Graph Transformations provide a uniform and precise frame- work for the specification of access control policies allowing the detailed comparison of different policy models and the precise description of the evolution of a policy. Furthermore, the framework is used for an accurate analysis of the interaction between policies and of the behavior of their integration with respect to the problem of conflicting rules. The integration of policies is illustrated using the Discretionary Access Control and the Lattice Based Access Control policies.
CITATION STYLE
Koch, M., Mancini, L. V., & Parisi-Presicce, F. (2001). Foundations for a graph-based approach to the specification of access control policies. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2030, pp. 287–302). Springer Verlag. https://doi.org/10.1007/3-540-45315-6_19
Mendeley helps you to discover research relevant for your work.