Research Article

A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures

Box 9

SQL:
create user User1 identified by …;
create user User2 identified by …;
B:
SETS
USERS = ;