Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 12

SQL:
grant Role1 to User1;
grant Role2 to User2;
grant Role3 to User2;
B:
VARIABLES
UsersRolesAssg,…
INVARIANT
UsersRolesAssg: USERS POW (ROLES) & …
INITIALISATION
UsersRolesAssg  :=