default search action
SACMAT 2003: Como, Italy
- Elena Ferrari, David F. Ferraiolo:
8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings. ACM 2003, ISBN 1-58113-681-1
Enterprise Role Administration
- Axel Kern, Andreas Schaad, Jonathan D. Moffett:
An administration concept for the enterprise role-based access control model. 3-11 - David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila:
The role control center: features and case studies. 12-20 - Horst F. Wedde, Mario Lischka:
Cooperative role-based administration. 21-32 - Sylvia L. Osborn, Yan Han, Jun Liu:
A methodology for managing roles in legacy systems. 33-40
Constraints
- Jason Crampton:
Specifying and enforcing constraints in role-based access control. 43-50 - James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino:
Dependencies and separation of duty constraints in GTRBAC. 51-64 - Gustaf Neumann, Mark Strembeck:
An approach to engineer and enforce context constraints in an RBAC environment. 65-79 - Patrick D. McDaniel:
On context in authorization policy. 80-89
RBAC for Collaborative Environments
- Joon S. Park, Junseok Hwang:
Role-based access control for collaborative enterprise in peer-to-peer computing environments. 93-99 - David A. Basin, Jürgen Doser, Torsten Lodderstedt:
Model driven security for process-oriented systems. 100-109 - Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari:
An infrastructure for managing secure update operations on XML data. 110-122
Access Control Models and Mechanisms
- Jim J. Longstaff, Mike A. Lockyer, John Nicholas:
The tees confidentiality model: an authorisation model for identities and roles. 125-133 - Joerg Abendroth, Christian Damsgaard Jensen:
Partial outsourcing: a new paradigm for access control. 134-141 - Mohammad A. Al-Kahtani, Ravi S. Sandhu:
Induced role hierarchies with attribute-based RBAC. 142-148 - Xinwen Zhang, Sejong Oh, Ravi S. Sandhu:
PBDM: a flexible delegation model in RBAC. 149-157 - Anthony Harrington, Christian Damsgaard Jensen:
Cryptographic access control in a distributed file system. 158-165
Role Engineering
- Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:
On modeling system-centric information for role engineering. 169-178 - Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf:
Role mining - revealing business roles for security administration using data mining technology. 179-186
Verification
- Salem Benferhat, Rania El Baida, Frédéric Cuppens:
A stratification-based approach for handling conflicts in access control. 189-195 - Tanvir Ahmed, Anand R. Tripathi:
Static verification of security requirements in role based CSCW systems. 196-203
Dynamic Access Control
- Adam Hess, Kent E. Seamons:
An access control model for dynamic client-side content. 207-216 - Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng:
Dynamic and risk-aware network access management. 217-230 - Prasad Naldurg, Roy H. Campbell:
Dynamic access control: preserving safety and trust for network defense operations. 231-237
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.