Login / Signup
Using Edit Automata for Rewriting-Based Security Enforcement.
Hakima Ould-Slimane
Mohamed Mejri
Kamel Adi
Published in:
DBSec (2009)
Keyphrases
</>
security enforcement
access control
smart card
cellular automata
rewrite rules
finite automata
rewriting rules
finite state
query rewriting
finite state machines
queries using views
conjunctive queries
regular expressions
tree automata
peer to peer