[图书][B] Advanced topics in term rewriting

E Ohlebusch - 2002 - books.google.com
Term rewriting techniques are applicable to various fields of computer science, including
software engineering, programming languages, computer algebra, program verification …

Nominal rewriting

M Fernández, MJ Gabbay - Information and Computation, 2007 - Elsevier
Nominal rewriting is based on the observation that if we add support for α-equivalence to
first-order syntax using the nominal-set approach, then systems with binding, including …

Equational rules for rewriting logic

P Viry - Theoretical Computer Science, 2002 - Elsevier
In addition to equations and rules, we introduce equational rules that are oriented while
having an equational interpretation. Correspondence between operational behavior and …

Abstract relations between restricted termination and confluence properties of rewrite systems

B Gramlich - Fundamenta Informaticae, 1995 - content.iospress.com
We investigate restricted termination and confluence properties of term rewriting systems, in
particular weak termination, weak innermost termination,(strong) innermost …

[HTML][HTML] A metamodel of access control for distributed environments: Applications and properties

C Bertolissi, M Fernández - Information and Computation, 2014 - Elsevier
We describe a metamodel for access control, designed to take into account the specific
requirements of distributed environments. We see a distributed system consisting of several …

Modular termination proofs for rewriting using dependency pairs

J Giesl, T Arts, E Ohlebusch - Journal of symbolic computation, 2002 - Elsevier
Recently, Arts and Giesl developed the dependency pair approach which allows automated
termination and innermost termination proofs for many term rewriting systems (TRSs) for …

Abstract data type systems

JP Jouannaud, M Okada - Theoretical computer science, 1997 - Elsevier
This paper is concerned with the foundations of an extension of pure type systems by
abstract data types, hence the name of Abstract Data Type Systems. ADTS generalize …

Dynamic event-based access control as term rewriting

C Bertolissi, M Fernández, S Barker - IFIP Annual Conference on Data and …, 2007 - Springer
Despite the widespread adoption of Role-based Access Control (RBAC) models, new
access control models are required for new applications for which RBAC may not be …

Specification and analysis of ABAC policies via the category-based metamodel

M Fernández, I Mackie, B Thuraisingham - Proceedings of the Ninth …, 2019 - dl.acm.org
The Attribute-Based Access Control (ABAC) model is one of the most powerful access
control models in use. It subsumes popular models, such as the Role-Based Access Control …

Polymorphic higher-order recursive path orderings

JP Jouannaud, A Rubio - Journal of the ACM (JACM), 2007 - dl.acm.org
This article extends the termination proof techniques based on reduction orderings to a
higher-order setting, by defining a family of recursive path orderings for terms of a typed …