Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2003.bht:"
@inproceedings{DBLP:conf/sacmat/AbendrothJ03, author = {Joerg Abendroth and Christian Damsgaard Jensen}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Partial outsourcing: a new paradigm for access control}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {134--141}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775429}, doi = {10.1145/775412.775429}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AbendrothJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AhmedT03, author = {Tanvir Ahmed and Anand R. Tripathi}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Static verification of security requirements in role based {CSCW} systems}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {196--203}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775438}, doi = {10.1145/775412.775438}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AhmedT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Al-KahtaniS03, author = {Mohammad A. Al{-}Kahtani and Ravi S. Sandhu}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Induced role hierarchies with attribute-based {RBAC}}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {142--148}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775430}, doi = {10.1145/775412.775430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Al-KahtaniS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BasinDL03, author = {David A. Basin and J{\"{u}}rgen Doser and Torsten Lodderstedt}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Model driven security for process-oriented systems}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {100--109}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775425}, doi = {10.1145/775412.775425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BasinDL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BenferhatBC03, author = {Salem Benferhat and Rania El Baida and Fr{\'{e}}d{\'{e}}ric Cuppens}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {A stratification-based approach for handling conflicts in access control}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {189--195}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775437}, doi = {10.1145/775412.775437}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BenferhatBC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertinoMCF03, author = {Elisa Bertino and Giovanni Mella and Gianluca Correndo and Elena Ferrari}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {An infrastructure for managing secure update operations on {XML} data}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {110--122}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775426}, doi = {10.1145/775412.775426}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BertinoMCF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Crampton03, author = {Jason Crampton}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Specifying and enforcing constraints in role-based access control}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {43--50}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775419}, doi = {10.1145/775412.775419}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Crampton03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FerraioloCAG03, author = {David F. Ferraiolo and Ramaswamy Chandramouli and Gail{-}Joon Ahn and Serban I. Gavrila}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {The role control center: features and case studies}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {12--20}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775415}, doi = {10.1145/775412.775415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/FerraioloCAG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HarringtonJ03, author = {Anthony Harrington and Christian Damsgaard Jensen}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Cryptographic access control in a distributed file system}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {158--165}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775432}, doi = {10.1145/775412.775432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/HarringtonJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HessS03, author = {Adam Hess and Kent E. Seamons}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {An access control model for dynamic client-side content}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {207--216}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775440}, doi = {10.1145/775412.775440}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HessS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JoshiSGB03, author = {James Joshi and Basit Shafiq and Arif Ghafoor and Elisa Bertino}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Dependencies and separation of duty constraints in {GTRBAC}}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {51--64}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775420}, doi = {10.1145/775412.775420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JoshiSGB03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KernSM03, author = {Axel Kern and Andreas Schaad and Jonathan D. Moffett}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {An administration concept for the enterprise role-based access control model}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {3--11}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775414}, doi = {10.1145/775412.775414}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KernSM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KuhlmannSS03, author = {Martin Kuhlmann and Dalia Shohat and Gerhard Schimpf}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Role mining - revealing business roles for security administration using data mining technology}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {179--186}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775435}, doi = {10.1145/775412.775435}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KuhlmannSS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LongstaffLN03, author = {Jim J. Longstaff and Mike A. Lockyer and John Nicholas}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {The tees confidentiality model: an authorisation model for identities and roles}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {125--133}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775428}, doi = {10.1145/775412.775428}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LongstaffLN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/McDaniel03, author = {Patrick D. McDaniel}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {On context in authorization policy}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {80--89}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775422}, doi = {10.1145/775412.775422}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/McDaniel03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NaldurgC03, author = {Prasad Naldurg and Roy H. Campbell}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Dynamic access control: preserving safety and trust for network defense operations}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {231--237}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775442}, doi = {10.1145/775412.775442}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/NaldurgC03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NeumannS03, author = {Gustaf Neumann and Mark Strembeck}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {An approach to engineer and enforce context constraints in an {RBAC} environment}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {65--79}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775421}, doi = {10.1145/775412.775421}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/NeumannS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/OsbornHL03, author = {Sylvia L. Osborn and Yan Han and Jun Liu}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {A methodology for managing roles in legacy systems}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {33--40}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775417}, doi = {10.1145/775412.775417}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/OsbornHL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ParkH03, author = {Joon S. Park and Junseok Hwang}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Role-based access control for collaborative enterprise in peer-to-peer computing environments}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {93--99}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775424}, doi = {10.1145/775412.775424}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ParkH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ShinACJ03, author = {Dongwan Shin and Gail{-}Joon Ahn and Sangrae Cho and Seunghun Jin}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {On modeling system-centric information for role engineering}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {169--178}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775434}, doi = {10.1145/775412.775434}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ShinACJ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TeoAZ03, author = {Lawrence Teo and Gail{-}Joon Ahn and Yuliang Zheng}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Dynamic and risk-aware network access management}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {217--230}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775441}, doi = {10.1145/775412.775441}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TeoAZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WeddeL03, author = {Horst F. Wedde and Mario Lischka}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {Cooperative role-based administration}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {21--32}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775416}, doi = {10.1145/775412.775416}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/WeddeL03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangOS03, author = {Xinwen Zhang and Sejong Oh and Ravi S. Sandhu}, editor = {Elena Ferrari and David F. Ferraiolo}, title = {{PBDM:} a flexible delegation model in {RBAC}}, booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, pages = {149--157}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412.775431}, doi = {10.1145/775412.775431}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangOS03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2003, editor = {Elena Ferrari and David F. Ferraiolo}, title = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/775412}, doi = {10.1145/775412}, isbn = {1-58113-681-1}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2003.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.