Electronic Communications of the EASST
International Workshop on Graph Transformation and Visual Modeling Techniques
Computer Security

C. (born Köhler, , C.) Krause, C., Lewin, H., & Taentzer, G. (2007). Ensuring Containment Constraint in Graph-based Model Transformation Approaches. In Proceedings of GT-VMT 2007 . Electronic Communications of the EASST.