


default search action
SACMAT 2010: Pittsburgh, Pennsylvania, USA
- James B. D. Joshi, Barbara Carminati:

15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings. ACM 2010, ISBN 978-1-4503-0049-0 - Tyrone Grandison:

New access models for healthcare. 1-2
Policy analysis
- Kathi Fisler

, Shriram Krishnamurthi
:
A model of triangulating environments for policy authoring. 3-12 - Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:

Towards analyzing complex operating system access control configurations. 13-22 - David A. Basin, Felix Klaedtke, Samuel Müller:

Monitoring security policies with metric first-order temporal logic. 23-34
Role engineering
- Mario Frank, Joachim M. Buhmann, David A. Basin:

On the definition of role mining. 35-44 - Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo

, Luke Dickens
:
Mining roles with noisy data. 45-54 - Hassan Takabi, James B. D. Joshi:

StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. 55-64 - Xiaopu Ma, Ruixuan Li, Zhengding Lu:

Role mining based on weights. 65-74
Panel I
- Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram:

Access control in practice: pain points. 75-76 - Ehab Al-Shaer:

Automated management of network access control from design to enforcement. 77
Role based access control
- Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam:

Role-based access control (RBAC) in Java via proxy objects using annotations. 79-88 - Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:

Role updating for assignments. 89-98 - Michael S. Kirkpatrick, Elisa Bertino:

Enforcing spatial constraints for mobile RBAC systems. 99-108 - Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita:

Capability-based delegation model in RBAC. 109-118
Privacy preserving access control
- Jan Camenisch, Sebastian Mödersheim

, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer:
A card requirements language enabling privacy-preserving access control. 119-128 - Oscar García Morchon, Klaus Wehrle

:
Modular context-aware access control for medical sensor networks. 129-138 - Jaideep Vaidya, Vijayalakshmi Atluri

, Basit Shafiq, Nabil R. Adam:
Privacy-preserving trust verification. 139-148 - Steve Barker:

Personalizing access control by generalizing access control. 149-158
Panel II
- Lujo Bauer, Adam J. Lee

:
Solving the access-control puzzle: finding the pieces and putting them together. 159-160 - Virgil D. Gligor:

Architectures for practical security. 161-162
Access control in distributed environments
- Boniface Hicks, Sandra Julieta Rueda

, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. 163-172 - Gregory Leighton, Denilson Barbosa

:
Access control policy translation and verification within heterogeneous data federations. 173-182 - Dan Lin, Anna Cinzia Squicciarini

:
Data protection models for service provisioning in the cloud. 183-192 - Florian Kerschbaum:

An access control model for mobile physical objects. 193-202

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














