Research Article
A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures
SQL: | grant update on table2 to Role2; | grant select on table2 to Role2; | grant execute on procedure to Role3; | | B: | SETS | OBJECTS = ; | ACTIONS= ; | VARIABLES | PermissionsRolesAssig,… | INVARIANT | PermissionsRolesAssig: ROLES (OBJECTS POW (ACTIONS)) & … | INITIALISATION | PermissionsRolesAssig := ), (Role3(procedure | ))… |
|