Organizations typically define policies to describe (positive or negative) requirements about strategic objectives. Examples are policies relative to the security of information systems in general or to the control of access to an organization’s resources. Often, the form used to specify policies is in terms of general constraints (what and why) to be enforced via the use of rules (how and when). The consistency of the rule system (transforming valid states into valid states) can be compromised and rules can violate some constraints when constraints are updated due to changing requirements. Here, we explore a number of issues related to constraint update, in particular proposing a systematic way to update rules as a consequence of modificat...
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style...
Norms constitute a powerful coordination mechanism among heterogeneous agents. In this paper, we pro...
Abstract. Constraint propagation can sometimes be described conveniently in a rule-based way. Propag...
Abstract: Organizations typically define policies to describe (positive or negative) requirements ab...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
In an active database, an update may be constrained by integrity constraints, and may also trigger r...
Constraints represent a class of business rules that describe the conditions under which an organisa...
Organisational policies express constraints on generation and processing of resources. Application d...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle ...
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Policy rules define what behavior is desired in a softwarebased system, they do not describe the cor...
This paper addresses the issue of the dynamic enforcement of a constraint in an argumentation system...
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style...
Norms constitute a powerful coordination mechanism among heterogeneous agents. In this paper, we pro...
Abstract. Constraint propagation can sometimes be described conveniently in a rule-based way. Propag...
Abstract: Organizations typically define policies to describe (positive or negative) requirements ab...
Organizations typically define policies to describe (positive or negative) requirements about strate...
Constraint systems provide techniques for automatically analyzing the conformance of low-level acces...
In an active database, an update may be constrained by integrity constraints, and may also trigger r...
Constraints represent a class of business rules that describe the conditions under which an organisa...
Organisational policies express constraints on generation and processing of resources. Application d...
International audienceConstraints such as separation-of-duty are widely used to specify requirements...
We introduce the use, monitoring, and enforcement of integrity constraints in trust managementstyle ...
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style...
We show how a range of role-based access control (RBAC) models may be usefully represented as constr...
Policy rules define what behavior is desired in a softwarebased system, they do not describe the cor...
This paper addresses the issue of the dynamic enforcement of a constraint in an argumentation system...
We introduce the use, monitoring, and enforcement of integrity constraints in trust management-style...
Norms constitute a powerful coordination mechanism among heterogeneous agents. In this paper, we pro...
Abstract. Constraint propagation can sometimes be described conveniently in a rule-based way. Propag...