[图书][B] Advanced topics in term rewriting
E Ohlebusch - 2002 - books.google.com
Term rewriting techniques are applicable to various fields of computer science, including
software engineering, programming languages, computer algebra, program verification …
software engineering, programming languages, computer algebra, program verification …
Nominal rewriting
M Fernández, MJ Gabbay - Information and Computation, 2007 - Elsevier
Nominal rewriting is based on the observation that if we add support for α-equivalence to
first-order syntax using the nominal-set approach, then systems with binding, including …
first-order syntax using the nominal-set approach, then systems with binding, including …
Equational rules for rewriting logic
P Viry - Theoretical Computer Science, 2002 - Elsevier
In addition to equations and rules, we introduce equational rules that are oriented while
having an equational interpretation. Correspondence between operational behavior and …
having an equational interpretation. Correspondence between operational behavior and …
Abstract relations between restricted termination and confluence properties of rewrite systems
B Gramlich - Fundamenta Informaticae, 1995 - content.iospress.com
We investigate restricted termination and confluence properties of term rewriting systems, in
particular weak termination, weak innermost termination,(strong) innermost …
particular weak termination, weak innermost termination,(strong) innermost …
[HTML][HTML] A metamodel of access control for distributed environments: Applications and properties
C Bertolissi, M Fernández - Information and Computation, 2014 - Elsevier
We describe a metamodel for access control, designed to take into account the specific
requirements of distributed environments. We see a distributed system consisting of several …
requirements of distributed environments. We see a distributed system consisting of several …
Modular termination proofs for rewriting using dependency pairs
Recently, Arts and Giesl developed the dependency pair approach which allows automated
termination and innermost termination proofs for many term rewriting systems (TRSs) for …
termination and innermost termination proofs for many term rewriting systems (TRSs) for …
Abstract data type systems
JP Jouannaud, M Okada - Theoretical computer science, 1997 - Elsevier
This paper is concerned with the foundations of an extension of pure type systems by
abstract data types, hence the name of Abstract Data Type Systems. ADTS generalize …
abstract data types, hence the name of Abstract Data Type Systems. ADTS generalize …
Dynamic event-based access control as term rewriting
C Bertolissi, M Fernández, S Barker - IFIP Annual Conference on Data and …, 2007 - Springer
Despite the widespread adoption of Role-based Access Control (RBAC) models, new
access control models are required for new applications for which RBAC may not be …
access control models are required for new applications for which RBAC may not be …
Specification and analysis of ABAC policies via the category-based metamodel
The Attribute-Based Access Control (ABAC) model is one of the most powerful access
control models in use. It subsumes popular models, such as the Role-Based Access Control …
control models in use. It subsumes popular models, such as the Role-Based Access Control …
Polymorphic higher-order recursive path orderings
JP Jouannaud, A Rubio - Journal of the ACM (JACM), 2007 - dl.acm.org
This article extends the termination proof techniques based on reduction orderings to a
higher-order setting, by defining a family of recursive path orderings for terms of a typed …
higher-order setting, by defining a family of recursive path orderings for terms of a typed …