Research Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
SQL: | grant Role3 to Role1; | grant Role4 to Role2; | | B: | VARIABLES | RolesHierarchy,… | INVARIANT | RolesHierarchy: ROLES ROLES & … | INITIALISATION | RolesHierarchy := … |
|