Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 10

SQL:
create role Role1;
create role Role2;
ā€‰
B:
SETS
ROLES = ;