Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modificat...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Model update is the logical extension of model checking, allowing automated modification to models f...
Updating the contents of an information base may violate some of the constraints defined over the sc...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Abstract: Organizations typically define policies to describe (positive or negative) requirements ab...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
Policies are used to control the behavior of complex systems. In order to support reasoning about t...
Organisational policies express constraints on generation and processing of resources. Application d...
In an active database, an update may be constrained by integrity constraints, and may also trigger r...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Constraints represent a class of business rules that describe the conditions under which an organisa...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
Abstract. Constraint propagation can sometimes be described conveniently in a rule-based way. Propag...
. Integrity Maintenance is considered one of the major application fields of rule triggering systems...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Model update is the logical extension of model checking, allowing automated modification to models f...
Updating the contents of an information base may violate some of the constraints defined over the sc...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Abstract: Organizations typically define policies to describe (positive or negative) requirements ab...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
Policies are used to control the behavior of complex systems. In order to support reasoning about t...
Organisational policies express constraints on generation and processing of resources. Application d...
In an active database, an update may be constrained by integrity constraints, and may also trigger r...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Constraints represent a class of business rules that describe the conditions under which an organisa...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
Abstract. Constraint propagation can sometimes be described conveniently in a rule-based way. Propag...
. Integrity Maintenance is considered one of the major application fields of rule triggering systems...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Model update is the logical extension of model checking, allowing automated modification to models f...
Updating the contents of an information base may violate some of the constraints defined over the sc...