


default search action
SACMAT 2009: Stresa, Italy
- Barbara Carminati, James Joshi:

14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings. ACM 2009, ISBN 978-1-60558-537-6
Keynote
- Frank Siebenlist:

Challenges and opportunities for virtualized security in the clouds. 1-2
Security analysis and verification
- Kazuhiro Minami, Nikita Borisov

, Carl A. Gunter:
Safety in discretionary access control for logic-based publish-subscribe systems. 3-12 - Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar:

Ensuring spatio-temporal access control for real-world applications. 13-22 - Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li:

An efficient framework for user authorization queries in RBAC systems. 23-32 - Samrat Mondal

, Shamik Sural
, Vijayalakshmi Atluri
:
Towards formal security analysis of GTRBAC using timed automata. 33-42
Multidomain policy integration
- Lujo Bauer

, Limin Jia
, Michael K. Reiter, David Swasey
:
xDomain: cross-border proofs of access. 43-52 - Vikhyath Rao, Trent Jaeger:

Dynamic mandatory access control for multiple stakeholders. 53-62 - Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo

:
An algebra for fine-grained integration of XACML policies. 63-72
Panel I
- Konstantin Beznosov, Philip Inglesant, Jorge Lobo

, Rob Reeder, Mary Ellen Zurko:
Usability meets access control: challenges and research opportunities. 73-74
Role engineering
- Qun Ni, Jorge Lobo

, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino:
Automating role-based provisioning by learning from examples. 75-84 - Alessandro Colantonio, Roberto Di Pietro

, Alberto Ocello, Nino Vincenzo Verde:
A formal framework to elicit roles with business meaning in RBAC systems. 85-94 - Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo

:
Evaluating role mining algorithms. 95-104
Secure sharing and policy combination
- Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg:

A decision support system for secure information sharing. 105-114 - Ram Krishnan

, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough:
Foundations for group-centric secure information sharing models. 115-124 - Jing Jin, Gail-Joon Ahn

, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for sharing electronic health records. 125-134 - Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo

, Dan Lin:
Access control policy combining: theory meets practice. 135-144
XACML and RBAC
- Rodolfo Ferrini, Elisa Bertino:

Supporting RBAC with XACML+OWL. 145-154 - Mahesh V. Tripunitara, Bogdan Carbunar:

Efficient access enforcement in distributed role-based access control (RBAC) deployments. 155-164 - Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:

Symbolic reachability analysis for parameterized administrative role based access control. 165-174
Panel II
- Maria Luisa Damiani, Hervé Martin, Yücel Saygin, Maria Rita Spada, Cédric Ulmer:

Spatio-temporal access control: challenges and applications. 175-176
Model/meta-model and extensions
- Barbara Carminati

, Elena Ferrari
, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
A semantic web based framework for social network access control. 177-186 - Steve Barker:

The next 700 access control models or a unifying meta-model? 187-196 - Achim D. Brucker

, Helmut Petritsch:
Extending access control models with break-glass. 197-206
Trust and access control in systems
- Stephen Smaldone, Vinod Ganapathy, Liviu Iftode:

Working set-based access control for network file systems. 207-216 - Adam J. Lee

, Ting Yu:
Towards a dynamic and composable model of trust. 217-226 - Sandra Julieta Rueda

, Hayawardh Vijayakumar, Trent Jaeger:
Analysis of virtual machine system policies. 227-236 - Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang:

Trojan horse resistant discretionary access control. 237-246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














