


default search action
SACMAT 2008: Estes Park, CO, USA
- Indrakshi Ray, Ninghui Li:

13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings. ACM 2008, ISBN 978-1-60558-129-3
Role mining
- Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan:

Fast exact and heuristic methods for role minimization problems. 1-10 - Jaideep Vaidya, Vijayalakshmi Atluri

, Qi Guo, Nabil R. Adam:
Migrating to optimal RBAC with minimal perturbation. 11-20 - Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:

Mining roles with semantic meanings. 21-30
Workflow systems
- Jason Crampton, Hemanth Khambhammettu:

Delegation and satisfiability in workflow systems. 31-40 - Keith Irwin, Ting Yu, William H. Winsborough:

Enforcing security properties in task-based systems. 41-50 - Christian Wolter, Andreas Schaad, Christoph Meinel:

Task-based entailment constraints for basic workflow patterns. 51-60
Panel on role engineering
- Vijay Atluri

:
Panel on role engineering. 61-62
Role based access control
- Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:

Authorization recycling in RBAC systems. 63-72 - Timothy W. Finin, Anupam Joshi

, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. 73-82 - Yue Zhang, James B. D. Joshi:

UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. 83-92
Access control in distributed environments
- M. A. C. Dekker, Jason Crampton, Sandro Etalle:

RBAC administration in distributed systems. 93-102 - Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo

:
Policy decomposition for collaborative access control. 103-112 - Devdatta Kulkarni, Anand Tripathi:

Context-aware role-based access control in pervasive computing systems. 113-122
Obligations
- Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:

A general obligation model and continuity: enhanced policy enforcement engine for usage control. 123-132 - Qun Ni, Elisa Bertino, Jorge Lobo

:
An obligation model bridging access control policies and privacy policies. 133-142 - Steve Barker:

Access control by action control. 143-152
Panel on meta models for access control
- David F. Ferraiolo, Vijay Atluri

:
A meta model for access control: why is it needed and is it even possible to achieve? 153-154
Access control in systems
- Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger:

Measuring integrity on mobile phone systems. 155-164 - Wenjuan Xu, Mohamed Shehab

, Gail-Joon Ahn
:
Visualization based policy analysis: case study in SELinux. 165-174 - Masoom Alam, Xinwen Zhang, Mohammad Nauman

, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. 175-184
Policy analysis
- Lujo Bauer, Scott Garriss, Michael K. Reiter:

Detecting and resolving policy misconfigurations in access-control systems. 185-194 - Hongxin Hu, Gail-Joon Ahn

:
Enabling verification and conformance testing for access control model. 195-204

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














