{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T19:43:27Z","timestamp":1769975007610,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540388708","type":"print"},{"value":"9783540388722","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11841883_4","type":"book-chapter","created":{"date-parts":[[2006,9,19]],"date-time":"2006-09-19T07:29:11Z","timestamp":1158650951000},"page":"30-45","source":"Crossref","is-referenced-by-count":82,"title":["Sesqui-Pushout Rewriting"],"prefix":"10.1007","author":[{"given":"Andrea","family":"Corradini","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Heindel","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Hermann","sequence":"additional","affiliation":[]},{"given":"Barbara","family":"K\u00f6nig","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/3-540-60618-1_69","volume-title":"Graph-Theoretic Concepts in Computer Science","author":"M. Bauderon","year":"1995","unstructured":"Bauderon, M.: A uniform approach to graph rewriting: The pullback approach. In: Nagl, M. (ed.) WG 1995. LNCS, vol.\u00a01017, pp. 101\u2013115. Springer, Heidelberg (1995)"},{"key":"4_CR2","volume-title":"Handbook of Graph Grammars and Computing by Graph Transformation, Foundations","author":"A. Corradini","year":"1997","unstructured":"Corradini, A., Montanari, U., Rossi, F., Ehrig, H., Heckel, R., L\u00f6we, M.: Algebraic approaches to graph transformation\u2014part\u00a0I: Basic concepts and double pushout approach. In: Rozenberg, G. (ed.) Handbook of Graph Grammars and Computing by Graph Transformation, Foundations, ch. 3, vol.\u00a01. World Scientific, Singapore (1997)"},{"issue":"1-2","key":"4_CR3","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1016\/0022-4049(87)90124-1","volume":"49","author":"R. Dyckhoff","year":"1987","unstructured":"Dyckhoff, R., Tholen, W.: Exponentiable morphisms, partial products and pullback complements. Journal of Pure and Applied Algebra\u00a049(1-2), 103\u2013116 (1987)","journal-title":"Journal of Pure and Applied Algebra"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1017\/S0960129500001353","volume":"1","author":"H. Ehrig","year":"1991","unstructured":"Ehrig, H., Habel, A., Kreowski, H.-J., Parisi-Presicce, F.: Parallelism and concurrency in high level replacement systems. Mathematical Structures in Computer Science\u00a01, 361\u2013404 (1991)","journal-title":"Mathematical Structures in Computer Science"},{"key":"4_CR5","volume-title":"Handbook of Graph Grammars and Computing by Graph Transformation, Foundations","author":"H. Ehrig","year":"1997","unstructured":"Ehrig, H., Heckel, R., Korff, M., L\u00f6we, M., Ribeiro, L., Wagner, A., Corradini, A.: Algebraic approaches to graph transformation\u2014part\u00a0II: Single pushout approach and comparison with double pushout approach. In: Rozenberg, G. (ed.) Handbook of Graph Grammars and Computing by Graph Transformation, Foundations, ch. 4, vol.\u00a01. World Scientific, Singapore (1997)"},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/BF00872984","volume":"1","author":"H. Ehrig","year":"1993","unstructured":"Ehrig, H., L\u00f6we, M.: Categorical principles, techniques and results for high-level-replacement systems in computer science. Applied Categorical Structures\u00a01, 21\u201350 (1993)","journal-title":"Applied Categorical Structures"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Ehrig, H., Pfender, M., Schneider, H.-J.: Graph grammars: An algebraic approach. In: Proc. 14th IEEE Symp. on Switching and Automata Theory, pp. 167\u2013180 (1973)","DOI":"10.1109\/SWAT.1973.11"},{"key":"4_CR8","unstructured":"Ferriolo, D.F., Kuhn, D.R., Chandramouli, R.: Role-Based Access Control. Artech House computer security series. Artech House (2003), ISBN: 1-580-53370-1"},{"key":"4_CR9","series-title":"Studies in Logic and the Foundations of Mathematics","volume-title":"Topoi: The Categorial Analysis of Logic","author":"R. Goldblatt","year":"1984","unstructured":"Goldblatt, R.: Topoi: The Categorial Analysis of Logic. Studies in Logic and the Foundations of Mathematics. North-Holland Publishing Company, Amsterdam, The Netherlands (1984)"},{"issue":"5","key":"4_CR10","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1017\/S0960129501003425","volume":"11","author":"A. Habel","year":"2001","unstructured":"Habel, A., M\u00fcller, J., Plump, D.: Double-pushout graph transformation revisited. Mathematical Structures in Computer Science\u00a011(5), 637\u2013688 (2001)","journal-title":"Mathematical Structures in Computer Science"},{"issue":"8","key":"4_CR11","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M.A. Harrison","year":"1976","unstructured":"Harrison, M.A., Ruzzo, W.L., Ullman, J.D.: Protection in operating systems. Commun. ACM\u00a019(8), 461\u2013471 (1976)","journal-title":"Commun. ACM"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Heckel, R., Ehrig, H., Wolter, U., Corradini, A.: Double-pullback transitions and coalgebraic loose semantics for graph transformation systems. Applied Categorical Structures\u00a09(1) (2001)","DOI":"10.1023\/A:1008734426504"},{"key":"4_CR13","unstructured":"Kahl, W.: A fibred approach to rewriting \u2014 how the duality between adding and deleting cooperates with the difference between matching and rewriting. Technical Report 9702, Fakult\u00e4t f\u00fcr Informatik, Universit\u00e4t der Bundeswehr M\u00fcnchen (May 1997)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1007\/BFb0017408","volume-title":"Graph Grammars and Their Application to Computer Science","author":"R. Kennaway","year":"1991","unstructured":"Kennaway, R.: Graph Rewriting in Some Categories of Partial Morphisms. In: Ehrig, H., Kreowski, H.-J., Rozenberg, G. (eds.) Graph Grammars 1990. LNCS, vol.\u00a0532, pp. 490\u2013504. Springer, Heidelberg (1991)"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/10722599_8","volume-title":"Computer Security - ESORICS 2000","author":"M. Koch","year":"2000","unstructured":"Koch, M., Mancini, L.V., Parisi-Presicce, F.: A formal model for role-based access control using graph transformation. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 122\u2013139. Springer, Heidelberg (2000)"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1051\/ita:2005028","volume":"39","author":"S. Lack","year":"2005","unstructured":"Lack, S., Soboci\u0144ski, P.: Adhesive and quasiadhesive categories. Theoretical Informatics and Applications\u00a039(2), 511\u2013546 (2005)","journal-title":"Theoretical Informatics and Applications"},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0304-3975(93)90068-5","volume":"109","author":"M. L\u00f6we","year":"1993","unstructured":"L\u00f6we, M.: Algebraic approach to single-pushout graph transformation. Theoretical Computer Science\u00a0109, 181\u2013224 (1993)","journal-title":"Theoretical Computer Science"},{"key":"4_CR18","unstructured":"Monserrat, M., Rossell\u00f3, F., Torrens, J., Valiente, G.: Single pushout rewriting in categories of spans I: The general setting. Technical Report LSI-97-23-R, Departament de Llenguatges i Sistemes Inform\u00e0tics, Universitat Polit\u00e8cnica de Catalunya (1997)"},{"issue":"2","key":"4_CR19","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0890-5401(88)90034-X","volume":"79","author":"E. Robinson","year":"1988","unstructured":"Robinson, E., Rosolini, G.: Categories of partial maps. Information and Computation\u00a079(2), 95\u2013130 (1988)","journal-title":"Information and Computation"},{"issue":"2","key":"4_CR20","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"}],"container-title":["Lecture Notes in Computer Science","Graph Transformations"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11841883_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T03:17:24Z","timestamp":1619493444000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11841883_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540388708","9783540388722"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/11841883_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}