Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 11

SQL:
grant Role3 to Role1;
grant Role4 to Role2;
B:
VARIABLES
RolesHierarchy,…
INVARIANT
RolesHierarchy: ROLES ROLES & …
INITIALISATION
RolesHierarchy  :=