


default search action
SACMAT 2003: Como, Italy
- Elena Ferrari, David F. Ferraiolo:

8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings. ACM 2003, ISBN 1-58113-681-1
Enterprise Role Administration
- Axel Kern, Andreas Schaad, Jonathan D. Moffett:

An administration concept for the enterprise role-based access control model. 3-11 - David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila:

The role control center: features and case studies. 12-20 - Horst F. Wedde, Mario Lischka:

Cooperative role-based administration. 21-32 - Sylvia L. Osborn, Yan Han

, Jun Liu:
A methodology for managing roles in legacy systems. 33-40
Constraints
- Jason Crampton:

Specifying and enforcing constraints in role-based access control. 43-50 - James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino:

Dependencies and separation of duty constraints in GTRBAC. 51-64 - Gustaf Neumann, Mark Strembeck:

An approach to engineer and enforce context constraints in an RBAC environment. 65-79 - Patrick D. McDaniel:

On context in authorization policy. 80-89
RBAC for Collaborative Environments
- Joon S. Park, Junseok Hwang:

Role-based access control for collaborative enterprise in peer-to-peer computing environments. 93-99 - David A. Basin, Jürgen Doser, Torsten Lodderstedt:

Model driven security for process-oriented systems. 100-109 - Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari:

An infrastructure for managing secure update operations on XML data. 110-122
Access Control Models and Mechanisms
- Jim J. Longstaff, Mike A. Lockyer, John Nicholas:

The tees confidentiality model: an authorisation model for identities and roles. 125-133 - Joerg Abendroth, Christian Damsgaard Jensen:

Partial outsourcing: a new paradigm for access control. 134-141 - Mohammad A. Al-Kahtani, Ravi S. Sandhu:

Induced role hierarchies with attribute-based RBAC. 142-148 - Xinwen Zhang, Sejong Oh, Ravi S. Sandhu:

PBDM: a flexible delegation model in RBAC. 149-157 - Anthony Harrington, Christian Damsgaard Jensen

:
Cryptographic access control in a distributed file system. 158-165
Role Engineering
- Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin:

On modeling system-centric information for role engineering. 169-178 - Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf:

Role mining - revealing business roles for security administration using data mining technology. 179-186
Verification
- Salem Benferhat, Rania El Baida, Frédéric Cuppens:

A stratification-based approach for handling conflicts in access control. 189-195 - Tanvir Ahmed, Anand R. Tripathi:

Static verification of security requirements in role based CSCW systems. 196-203
Dynamic Access Control
- Adam Hess, Kent E. Seamons

:
An access control model for dynamic client-side content. 207-216 - Lawrence Teo, Gail-Joon Ahn

, Yuliang Zheng
:
Dynamic and risk-aware network access management. 217-230 - Prasad Naldurg, Roy H. Campbell:

Dynamic access control: preserving safety and trust for network defense operations. 231-237

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














