies. In S. Osborne, editor, Proc. 6th ACM Symp. on Access Control Models and Technologies, pages 121–130. ACM, May 2001.
-
(2001)
Proc. 6Th ACM Symp. On Access Control Models and Technologies
, pp. 121-130
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
8
-
-
84945261571
-
Foundations for a graphbased approach to the Specification of Access Control Policies
-
In F. Honsell and M. Miculan, editors, March
-
[KMPP01b] M. Koch, L. V. Mancini, and F. Parisi-Presicce. Foundations for a graphbased approach to the Specification of Access Control Policies. In F. Honsell and M. Miculan, editors, Proc. of Foundations of Software Science and Computation Structures (FoSSaCS 2001), Lect. Notes in Comp. Sci. Springer, March 2001.
-
(2001)
Proc. Of Foundations Of Software Science and Computation Structures (Fossacs 2001), Lect. Notes in Comp. Sci. Springer
-
-
Koch, M.1
Mancini, L.V.2
Parisi-Presicce, F.3
-
9
-
-
0009455125
-
On synchronization and security
-
Demillo et al., editor, Academic Press
-
[LS78] R. J. Lipton and L. Snyder. On synchronization and security. In Demillo et al., editor, Foundations of Secure Computation. Academic Press, 1978.
-
(1978)
Foundations of Secure Computation
-
-
Lipton, R.J.1
Snyder, L.2
-
11
-
-
33847246736
-
Handbook of Graph Grammars and Computing by Graph Transformations
-
[Roz97] G. Rozenberg, editor. Handbook of Graph Grammars and Computing by Graph Transformations. Vol. I: Foundations. World Scientific, 1997.
-
(1997)
Vol. I: Foundations. World Scientific
-
-
Rozenberg, G.1
|