Research Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
SQL: | grant Role1 to User1; | grant Role2 to User2; | grant Role3 to User2; | | B: | VARIABLES | UsersRolesAssg,… | INVARIANT | UsersRolesAssg: USERS POW (ROLES) & … | INITIALISATION | UsersRolesAssg := … |
|