Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Figure 2

Reverse-engineering and formalization approach of concrete RBAC policies.