Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Algorithm 3

Formalization of extracted access control policies.
Inputs: ACP.sql (SQL Script), Transformation rules.
Outputs: B Machines.
Begin
generating_B_machines_Format ();
read (ACP.sql);
for each SQL statement do
find_valide_transformation_rule ();
apply_transformation ();
end for;
save_&_return_B-machines ();
end