Research Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
Algorithm 3
Formalization of extracted access control policies.
Inputs: ACP.sql (SQL Script), Transformation rules. | Outputs: B Machines. | Begin | generating_B_machines_Format (); | read (ACP.sql); | for each SQL statement do | find_valide_transformation_rule (); | apply_transformation (); | end for; | save_&_return_B-machines (); | end |
|