Policies are used to control the behavior of complex systems. In order to support reasoning about the behavior, it is necessary to have a precise specification of the policy, better if described in an intuitive visual formalism. Graphical constraints and graph transformation rules provide such a combination of a natural yet semantically sound formalization. Furthermore, the evolution of policies, the combination of policies and the stepwise development of policies can be given a solid foundation and their analysis and verification can benefit from the use of existing general graph transformation engines
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewri...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Graph transformation systems are formal models of computational systems, specified by rules that des...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
AbstractPolicies are used to control the behavior of large-scale systems. After policies are designe...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph transformation systems (GTS) and constraint handling rules (CHR) are non-deterministic rule-ba...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
The framework of graph transformation combines the potentials and advantages of both, graphs and rul...
The use of graphs to model dynamic structures is ubiquitous in computer science; prominent example a...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Constraint Handling Rules (CHR) is a rule- and logic-based formalism and has established itself as a...
We present Policy Graph Abstraction (PGA) that graphically ex-presses network policies and service c...
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewri...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Graph transformation systems are formal models of computational systems, specified by rules that des...
Graph Transformations provide a uniform and precise framework for the specification of access contro...
AbstractPolicies are used to control the behavior of large-scale systems. After policies are designe...
Graph-based specification formalisms for access control (AC) policies combine the advantages of an i...
AbstractGraph-based specification formalisms for access control (AC) policies combine the advantages...
Graph transformation systems (GTS) and constraint handling rules (CHR) are non-deterministic rule-ba...
The specification of policies is a crucial aspect in the development of complex systems, since polic...
The framework of graph transformation combines the potentials and advantages of both, graphs and rul...
The use of graphs to model dynamic structures is ubiquitous in computer science; prominent example a...
Graph-based specification formalisms for Access Control (AC) policies combine the advantages of an i...
AbstractGraph Transformations provide a uniform and precise framework for the specification of acces...
Constraint Handling Rules (CHR) is a rule- and logic-based formalism and has established itself as a...
We present Policy Graph Abstraction (PGA) that graphically ex-presses network policies and service c...
Abstract. Variables make rule-based systems more abstract and expressive, as witnessed by term rewri...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Graph transformation systems are formal models of computational systems, specified by rules that des...