BibTeX records: Jason Crampton

download as .bib file

@article{DBLP:journals/jcs/CramptonGKW17,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Daniel Karapetyan and
               R{\'{e}}mi Watrigant},
  title     = {The bi-objective workflow satisfiability problem and workflow resiliency},
  journal   = {Journal of Computer Security},
  volume    = {25},
  number    = {1},
  pages     = {83--115},
  year      = {2017},
  url       = {https://doi.org/10.3233/JCS-16849},
  doi       = {10.3233/JCS-16849},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/CramptonGKW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CramptonFGJP17,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones and
               Bertram Poettering},
  title     = {Cryptographic enforcement of information flow policies without public
               information via tree partitions},
  journal   = {Journal of Computer Security},
  volume    = {25},
  number    = {6},
  pages     = {511--535},
  year      = {2017},
  url       = {https://doi.org/10.3233/JCS-16863},
  doi       = {10.3233/JCS-16863},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jcs/CramptonFGJP17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ciac/CramptonGKW17,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Martin Kouteck{\'{y}} and
               R{\'{e}}mi Watrigant},
  title     = {Parameterized Resiliency Problems via Integer Linear Programming},
  booktitle = {Algorithms and Complexity - 10th International Conference, {CIAC}
               2017, Athens, Greece, May 24-26, 2017, Proceedings},
  pages     = {164--176},
  year      = {2017},
  crossref  = {DBLP:conf/ciac/2017},
  url       = {https://doi.org/10.1007/978-3-319-57586-5\_15},
  doi       = {10.1007/978-3-319-57586-5\_15},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ciac/CramptonGKW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CramptonW17,
  author    = {Jason Crampton and
               Conrad Williams},
  title     = {Canonical Completeness in Lattice-Based Languages for Attribute-Based
               Access Control},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {47--58},
  year      = {2017},
  crossref  = {DBLP:conf/codaspy/2017},
  url       = {https://doi.org/10.1145/3029806.3029808},
  doi       = {10.1145/3029806.3029808},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/CramptonW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/BergeCGW17,
  author    = {Pierre Berg{\'{e}} and
               Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {The Authorization Policy Existence Problem},
  booktitle = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  pages     = {163--165},
  year      = {2017},
  crossref  = {DBLP:conf/codaspy/2017},
  url       = {https://doi.org/10.1145/3029806.3029844},
  doi       = {10.1145/3029806.3029844},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/BergeCGW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AldermanFC17,
  author    = {James Alderman and
               Naomi Farley and
               Jason Crampton},
  title     = {Tree-Based Cryptographic Access Control},
  booktitle = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  pages     = {47--64},
  year      = {2017},
  crossref  = {DBLP:conf/esorics/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-66402-6\_5},
  doi       = {10.1007/978-3-319-66402-6\_5},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/AldermanFC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonW17,
  author    = {Jason Crampton and
               Conrad Williams},
  title     = {Attribute Expressions, Policy Tables and Attribute-Based Access Control},
  booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
               2017},
  pages     = {79--90},
  year      = {2017},
  crossref  = {DBLP:conf/sacmat/2017},
  url       = {https://doi.org/10.1145/3078861.3078865},
  doi       = {10.1145/3078861.3078865},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/AldermanCF17,
  author    = {James Alderman and
               Jason Crampton and
               Naomi Farley},
  title     = {A Framework for the Cryptographic Enforcement of Information Flow
               Policies},
  booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
               2017},
  pages     = {143--154},
  year      = {2017},
  crossref  = {DBLP:conf/sacmat/2017},
  url       = {https://doi.org/10.1145/3078861.3078868},
  doi       = {10.1145/3078861.3078868},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/AldermanCF17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonGW17,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {On the Satisfiability of Workflows with Release Points},
  booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
               2017},
  pages     = {207--217},
  year      = {2017},
  crossref  = {DBLP:conf/sacmat/2017},
  url       = {https://doi.org/10.1145/3078861.3078866},
  doi       = {10.1145/3078861.3078866},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonGW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonW17,
  author    = {Jason Crampton and
               Conrad Williams},
  title     = {Canonical Completeness in Lattice-Based Languages for Attribute-Based
               Access Control},
  journal   = {CoRR},
  volume    = {abs/1702.04173},
  year      = {2017},
  url       = {http://arxiv.org/abs/1702.04173},
  archivePrefix = {arXiv},
  eprint    = {1702.04173},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jco/CohenCGGJ16,
  author    = {David A. Cohen and
               Jason Crampton and
               Andrei Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Algorithms for the workflow satisfiability problem engineered for
               counting constraints},
  journal   = {J. Comb. Optim.},
  volume    = {32},
  number    = {1},
  pages     = {3--24},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10878-015-9877-7},
  doi       = {10.1007/s10878-015-9877-7},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jco/CohenCGGJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGGJW16,
  author    = {Jason Crampton and
               Andrei Gagarin and
               Gregory Z. Gutin and
               Mark Jones and
               Magnus Wahlstr{\"{o}}m},
  title     = {On the Workflow Satisfiability Problem with Class-Independent Constraints
               for Hierarchical Organizations},
  journal   = {{ACM} Trans. Priv. Secur.},
  volume    = {19},
  number    = {3},
  pages     = {8:1--8:29},
  year      = {2016},
  url       = {https://doi.org/10.1145/2988239},
  doi       = {10.1145/2988239},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/CramptonGGJW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaim/CramptonGW16,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {A Multivariate Approach for Checking Resiliency in Access Control},
  booktitle = {Algorithmic Aspects in Information and Management - 11th International
               Conference, {AAIM} 2016, Bergamo, Italy, July 18-20, 2016, Proceedings},
  pages     = {173--184},
  year      = {2016},
  crossref  = {DBLP:conf/aaim/2016},
  url       = {https://doi.org/10.1007/978-3-319-41168-2\_15},
  doi       = {10.1007/978-3-319-41168-2\_15},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/aaim/CramptonGW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codaspy/CramptonS16,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {{ARPPM:} Administration in the {RPPM} Model},
  booktitle = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  pages     = {219--230},
  year      = {2016},
  crossref  = {DBLP:conf/codaspy/2016},
  url       = {https://dl.acm.org/citation.cfm?id=2857711},
  timestamp = {Tue, 27 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/CramptonS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AldermanJCC16,
  author    = {James Alderman and
               Christian Janson and
               Carlos Cid and
               Jason Crampton},
  title     = {Hybrid Publicly Verifiable Computation},
  booktitle = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  pages     = {147--163},
  year      = {2016},
  crossref  = {DBLP:conf/ctrsa/2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8\_9},
  doi       = {10.1007/978-3-319-29485-8\_9},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/AldermanJCC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CramptonS16,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Inter-ReBAC: Inter-operation of Relationship-Based Access Control
               Model Instances},
  booktitle = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
               Proceedings},
  pages     = {96--105},
  year      = {2016},
  crossref  = {DBLP:conf/dbsec/2016},
  url       = {https://doi.org/10.1007/978-3-319-41483-6\_7},
  doi       = {10.1007/978-3-319-41483-6\_7},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/CramptonS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonGW16,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {Resiliency Policies in Access Control Revisited},
  booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages     = {101--111},
  year      = {2016},
  crossref  = {DBLP:conf/sacmat/2016},
  url       = {https://doi.org/10.1145/2914642.2914650},
  doi       = {10.1145/2914642.2914650},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonGW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonW16,
  author    = {Jason Crampton and
               Conrad Williams},
  title     = {On Completeness in Languages for Attribute-Based Access Control},
  booktitle = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  pages     = {149--160},
  year      = {2016},
  crossref  = {DBLP:conf/sacmat/2016},
  url       = {https://doi.org/10.1145/2914642.2914654},
  doi       = {10.1145/2914642.2914654},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonGW16,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {A Multivariate Approach for Checking Resiliency in Access Control},
  journal   = {CoRR},
  volume    = {abs/1604.01550},
  year      = {2016},
  url       = {http://arxiv.org/abs/1604.01550},
  archivePrefix = {arXiv},
  eprint    = {1604.01550},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonGW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonGW16a,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {An Approach to Parameterized Resiliency Problems Using Integer Linear
               Programming},
  journal   = {CoRR},
  volume    = {abs/1605.08738},
  year      = {2016},
  url       = {http://arxiv.org/abs/1605.08738},
  archivePrefix = {arXiv},
  eprint    = {1605.08738},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonGW16a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonFGJP16,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones and
               Bertram Poettering},
  title     = {Cryptographic Enforcement of Information Flow Policies without Public
               Information via Tree Partitions},
  journal   = {CoRR},
  volume    = {abs/1608.08386},
  year      = {2016},
  url       = {http://arxiv.org/abs/1608.08386},
  archivePrefix = {arXiv},
  eprint    = {1608.08386},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonFGJP16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/BergeCGW16,
  author    = {Pierre Berg{\'{e}} and
               Jason Crampton and
               Gregory Z. Gutin and
               R{\'{e}}mi Watrigant},
  title     = {The Authorization Policy Existence Problem},
  journal   = {CoRR},
  volume    = {abs/1612.06191},
  year      = {2016},
  url       = {http://arxiv.org/abs/1612.06191},
  archivePrefix = {arXiv},
  eprint    = {1612.06191},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/BergeCGW16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/CramptonFGJP15,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones and
               Bertram Poettering},
  title     = {Cryptographic Enforcement of Information Flow Policies Without Public
               Information},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  pages     = {389--408},
  year      = {2015},
  crossref  = {DBLP:conf/acns/2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_19},
  doi       = {10.1007/978-3-319-28166-7\_19},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acns/CramptonFGJP15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AldermanJCC15,
  author    = {James Alderman and
               Christian Janson and
               Carlos Cid and
               Jason Crampton},
  title     = {Access Control in Publicly Verifiable Outsourced Computation},
  booktitle = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  pages     = {657--662},
  year      = {2015},
  crossref  = {DBLP:conf/ccs/2015asia},
  url       = {https://doi.org/10.1145/2714576.2714636},
  doi       = {10.1145/2714576.2714636},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/AldermanJCC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CramptonFGJ15,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Optimal Constructions for Chain-Based Cryptographic Enforcement of
               Information Flow Policies},
  booktitle = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
               {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
               2015, Proceedings},
  pages     = {330--345},
  year      = {2015},
  crossref  = {DBLP:conf/dbsec/2015},
  url       = {https://doi.org/10.1007/978-3-319-20810-7\_23},
  doi       = {10.1007/978-3-319-20810-7\_23},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/CramptonFGJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwpec/CramptonGGJ15,
  author    = {Jason Crampton and
               Andrei V. Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {On the Workflow Satisfiability Problem with Class-independent Constraints},
  booktitle = {10th International Symposium on Parameterized and Exact Computation,
               {IPEC} 2015, September 16-18, 2015, Patras, Greece},
  pages     = {66--77},
  year      = {2015},
  crossref  = {DBLP:conf/iwpec/2015},
  url       = {https://doi.org/10.4230/LIPIcs.IPEC.2015.66},
  doi       = {10.4230/LIPIcs.IPEC.2015.66},
  timestamp = {Thu, 23 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/iwpec/CramptonGGJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonGK15,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Daniel Karapetyan},
  title     = {Valued Workflow Satisfiability Problem},
  booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  pages     = {3--13},
  year      = {2015},
  crossref  = {DBLP:conf/sacmat/2015},
  url       = {https://doi.org/10.1145/2752952.2752961},
  doi       = {10.1145/2752952.2752961},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonGK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonMZ15,
  author    = {Jason Crampton and
               Charles Morisset and
               Nicola Zannone},
  title     = {On Missing Attributes in Access Control: Non-deterministic and Probabilistic
               Attribute Retrieval},
  booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  pages     = {99--109},
  year      = {2015},
  crossref  = {DBLP:conf/sacmat/2015},
  url       = {https://doi.org/10.1145/2752952.2752970},
  doi       = {10.1145/2752952.2752970},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonMZ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/RizviFCS15,
  author    = {Syed Zain R. Rizvi and
               Philip W. L. Fong and
               Jason Crampton and
               James Sellwood},
  title     = {Relationship-Based Access Control for an Open-Source Medical Records
               System},
  booktitle = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  pages     = {113--124},
  year      = {2015},
  crossref  = {DBLP:conf/sacmat/2015},
  url       = {https://doi.org/10.1145/2752952.2752962},
  doi       = {10.1145/2752952.2752962},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/RizviFCS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonW15,
  author    = {Jason Crampton and
               Conrad Williams},
  title     = {Obligations in PTaCL},
  booktitle = {Security and Trust Management - 11th International Workshop, {STM}
               2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  pages     = {220--235},
  year      = {2015},
  crossref  = {DBLP:conf/stm/2015},
  url       = {https://doi.org/10.1007/978-3-319-24858-5\_14},
  doi       = {10.1007/978-3-319-24858-5\_14},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/CramptonW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonGK15,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Daniel Karapetyan},
  title     = {Valued Workflow Satisfiability Problem},
  journal   = {CoRR},
  volume    = {abs/1501.07814},
  year      = {2015},
  url       = {http://arxiv.org/abs/1501.07814},
  archivePrefix = {arXiv},
  eprint    = {1501.07814},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonGK15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonFGJ15,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Optimal Constructions for Chain-based Cryptographic Enforcement of
               Information Flow Policies},
  journal   = {CoRR},
  volume    = {abs/1503.01382},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.01382},
  archivePrefix = {arXiv},
  eprint    = {1503.01382},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonFGJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/RizviFCS15,
  author    = {Syed Zain R. Rizvi and
               Philip W. L. Fong and
               Jason Crampton and
               James Sellwood},
  title     = {Relationship-Based Access Control for OpenMRS},
  journal   = {CoRR},
  volume    = {abs/1503.06154},
  year      = {2015},
  url       = {http://arxiv.org/abs/1503.06154},
  archivePrefix = {arXiv},
  eprint    = {1503.06154},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/RizviFCS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CohenCGGJ15,
  author    = {David A. Cohen and
               Jason Crampton and
               Andrei V. Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Algorithms for the workflow satisfiability problem engineered for
               counting constraints},
  journal   = {CoRR},
  volume    = {abs/1504.02420},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.02420},
  archivePrefix = {arXiv},
  eprint    = {1504.02420},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CohenCGGJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonGGJ15,
  author    = {Jason Crampton and
               Andrei V. Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {On the Workflow Satisfiability Problem with Class-Independent Constraints},
  journal   = {CoRR},
  volume    = {abs/1504.03561},
  year      = {2015},
  url       = {http://arxiv.org/abs/1504.03561},
  archivePrefix = {arXiv},
  eprint    = {1504.03561},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonGGJ15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonS15,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Relationships, Paths and Principal Matching: {A} New Approach to Access
               Control},
  journal   = {CoRR},
  volume    = {abs/1505.07945},
  year      = {2015},
  url       = {http://arxiv.org/abs/1505.07945},
  archivePrefix = {arXiv},
  eprint    = {1505.07945},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonGKW15,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Daniel Karapetyan and
               R{\'{e}}mi Watrigant},
  title     = {The Bi-Objective Workflow Satisfiability Problem and Workflow Resiliency},
  journal   = {CoRR},
  volume    = {abs/1512.07019},
  year      = {2015},
  url       = {http://arxiv.org/abs/1512.07019},
  archivePrefix = {arXiv},
  eprint    = {1512.07019},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonGKW15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanJCC15,
  author    = {James Alderman and
               Christian Janson and
               Carlos Cid and
               Jason Crampton},
  title     = {Hybrid Publicly Verifiable Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2015},
  pages     = {320},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/320},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AldermanJCC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jair/CohenCGGJ14,
  author    = {David A. Cohen and
               Jason Crampton and
               Andrei Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Iterative Plan Construction for the Workflow Satisfiability Problem},
  journal   = {J. Artif. Intell. Res.},
  volume    = {51},
  pages     = {555--577},
  year      = {2014},
  url       = {https://doi.org/10.1613/jair.4435},
  doi       = {10.1613/jair.4435},
  timestamp = {Mon, 21 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jair/CohenCGGJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sttt/CramptonHK14,
  author    = {Jason Crampton and
               Michael Huth and
               Jim Huan{-}Pu Kuo},
  title     = {Authorized workflow schemas: deciding realizability through {\textdollar}{\textdollar}{\textbackslash}mathsf\{LTL
               \}({\textbackslash}mathsf\{F \}){\textdollar}{\textdollar} model checking},
  journal   = {{STTT}},
  volume    = {16},
  number    = {1},
  pages     = {31--48},
  year      = {2014},
  url       = {https://doi.org/10.1007/s10009-012-0269-3},
  doi       = {10.1007/s10009-012-0269-3},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sttt/CramptonHK14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AldermanJCC14,
  author    = {James Alderman and
               Christian Janson and
               Carlos Cid and
               Jason Crampton},
  title     = {Revocation in Publicly Verifiable Outsourced Computation},
  booktitle = {Information Security and Cryptology - 10th International Conference,
               Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
               Papers},
  pages     = {51--71},
  year      = {2014},
  crossref  = {DBLP:conf/cisc/2014},
  url       = {https://doi.org/10.1007/978-3-319-16745-9\_4},
  doi       = {10.1007/978-3-319-16745-9\_4},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/AldermanJCC14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CramptonP14,
  author    = {Jason Crampton and
               Alexandre Pinto},
  title     = {Attribute-Based Encryption for Access Control Using Elementary Operations},
  booktitle = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
               Austria, 19-22 July, 2014},
  pages     = {125--139},
  year      = {2014},
  crossref  = {DBLP:conf/csfw/2014},
  url       = {https://doi.org/10.1109/CSF.2014.17},
  doi       = {10.1109/CSF.2014.17},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/CramptonP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/faw/CohenCGGJ14,
  author    = {David A. Cohen and
               Jason Crampton and
               Andrei Gagarin and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Engineering Algorithms for Workflow Satisfiability Problem with User-Independent
               Constraints},
  booktitle = {Frontiers in Algorithmics - 8th International Workshop, {FAW} 2014,
               Zhangjiajie, China, June 28-30, 2014. Proceedings},
  pages     = {48--59},
  year      = {2014},
  crossref  = {DBLP:conf/faw/2014},
  url       = {https://doi.org/10.1007/978-3-319-08016-1\_5},
  doi       = {10.1007/978-3-319-08016-1\_5},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/faw/CohenCGGJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonS14,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Path conditions and principal matching: a new approach to access control},
  booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '14, London, ON, Canada - June 25 - 27, 2014},
  pages     = {187--198},
  year      = {2014},
  crossref  = {DBLP:conf/sacmat/2014},
  url       = {https://doi.org/10.1145/2613087.2613094},
  doi       = {10.1145/2613087.2613094},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonM14,
  author    = {Jason Crampton and
               Charles Morisset},
  title     = {Monotonicity and Completeness in Attribute-Based Access Control},
  booktitle = {Security and Trust Management - 10th International Workshop, {STM}
               2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  pages     = {33--48},
  year      = {2014},
  crossref  = {DBLP:conf/stm/2014},
  url       = {https://doi.org/10.1007/978-3-319-11851-2\_3},
  doi       = {10.1007/978-3-319-11851-2\_3},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/CramptonM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonS14,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Caching and Auditing in the {RPPM} Model},
  booktitle = {Security and Trust Management - 10th International Workshop, {STM}
               2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  pages     = {49--64},
  year      = {2014},
  crossref  = {DBLP:conf/stm/2014},
  url       = {https://doi.org/10.1007/978-3-319-11851-2\_4},
  doi       = {10.1007/978-3-319-11851-2\_4},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/CramptonS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonS14,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Path Conditions and Principal Matching: {A} New Approach to Access
               Control},
  journal   = {CoRR},
  volume    = {abs/1406.4988},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.4988},
  archivePrefix = {arXiv},
  eprint    = {1406.4988},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonS14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/AldermanCCJ14,
  author    = {James Alderman and
               Carlos Cid and
               Jason Crampton and
               Christian Janson},
  title     = {Publicly Verifiable Outsourced Computation with a Key Distribution
               Centre},
  journal   = {CoRR},
  volume    = {abs/1406.5720},
  year      = {2014},
  url       = {http://arxiv.org/abs/1406.5720},
  archivePrefix = {arXiv},
  eprint    = {1406.5720},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/AldermanCCJ14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonS14a,
  author    = {Jason Crampton and
               James Sellwood},
  title     = {Caching and Auditing in the {RPPM} Model},
  journal   = {CoRR},
  volume    = {abs/1407.7841},
  year      = {2014},
  url       = {http://arxiv.org/abs/1407.7841},
  archivePrefix = {arXiv},
  eprint    = {1407.7841},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonS14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CramptonFGJP14,
  author    = {Jason Crampton and
               Naomi Farley and
               Gregory Z. Gutin and
               Mark Jones and
               Bertram Poettering},
  title     = {Cryptographic Enforcement of Information Flow Policies without Public
               Information},
  journal   = {CoRR},
  volume    = {abs/1410.5567},
  year      = {2014},
  url       = {http://arxiv.org/abs/1410.5567},
  archivePrefix = {arXiv},
  eprint    = {1410.5567},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CramptonFGJP14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanCCJ14a,
  author    = {James Alderman and
               Carlos Cid and
               Jason Crampton and
               Christian Janson},
  title     = {Revocation in Publicly Verifiable Outsourced Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {640},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/640},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AldermanCCJ14a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AldermanCCJ14b,
  author    = {James Alderman and
               Carlos Cid and
               Jason Crampton and
               Christian Janson},
  title     = {Access Control in Publicly Verifiable Outsourced Computation},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2014},
  pages     = {762},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/762},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/AldermanCCJ14b},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scp/Crampton13,
  author    = {Jason Crampton},
  title     = {A personal tribute to Steve Barker},
  journal   = {Sci. Comput. Program.},
  volume    = {78},
  number    = {3},
  pages     = {269},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.scico.2012.10.003},
  doi       = {10.1016/j.scico.2012.10.003},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/scp/Crampton13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonGY13,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Anders Yeo},
  title     = {On the Parameterized Complexity and Kernelization of the Workflow
               Satisfiability Problem},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {16},
  number    = {1},
  pages     = {4:1--4:31},
  year      = {2013},
  url       = {https://doi.org/10.1145/2487222.2487226},
  doi       = {10.1145/2487222.2487226},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/CramptonGY13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aaim/CramptonCGJR13,
  author    = {Jason Crampton and
               Robert Crowston and
               Gregory Z. Gutin and
               Mark Jones and
               M. S. Ramanujan},
  title     = {Fixed-Parameter Tractability of Workflow Satisfiability in the Presence
               of Seniority Constraints},
  booktitle = {Frontiers in Algorithmics \emph{and} Algorithmic Aspects in Information
               and Management, Third Joint International Conference, {FAW-AAIM} 2013,
               Dalian, China, June 26-28, 2013. Proceedings},
  pages     = {198--209},
  year      = {2013},
  crossref  = {DBLP:conf/aaim/2013},
  url       = {https://doi.org/10.1007/978-3-642-38756-2\_21},
  doi       = {10.1007/978-3-642-38756-2\_21},
  timestamp = {Thu, 22 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/aaim/CramptonCGJR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/SellwoodC13,
  author    = {James Sellwood and
               Jason Crampton},
  title     = {Sleeping android: the danger of dormant permissions},
  booktitle = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
               in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
               8, 2013, Berlin, Germany},
  pages     = {55--66},
  year      = {2013},
  crossref  = {DBLP:conf/ccs/2013spsm},
  url       = {https://doi.org/10.1145/2516760.2516774},
  doi       = {10.1145/2516760.2516774},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/SellwoodC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/AldermanC13,
  author    = {James Alderman and
               Jason Crampton},
  title     = {On the Use of Key Assignment Schemes in Authentication Protocols},
  booktitle = {Network and System Security - 7th International Conference, {NSS}
               2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  pages     = {607--613},
  year      = {2013},
  crossref  = {DBLP:conf/nss/2013},
  url       = {https://doi.org/10.1007/978-3-642-38631-2\_46},
  doi       = {10.1007/978-3-642-38631-2\_46},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/AldermanC13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/AktoudianakisCSTW13,
  author    = {Evangelos Aktoudianakis and
               Jason Crampton and
               Steve Schneider and
               Helen Treharne and
               Adrian Waller},
  title     = {Policy templates for relationship-based access control},
  booktitle = {Eleventh Annual International Conference on Privacy, Security and
               Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
               July 10-12, 2013},
  pages     = {221--228},
  year      = {2013},
  crossref  = {DBLP:conf/pst/2013},
  url       = {https://doi.org/10.1109/PST.2013.6596057},
  doi       = {10.1109/PST.2013.6596057},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pst/AktoudianakisCSTW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonG13,
  author    = {Jason Crampton and
               Gregory Z. Gutin},
  title     = {Constraint expressions and workflow satisfiability},
  booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  pages     = {73--84},
  year      = {2013},
  crossref  = {DBLP:conf/sacmat/2013},
  url       = {https://doi.org/10.1145/2462410.2462419},
  doi       = {10.1145/2462410.2462419},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonG13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2013,
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6},
  doi       = {10.1007/978-3-642-40203-6},
  isbn      = {978-3-642-40202-9},
  timestamp = {Tue, 23 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1301-3402,
  author    = {Jason Crampton and
               Gregory Z. Gutin},
  title     = {Constraint Expressions and Workflow Satisfiability},
  journal   = {CoRR},
  volume    = {abs/1301.3402},
  year      = {2013},
  url       = {http://arxiv.org/abs/1301.3402},
  archivePrefix = {arXiv},
  eprint    = {1301.3402},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1301-3402},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1303-4262,
  author    = {James Alderman and
               Jason Crampton},
  title     = {On the Use of Key Assignment Schemes in Authentication Protocols},
  journal   = {CoRR},
  volume    = {abs/1303.4262},
  year      = {2013},
  url       = {http://arxiv.org/abs/1303.4262},
  archivePrefix = {arXiv},
  eprint    = {1303.4262},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1303-4262},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/CohenCGJ13,
  author    = {David A. Cohen and
               Jason Crampton and
               Gregory Z. Gutin and
               Mark Jones},
  title     = {Pattern-Based Plan Construction for the Workflow Satisfiability Problem},
  journal   = {CoRR},
  volume    = {abs/1306.3649},
  year      = {2013},
  url       = {http://arxiv.org/abs/1306.3649},
  archivePrefix = {arXiv},
  eprint    = {1306.3649},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/CohenCGJ13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/AccorsiCHR13,
  author    = {Rafael Accorsi and
               Jason Crampton and
               Michael Huth and
               Stefanie Rinderle{-}Ma},
  title     = {Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar
               13341)},
  journal   = {Dagstuhl Reports},
  volume    = {3},
  number    = {8},
  pages     = {73--86},
  year      = {2013},
  url       = {https://doi.org/10.4230/DagRep.3.8.73},
  doi       = {10.4230/DagRep.3.8.73},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dagstuhl-reports/AccorsiCHR13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cade/CramptonHK12,
  author    = {Jason Crampton and
               Michael Huth and
               Jim Huan{-}Pu Kuo},
  title     = {Authorization Enforcement in Workflows: Maintaining Realizability
               Via Automated Reasoning},
  booktitle = {Third Workshop on Practical Aspects of Automated Reasoning, PAAR-2012,
               Manchester, UK, June 30 - July 1, 2012},
  pages     = {29--42},
  year      = {2012},
  crossref  = {DBLP:conf/cade/2012paar},
  url       = {http://www.easychair.org/publications/paper/145186},
  timestamp = {Tue, 25 Jul 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cade/CramptonHK12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CramptonGY12,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Anders Yeo},
  title     = {On the parameterized complexity of the workflow satisfiability problem},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {857--868},
  year      = {2012},
  crossref  = {DBLP:conf/ccs/2012},
  url       = {https://doi.org/10.1145/2382196.2382287},
  doi       = {10.1145/2382196.2382287},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/CramptonGY12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/post/CramptonM12,
  author    = {Jason Crampton and
               Charles Morisset},
  title     = {PTaCL: {A} Language for Attribute-Based Access Control in Open Systems},
  booktitle = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  pages     = {390--409},
  year      = {2012},
  crossref  = {DBLP:conf/post/2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4\_21},
  doi       = {10.1007/978-3-642-28641-4\_21},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/CramptonM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pst/ChenCKN12,
  author    = {Liang Chen and
               Jason Crampton and
               Martin J. Kollingbaum and
               Timothy J. Norman},
  title     = {Obligations in risk-aware access control},
  booktitle = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  pages     = {145--152},
  year      = {2012},
  crossref  = {DBLP:conf/pst/2012},
  url       = {https://doi.org/10.1109/PST.2012.6297931},
  doi       = {10.1109/PST.2012.6297931},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/pst/ChenCKN12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1204-2342,
  author    = {Jason Crampton and
               Charles Morisset},
  title     = {Towards {A} Generic Formal Framework for Access Control Systems},
  journal   = {CoRR},
  volume    = {abs/1204.2342},
  year      = {2012},
  url       = {http://arxiv.org/abs/1204.2342},
  archivePrefix = {arXiv},
  eprint    = {1204.2342},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1204-2342},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1205-0852,
  author    = {Jason Crampton and
               Gregory Z. Gutin and
               Anders Yeo},
  title     = {On the Parameterized Complexity of the Workflow Satisfiability Problem},
  journal   = {CoRR},
  volume    = {abs/1205.0852},
  year      = {2012},
  url       = {http://arxiv.org/abs/1205.0852},
  archivePrefix = {arXiv},
  eprint    = {1205.0852},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1205-0852},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1210-3978,
  author    = {Jason Crampton and
               Robert Crowston and
               Gregory Z. Gutin and
               Mark Jones and
               M. S. Ramanujan},
  title     = {Fixed-Parameter Tractability of Workflow Satisfiability in the Presence
               of Seniority Constraints},
  journal   = {CoRR},
  volume    = {abs/1210.3978},
  year      = {2012},
  url       = {http://arxiv.org/abs/1210.3978},
  archivePrefix = {arXiv},
  eprint    = {1210.3978},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1210-3978},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CramptonLPP11,
  author    = {Jason Crampton and
               Hoon Wei Lim and
               Kenneth G. Paterson and
               Geraint Price},
  title     = {User-friendly and certificate-free grid security infrastructure},
  journal   = {Int. J. Inf. Sec.},
  volume    = {10},
  number    = {3},
  pages     = {137--153},
  year      = {2011},
  url       = {https://doi.org/10.1007/s10207-011-0123-8},
  doi       = {10.1007/s10207-011-0123-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/CramptonLPP11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/WeiCBR11,
  author    = {Qiang Wei and
               Jason Crampton and
               Konstantin Beznosov and
               Matei Ripeanu},
  title     = {Authorization recycling in hierarchical {RBAC} systems},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {1},
  pages     = {3:1--3:29},
  year      = {2011},
  url       = {https://doi.org/10.1145/1952982.1952985},
  doi       = {10.1145/1952982.1952985},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/WeiCBR11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/Crampton11,
  author    = {Jason Crampton},
  title     = {Practical and efficient cryptographic enforcement of interval-based
               access control policies},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {14},
  number    = {1},
  pages     = {14:1--14:30},
  year      = {2011},
  url       = {https://doi.org/10.1145/1952982.1952996},
  doi       = {10.1145/1952982.1952996},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/Crampton11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bpm/CramptonH11,
  author    = {Jason Crampton and
               Michael Huth},
  title     = {On the Modeling and Verification of Security-Aware and Process-Aware
               Information Systems},
  booktitle = {Business Process Management Workshops - {BPM} 2011 International Workshops,
               Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers,
               Part {II}},
  pages     = {423--434},
  year      = {2011},
  crossref  = {DBLP:conf/bpm/2011w2},
  url       = {https://doi.org/10.1007/978-3-642-28115-0\_40},
  doi       = {10.1007/978-3-642-28115-0\_40},
  timestamp = {Fri, 02 Nov 2018 09:44:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/bpm/CramptonH11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Crampton11,
  author    = {Jason Crampton},
  title     = {Time-Storage Trade-Offs for Cryptographically-Enforced Access Control},
  booktitle = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
               in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  pages     = {245--261},
  year      = {2011},
  crossref  = {DBLP:conf/esorics/2011},
  url       = {https://doi.org/10.1007/978-3-642-23822-2\_14},
  doi       = {10.1007/978-3-642-23822-2\_14},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/Crampton11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/ChenC11,
  author    = {Liang Chen and
               Jason Crampton},
  title     = {Risk-Aware Role-Based Access Control},
  booktitle = {Security and Trust Management - 7th International Workshop, {STM}
               2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  pages     = {140--156},
  year      = {2011},
  crossref  = {DBLP:conf/stm/2011},
  url       = {https://doi.org/10.1007/978-3-642-29963-6\_11},
  doi       = {10.1007/978-3-642-29963-6\_11},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/ChenC11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifiptm/2011,
  editor    = {Ian Wakeman and
               Ehud Gudes and
               Christian Damsgaard Jensen and
               Jason Crampton},
  title     = {Trust Management V, 5th {IFIP} {WG} 11.11 International Conference,
               {IFIPTM} 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {358},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22200-9},
  doi       = {10.1007/978-3-642-22200-9},
  isbn      = {978-3-642-22199-6},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifiptm/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2011,
  editor    = {Ruth Breu and
               Jason Crampton and
               Jorge Lobo},
  title     = {16th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2011, Innsbruck, Austria, June 15-17, 2011, Proceedings},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/1998441},
  doi       = {10.1145/1998441},
  isbn      = {978-1-4503-0688-1},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1111-5767,
  author    = {Jason Crampton and
               Charles Morisset},
  title     = {PTaCL: {A} Language for Attribute-Based Access Control in Open Systems},
  journal   = {CoRR},
  volume    = {abs/1111.5767},
  year      = {2011},
  url       = {http://arxiv.org/abs/1111.5767},
  archivePrefix = {arXiv},
  eprint    = {1111.5767},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1111-5767},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/CramptonDM10,
  author    = {Jason Crampton and
               Rosli Daud and
               Keith M. Martin},
  title     = {Constructing Key Assignment Schemes from Chain Partitions},
  booktitle = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  pages     = {130--145},
  year      = {2010},
  crossref  = {DBLP:conf/dbsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6\_9},
  doi       = {10.1007/978-3-642-13739-6\_9},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/CramptonDM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CramptonH10,
  author    = {Jason Crampton and
               Michael Huth},
  title     = {An Authorization Framework Resilient to Policy Evaluation Failures},
  booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  pages     = {472--487},
  year      = {2010},
  crossref  = {DBLP:conf/esorics/2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3\_29},
  doi       = {10.1007/978-3-642-15497-3\_29},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CramptonH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/Crampton10,
  author    = {Jason Crampton},
  title     = {Cryptographic Enforcement of Role-Based Access Control},
  booktitle = {Formal Aspects of Security and Trust - 7th International Workshop,
               {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
               Papers},
  pages     = {191--205},
  year      = {2010},
  crossref  = {DBLP:conf/ifip1-7/2010},
  url       = {https://doi.org/10.1007/978-3-642-19751-2\_13},
  doi       = {10.1007/978-3-642-19751-2\_13},
  timestamp = {Fri, 19 May 2017 01:26:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip1-7/Crampton10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/CramptonH10,
  author    = {Jason Crampton and
               Michael Huth},
  title     = {A Framework for the Modular Specification and Orchestration of Authorization
               Policies},
  booktitle = {Information Security Technology for Applications - 15th Nordic Conference
               on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
               2010, Revised Selected Papers},
  pages     = {155--170},
  year      = {2010},
  crossref  = {DBLP:conf/nordsec/2010},
  url       = {https://doi.org/10.1007/978-3-642-27937-9\_11},
  doi       = {10.1007/978-3-642-27937-9\_11},
  timestamp = {Wed, 27 Dec 2017 02:26:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/CramptonH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/stm/CramptonM10,
  author    = {Jason Crampton and
               Charles Morisset},
  title     = {An Auto-delegation Mechanism for Access Control Systems},
  booktitle = {Security and Trust Management - 6th International Workshop, {STM}
               2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  pages     = {1--16},
  year      = {2010},
  crossref  = {DBLP:conf/stm/2010},
  url       = {https://doi.org/10.1007/978-3-642-22444-7\_1},
  doi       = {10.1007/978-3-642-22444-7\_1},
  timestamp = {Sat, 06 Jan 2018 16:26:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stm/CramptonM10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/ais/CramptonH10,
  author    = {Jason Crampton and
               Michael Huth},
  title     = {Towards an Access-Control Framework for Countering Insider Threats},
  booktitle = {Insider Threats in Cyber Security},
  pages     = {173--195},
  year      = {2010},
  crossref  = {DBLP:series/ais/49},
  url       = {https://doi.org/10.1007/978-1-4419-7133-3\_8},
  doi       = {10.1007/978-1-4419-7133-3\_8},
  timestamp = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/CramptonH10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1005-4993,
  author    = {Jason Crampton},
  title     = {Practical Constructions for the Efficient Cryptographic Enforcement
               of Interval-Based Access Control Policies},
  journal   = {CoRR},
  volume    = {abs/1005.4993},
  year      = {2010},
  url       = {http://arxiv.org/abs/1005.4993},
  archivePrefix = {arXiv},
  eprint    = {1005.4993},
  timestamp = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/corr/abs-1005-4993},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jlp/Crampton09,
  author    = {Jason Crampton},
  title     = {Cryptographically-enforced hierarchical access control with multiple
               keys},
  journal   = {J. Log. Algebr. Program.},
  volume    = {78},
  number    = {8},
  pages     = {690--700},
  year      = {2009},
  url       = {https://doi.org/10.1016/j.jlap.2009.04.001},
  doi       = {10.1016/j.jlap.2009.04.001},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jlp/Crampton09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cse/CramptonK09,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {A Framework for Enforcing Constrained {RBAC} Policies},
  booktitle = {Proceedings of the 12th {IEEE} International Conference on Computational
               Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
               29-31, 2009},
  pages     = {195--200},
  year      = {2009},
  crossref  = {DBLP:conf/cse/2009},
  url       = {https://doi.org/10.1109/CSE.2009.325},
  doi       = {10.1109/CSE.2009.325},
  timestamp = {Wed, 24 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/CramptonK09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenC09,
  author    = {Liang Chen and
               Jason Crampton},
  title     = {Set Covering Problems in Role-Based Access Control},
  booktitle = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
               in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  pages     = {689--704},
  year      = {2009},
  crossref  = {DBLP:conf/esorics/2009},
  url       = {https://doi.org/10.1007/978-3-642-04444-1\_42},
  doi       = {10.1007/978-3-642-04444-1\_42},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/ChenC09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nordsec/Crampton09,
  author    = {Jason Crampton},
  title     = {Trade-Offs in Cryptographic Implementations of Temporal Access Control},
  booktitle = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
               Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
               Proceedings},
  pages     = {72--87},
  year      = {2009},
  crossref  = {DBLP:conf/nordsec/2009},
  url       = {https://doi.org/10.1007/978-3-642-04766-4\_6},
  doi       = {10.1007/978-3-642-04766-4\_6},
  timestamp = {Wed, 17 May 2017 10:54:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/Crampton09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/CramptonK08,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {Delegation in role-based access control},
  journal   = {Int. J. Inf. Sec.},
  volume    = {7},
  number    = {2},
  pages     = {123--136},
  year      = {2008},
  url       = {https://doi.org/10.1007/s10207-007-0044-8},
  doi       = {10.1007/s10207-007-0044-8},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijisec/CramptonK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/PaciBC08,
  author    = {Federica Paci and
               Elisa Bertino and
               Jason Crampton},
  title     = {An Access-Control Framework for {WS-BPEL}},
  journal   = {Int. J. Web Service Res.},
  volume    = {5},
  number    = {3},
  pages     = {20--43},
  year      = {2008},
  url       = {https://doi.org/10.4018/jwsr.2008070102},
  doi       = {10.4018/jwsr.2008070102},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jwsr/PaciBC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ChenC08,
  author    = {Liang Chen and
               Jason Crampton},
  title     = {On spatio-temporal constraints and inheritance in role-based access
               control},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  pages     = {205--216},
  year      = {2008},
  crossref  = {DBLP:conf/ccs/2008asia},
  url       = {https://doi.org/10.1145/1368310.1368341},
  doi       = {10.1145/1368310.1368341},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/ChenC08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/BarkerCCLT08,
  author    = {Steve Barker and
               David W. Chadwick and
               Jason Crampton and
               Emil Lupu and
               Bhavani M. Thuraisingham},
  title     = {Panel Session: What Are the Key Challenges in Distributed Security?},
  booktitle = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
               Working Conference on Data and Applications Security, London, UK,
               July 13-16, 2008, Proceedings},
  pages     = {219--221},
  year      = {2008},
  crossref  = {DBLP:conf/dbsec/2008},
  url       = {https://doi.org/10.1007/978-3-540-70567-3\_17},
  doi       = {10.1007/978-3-540-70567-3\_17},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/BarkerCCLT08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/CramptonK08,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {On delegation and workflow execution models},
  booktitle = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
               Fortaleza, Ceara, Brazil, March 16-20, 2008},
  pages     = {2137--2144},
  year      = {2008},
  crossref  = {DBLP:conf/sac/2008},
  url       = {https://doi.org/10.1145/1363686.1364199},
  doi       = {10.1145/1363686.1364199},
  timestamp = {Tue, 06 Nov 2018 11:06:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/CramptonK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonK08,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {Delegation and satisfiability in workflow systems},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {31--40},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377842},
  doi       = {10.1145/1377836.1377842},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonK08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/WeiCBR08,
  author    = {Qiang Wei and
               Jason Crampton and
               Konstantin Beznosov and
               Matei Ripeanu},
  title     = {Authorization recycling in {RBAC} systems},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {63--72},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377848},
  doi       = {10.1145/1377836.1377848},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/WeiCBR08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/DekkerCE08,
  author    = {M. A. C. Dekker and
               Jason Crampton and
               Sandro Etalle},
  title     = {{RBAC} administration in distributed systems},
  booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages     = {93--102},
  year      = {2008},
  crossref  = {DBLP:conf/sacmat/2008},
  url       = {https://doi.org/10.1145/1377836.1377852},
  doi       = {10.1145/1377836.1377852},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/DekkerCE08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CramptonL08,
  author    = {Jason Crampton and
               Hoon Wei Lim},
  title     = {Role Signatures for Access Control in Open Distributed Systems},
  booktitle = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  pages     = {205--220},
  year      = {2008},
  crossref  = {DBLP:conf/sec/2008},
  url       = {https://doi.org/10.1007/978-0-387-09699-5\_14},
  doi       = {10.1007/978-0-387-09699-5\_14},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/CramptonL08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/DekkerCCE07,
  author    = {M. A. C. Dekker and
               J. G. Cederquist and
               Jason Crampton and
               Sandro Etalle},
  title     = {Extended privilege inheritance in {RBAC}},
  booktitle = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  pages     = {383--385},
  year      = {2007},
  crossref  = {DBLP:conf/ccs/2007asia},
  url       = {https://doi.org/10.1145/1229285.1229335},
  doi       = {10.1145/1229285.1229335},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/DekkerCCE07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/TuckerSC07,
  author    = {Allan Tucker and
               Stephen Swift and
               Jason Crampton},
  title     = {Efficiency updates for the restricted growth function {GA} for grouping
               problems},
  booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings,
               London, England, UK, July 7-11, 2007},
  pages     = {1536},
  year      = {2007},
  crossref  = {DBLP:conf/gecco/2007},
  url       = {https://doi.org/10.1145/1276958.1277265},
  doi       = {10.1145/1276958.1277265},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gecco/TuckerSC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gecco/SwiftTCG07,
  author    = {Stephen Swift and
               Allan Tucker and
               Jason Crampton and
               David Garway{-}Heath},
  title     = {An improved restricted growth function genetic algorithm for the consensus
               clustering of retinal nerve fibre data},
  booktitle = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings,
               London, England, UK, July 7-11, 2007},
  pages     = {2174--2181},
  year      = {2007},
  crossref  = {DBLP:conf/gecco/2007},
  url       = {https://doi.org/10.1145/1276958.1277376},
  doi       = {10.1145/1276958.1277376},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/gecco/SwiftTCG07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/ChenC07,
  author    = {Liang Chen and
               Jason Crampton},
  title     = {Applications of the Oriented Permission Role-Based Access Control
               Model},
  booktitle = {Proceedings of the 26th {IEEE} International Performance Computing
               and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
               Orleans, Louisiana, {USA}},
  pages     = {387--394},
  year      = {2007},
  crossref  = {DBLP:conf/ipccc/2007},
  url       = {https://doi.org/10.1109/PCCC.2007.358918},
  doi       = {10.1109/PCCC.2007.358918},
  timestamp = {Tue, 12 Feb 2019 15:51:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/ChenC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ChenC07,
  author    = {Liang Chen and
               Jason Crampton},
  title     = {Inter-domain role mapping and least privilege},
  booktitle = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  pages     = {157--162},
  year      = {2007},
  crossref  = {DBLP:conf/sacmat/2007},
  url       = {https://doi.org/10.1145/1266840.1266866},
  doi       = {10.1145/1266840.1266866},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/ChenC07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/CramptonLP07,
  author    = {Jason Crampton and
               Hoon Wei Lim and
               Kenneth G. Paterson},
  title     = {What can identity-based cryptography offer to web services?},
  booktitle = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
               2007, Fairfax, VA, USA, November 2, 2007},
  pages     = {26--36},
  year      = {2007},
  crossref  = {DBLP:conf/sws/2007},
  url       = {https://doi.org/10.1145/1314418.1314424},
  doi       = {10.1145/1314418.1314424},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/CramptonLP07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wosp/SkeneSCE07,
  author    = {James Skene and
               Allan Skene and
               Jason Crampton and
               Wolfgang Emmerich},
  title     = {The monitorability of service-level agreements for application-service
               provision},
  booktitle = {Proceedings of the 6th International Workshop on Software and Performance,
               {WOSP} 2007, Buenes Aires, Argentina, February 5-8, 2007},
  pages     = {3--14},
  year      = {2007},
  crossref  = {DBLP:conf/wosp/2007},
  url       = {https://doi.org/10.1145/1216993.1216997},
  doi       = {10.1145/1216993.1216997},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/wosp/SkeneSCE07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csse/Crampton06,
  author    = {Jason Crampton},
  title     = {Applying hierarchical and role-based access control to {XML} documents},
  journal   = {Comput. Syst. Sci. Eng.},
  volume    = {21},
  number    = {5},
  year      = {2006},
  timestamp = {Thu, 23 Aug 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/csse/Crampton06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosem/CounsellSC06,
  author    = {Steve Counsell and
               Stephen Swift and
               Jason Crampton},
  title     = {The interpretation and utility of three cohesion metrics for object-oriented
               design},
  journal   = {{ACM} Trans. Softw. Eng. Methodol.},
  volume    = {15},
  number    = {2},
  pages     = {123--149},
  year      = {2006},
  url       = {https://doi.org/10.1145/1131421.1131422},
  doi       = {10.1145/1131421.1131422},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosem/CounsellSC06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CramptonMW06,
  author    = {Jason Crampton and
               Keith M. Martin and
               Peter R. Wild},
  title     = {On Key Assignment for Hierarchical Access Control},
  booktitle = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
               5-7 July 2006, Venice, Italy},
  pages     = {98--111},
  year      = {2006},
  crossref  = {DBLP:conf/csfw/2006},
  url       = {https://doi.org/10.1109/CSFW.2006.20},
  doi       = {10.1109/CSFW.2006.20},
  timestamp = {Thu, 25 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/CramptonMW06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/Crampton06,
  author    = {Jason Crampton},
  title     = {Discretionary and Mandatory Controls for Role-Based Administration},
  booktitle = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Sophia Antipolis, France,
               July 31-August 2, 2006, Proceedings},
  pages     = {194--208},
  year      = {2006},
  crossref  = {DBLP:conf/dbsec/2006},
  url       = {https://doi.org/10.1007/11805588\_14},
  doi       = {10.1007/11805588\_14},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/Crampton06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CramptonK06,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {Delegation in Role-Based Access Control},
  booktitle = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  pages     = {174--191},
  year      = {2006},
  crossref  = {DBLP:conf/esorics/2006},
  url       = {https://doi.org/10.1007/11863908\_12},
  doi       = {10.1007/11863908\_12},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/CramptonK06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/BertinoCP06,
  author    = {Elisa Bertino and
               Jason Crampton and
               Federica Paci},
  title     = {Access Control and Authorization Constraints for {WS-BPEL}},
  booktitle = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006),
               18-22 September 2006, Chicago, Illinois, {USA}},
  pages     = {275--284},
  year      = {2006},
  crossref  = {DBLP:conf/icws/2006},
  url       = {https://doi.org/10.1109/ICWS.2006.21},
  doi       = {10.1109/ICWS.2006.21},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/BertinoCP06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonLB06,
  author    = {Jason Crampton and
               Wing Leung and
               Konstantin Beznosov},
  title     = {The secondary and approximate authorization model and its application
               to Bell-LaPadula policies},
  booktitle = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  pages     = {111--120},
  year      = {2006},
  crossref  = {DBLP:conf/sacmat/2006},
  url       = {https://doi.org/10.1145/1133058.1133075},
  doi       = {10.1145/1133058.1133075},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/CramptonLB06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ec/TuckerCS05,
  author    = {Allan Tucker and
               Jason Crampton and
               Stephen Swift},
  title     = {{RGFGA:} An Efficient Representation and Crossover for Grouping Genetic
               Algorithms},
  journal   = {Evolutionary Computation},
  volume    = {13},
  number    = {4},
  pages     = {477--499},
  year      = {2005},
  url       = {https://doi.org/10.1162/106365605774666903},
  doi       = {10.1162/106365605774666903},
  timestamp = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/ec/TuckerCS05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Crampton05,
  author    = {Jason Crampton},
  title     = {Introduction to February 2005 issue of {ISTR}},
  journal   = {Inf. Sec. Techn. Report},
  volume    = {10},
  number    = {1},
  pages     = {1},
  year      = {2005},
  url       = {https://doi.org/10.1016/j.istr.2005.02.003},
  doi       = {10.1016/j.istr.2005.02.003},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/istr/Crampton05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Crampton05,
  author    = {Jason Crampton},
  title     = {Understanding and developing role-based administrative models},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {158--167},
  year      = {2005},
  crossref  = {DBLP:conf/ccs/2005},
  url       = {https://doi.org/10.1145/1102120.1102143},
  doi       = {10.1145/1102120.1102143},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Crampton05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cec/SwiftSCT05,
  author    = {Stephen Swift and
               Amy Shi and
               Jason Crampton and
               Allan Tucker},
  title     = {{ICARUS:} intelligent coupon allocation for retailers using search},
  booktitle = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
               2005, 2-4 September 2005, Edinburgh, {UK}},
  pages     = {182--189},
  year      = {2005},
  crossref  = {DBLP:conf/cec/2005},
  url       = {https://doi.org/10.1109/CEC.2005.1554683},
  doi       = {10.1109/CEC.2005.1554683},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cec/SwiftSCT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Crampton05,
  author    = {Jason Crampton},
  title     = {A reference monitor for workflow systems with constrained task execution},
  booktitle = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  pages     = {38--47},
  year      = {2005},
  crossref  = {DBLP:conf/sacmat/2005},
  url       = {https://doi.org/10.1145/1063979.1063986},
  doi       = {10.1145/1063979.1063986},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/Crampton05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Crampton04,
  author    = {Jason Crampton},
  title     = {Introduction},
  journal   = {Inf. Sec. Techn. Report},
  volume    = {9},
  number    = {3},
  pages     = {5},
  year      = {2004},
  url       = {https://doi.org/10.1016/S1363-4127(04)00027-5},
  doi       = {10.1016/S1363-4127(04)00027-5},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/istr/Crampton04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/TanCG04,
  author    = {Kaijun Tan and
               Jason Crampton and
               Carl A. Gunter},
  title     = {The Consistency of Task-Based Authorization Constraints in Workflow
               Systems},
  booktitle = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
               28-30 June 2004, Pacific Grove, CA, {USA}},
  pages     = {155},
  year      = {2004},
  crossref  = {DBLP:conf/csfw/2004},
  url       = {http://doi.ieeecomputersociety.org/10.1109/CSFW.2004.22},
  doi       = {10.1109/CSFW.2004.22},
  timestamp = {Fri, 13 May 2016 11:50:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/TanCG04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sws/Crampton04,
  author    = {Jason Crampton},
  title     = {Applying hierarchical and role-based access control to {XML} documents},
  booktitle = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS}
               2004, Fairfax, VA, USA, October 29, 2004},
  pages     = {37--46},
  year      = {2004},
  crossref  = {DBLP:conf/sws/2004},
  url       = {https://doi.org/10.1145/1111348.1111353},
  doi       = {10.1145/1111348.1111353},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sws/Crampton04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/saj/CramptonK03,
  author    = {Jason Crampton and
               Hemanth Khambhammettu},
  title     = {Access control in a distributed object environment using {XML} and
               roles},
  journal   = {South African Computer Journal},
  volume    = {31},
  pages     = {2--8},
  year      = {2003},
  url       = {http://reference.sabinet.co.za/document/EJC27956},
  timestamp = {Fri, 12 Sep 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/saj/CramptonK03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CramptonL03,
  author    = {Jason Crampton and
               George Loizou},
  title     = {Administrative scope: {A} foundation for role-based administrative
               models},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {6},
  number    = {2},
  pages     = {201--231},
  year      = {2003},
  url       = {https://doi.org/10.1145/762476.762478},
  doi       = {10.1145/762476.762478},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tissec/CramptonL03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Crampton03,
  author    = {Jason Crampton},
  title     = {On permissions, inheritance and role hierarchies},
  booktitle = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  pages     = {85--92},
  year      = {2003},
  crossref  = {DBLP:conf/ccs/2003},
  url       = {https://doi.org/10.1145/948109.948123},
  doi       = {10.1145/948109.948123},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/Crampton03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Crampton03,
  author    = {Jason Crampton},
  title     = {Specifying and enforcing constraints in role-based access control},
  booktitle = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  pages     = {43--50},
  year      = {2003},
  crossref  = {DBLP:conf/sacmat/2003},
  url       = {https://doi.org/10.1145/775412.775419},
  doi       = {10.1145/775412.775419},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/Crampton03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Crampton02,
  author    = {Jason Alexis Valentine Crampton},
  title     = {Authorization and antichains},
  school    = {Birkbeck, University of London, {UK}},
  year      = {2002},
  url       = {http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.271717},
  timestamp = {Tue, 20 Sep 2016 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/phd/ethos/Crampton02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Crampton02,
  author    = {Jason Crampton},
  title     = {Administrative scope and role hierarchy operations},
  booktitle = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
               2002},
  pages     = {145--154},
  year      = {2002},
  crossref  = {DBLP:conf/sacmat/2002},
  url       = {https://doi.org/10.1145/507711.507736},
  doi       = {10.1145/507711.507736},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/Crampton02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/CramptonLO01,
  author    = {Jason Crampton and
               George Loizou and
               Greg O'Shea},
  title     = {A Logic of Access Control},
  journal   = {Comput. J.},
  volume    = {44},
  number    = {1},
  pages     = {54--66},
  year      = {2001},
  url       = {https://doi.org/10.1093/comjnl/44.1.54},
  doi       = {10.1093/comjnl/44.1.54},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/CramptonLO01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/CramptonLO01a,
  author    = {Jason Crampton and
               George Loizou and
               Greg O'Shea},
  title     = {A Logic of Access Control},
  journal   = {Comput. J.},
  volume    = {44},
  number    = {2},
  pages     = {137--149},
  year      = {2001},
  url       = {https://doi.org/10.1093/comjnl/44.2.137},
  doi       = {10.1093/comjnl/44.2.137},
  timestamp = {Sat, 20 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cj/CramptonLO01a},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/CramptonL01,
  author    = {Jason Crampton and
               George Loizou},
  title     = {Authorisation and antichains},
  journal   = {Operating Systems Review},
  volume    = {35},
  number    = {3},
  pages     = {6--15},
  year      = {2001},
  url       = {https://doi.org/10.1145/383237.383238},
  doi       = {10.1145/383237.383238},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/sigops/CramptonL01},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ciac/2017,
  editor    = {Dimitris Fotakis and
               Aris Pagourtzis and
               Vangelis Th. Paschos},
  title     = {Algorithms and Complexity - 10th International Conference, {CIAC}
               2017, Athens, Greece, May 24-26, 2017, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10236},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-57586-5},
  doi       = {10.1007/978-3-319-57586-5},
  isbn      = {978-3-319-57585-8},
  timestamp = {Wed, 10 May 2017 15:25:26 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ciac/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2017,
  editor    = {Gail{-}Joon Ahn and
               Alexander Pretschner and
               Gabriel Ghinita},
  title     = {Proceedings of the Seventh {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2017, Scottsdale, AZ, USA, March 22-24,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://dl.acm.org/citation.cfm?id=3029806},
  isbn      = {978-1-4503-4523-1},
  timestamp = {Sat, 18 Mar 2017 19:19:49 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2017-1,
  editor    = {Simon N. Foley and
               Dieter Gollmann and
               Einar Snekkenes},
  title     = {Computer Security - {ESORICS} 2017 - 22nd European Symposium on Research
               in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings,
               Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10492},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-66402-6},
  doi       = {10.1007/978-3-319-66402-6},
  isbn      = {978-3-319-66401-9},
  timestamp = {Fri, 01 Sep 2017 14:18:16 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2017,
  editor    = {Elisa Bertino and
               Ravi Sandhu and
               Edgar R. Weippl},
  title     = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23,
               2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3078861},
  doi       = {10.1145/3078861},
  isbn      = {978-1-4503-4702-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aaim/2016,
  editor    = {Riccardo Dondi and
               Guillaume Fertin and
               Giancarlo Mauri},
  title     = {Algorithmic Aspects in Information and Management - 11th International
               Conference, {AAIM} 2016, Bergamo, Italy, July 18-20, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9778},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41168-2},
  doi       = {10.1007/978-3-319-41168-2},
  isbn      = {978-3-319-41167-5},
  timestamp = {Wed, 24 May 2017 08:29:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaim/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/codaspy/2016,
  editor    = {Elisa Bertino and
               Ravi Sandhu and
               Alexander Pretschner},
  title     = {Proceedings of the Sixth {ACM} on Conference on Data and Application
               Security and Privacy, {CODASPY} 2016, New Orleans, LA, USA, March
               9-11, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2857705},
  isbn      = {978-1-4503-3935-3},
  timestamp = {Tue, 15 Mar 2016 09:10:11 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/codaspy/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2016,
  editor    = {Kazue Sako},
  title     = {Topics in Cryptology - {CT-RSA} 2016 - The Cryptographers' Track at
               the {RSA} Conference 2016, San Francisco, CA, USA, February 29 - March
               4, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9610},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-29485-8},
  doi       = {10.1007/978-3-319-29485-8},
  isbn      = {978-3-319-29484-1},
  timestamp = {Sun, 21 May 2017 00:20:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ctrsa/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2016,
  editor    = {Silvio Ranise and
               Vipin Swarup},
  title     = {Data and Applications Security and Privacy {XXX} - 30th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2016, Trento, Italy, July 18-20, 2016.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9766},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41483-6},
  doi       = {10.1007/978-3-319-41483-6},
  isbn      = {978-3-319-41482-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2016,
  editor    = {X. Sean Wang and
               Lujo Bauer and
               Florian Kerschbaum},
  title     = {Proceedings of the 21st {ACM} on Symposium on Access Control Models
               and Technologies, {SACMAT} 2016, Shanghai, China, June 5-8, 2016},
  publisher = {{ACM}},
  year      = {2016},
  url       = {https://doi.org/10.1145/2914642},
  doi       = {10.1145/2914642},
  isbn      = {978-1-4503-3802-8},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acns/2015,
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7},
  doi       = {10.1007/978-3-319-28166-7},
  isbn      = {978-3-319-28165-0},
  timestamp = {Tue, 23 May 2017 01:13:08 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acns/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2015asia,
  editor    = {Feng Bao and
               Steven Miller and
               Jianying Zhou and
               Gail{-}Joon Ahn},
  title     = {Proceedings of the 10th {ACM} Symposium on Information, Computer and
               Communications Security, {ASIA} {CCS} '15, Singapore, April 14-17,
               2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {http://dl.acm.org/citation.cfm?id=2714576},
  isbn      = {978-1-4503-3245-3},
  timestamp = {Tue, 21 Nov 2017 18:32:24 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2015asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2015,
  editor    = {Pierangela Samarati},
  title     = {Data and Applications Security and Privacy {XXIX} - 29th Annual {IFIP}
               {WG} 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, July 13-15,
               2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9149},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-20810-7},
  doi       = {10.1007/978-3-319-20810-7},
  isbn      = {978-3-319-20809-1},
  timestamp = {Sat, 16 Sep 2017 12:09:44 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwpec/2015,
  editor    = {Thore Husfeldt and
               Iyad A. Kanj},
  title     = {10th International Symposium on Parameterized and Exact Computation,
               {IPEC} 2015, September 16-18, 2015, Patras, Greece},
  series    = {LIPIcs},
  volume    = {43},
  publisher = {Schloss Dagstuhl - Leibniz-Zentrum fuer Informatik},
  year      = {2015},
  url       = {http://www.dagstuhl.de/dagpub/978-3-939897-92-7},
  isbn      = {978-3-939897-92-7},
  timestamp = {Mon, 23 Nov 2015 17:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/iwpec/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2015,
  editor    = {Edgar R. Weippl and
               Florian Kerschbaum and
               Adam J. Lee},
  title     = {Proceedings of the 20th {ACM} Symposium on Access Control Models and
               Technologies, Vienna, Austria, June 1-3, 2015},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2752952},
  doi       = {10.1145/2752952},
  isbn      = {978-1-4503-3556-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2015,
  editor    = {Sara Foresti},
  title     = {Security and Trust Management - 11th International Workshop, {STM}
               2015, Vienna, Austria, September 21-22, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9331},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-24858-5},
  doi       = {10.1007/978-3-319-24858-5},
  isbn      = {978-3-319-24857-8},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cisc/2014,
  editor    = {Dongdai Lin and
               Moti Yung and
               Jianying Zhou},
  title     = {Information Security and Cryptology - 10th International Conference,
               Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {8957},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-16745-9},
  doi       = {10.1007/978-3-319-16745-9},
  isbn      = {978-3-319-16744-2},
  timestamp = {Tue, 07 Nov 2017 12:02:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/cisc/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2014,
  title     = {{IEEE} 27th Computer Security Foundations Symposium, {CSF} 2014, Vienna,
               Austria, 19-22 July, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6954678},
  isbn      = {978-1-4799-4290-9},
  timestamp = {Fri, 13 May 2016 11:46:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/faw/2014,
  editor    = {Jianer Chen and
               John E. Hopcroft and
               Jianxin Wang},
  title     = {Frontiers in Algorithmics - 8th International Workshop, {FAW} 2014,
               Zhangjiajie, China, June 28-30, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8497},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08016-1},
  doi       = {10.1007/978-3-319-08016-1},
  isbn      = {978-3-319-08015-4},
  timestamp = {Fri, 19 May 2017 01:26:01 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/faw/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2014,
  editor    = {Sylvia L. Osborn and
               Mahesh V. Tripunitara and
               Ian Molloy},
  title     = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '14, London, ON, Canada - June 25 - 27, 2014},
  publisher = {{ACM}},
  year      = {2014},
  url       = {https://doi.org/10.1145/2613087},
  doi       = {10.1145/2613087},
  isbn      = {978-1-4503-2939-2},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2014,
  editor    = {Sjouke Mauw and
               Christian Damsgaard Jensen},
  title     = {Security and Trust Management - 10th International Workshop, {STM}
               2014, Wroclaw, Poland, September 10-11, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8743},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11851-2},
  doi       = {10.1007/978-3-319-11851-2},
  isbn      = {978-3-319-11850-5},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/aaim/2013,
  editor    = {Michael R. Fellows and
               Xuehou Tan and
               Binhai Zhu},
  title     = {Frontiers in Algorithmics \emph{and} Algorithmic Aspects in Information
               and Management, Third Joint International Conference, {FAW-AAIM} 2013,
               Dalian, China, June 26-28, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7924},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38756-2},
  doi       = {10.1007/978-3-642-38756-2},
  isbn      = {978-3-642-38755-5},
  timestamp = {Wed, 24 May 2017 08:29:27 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/aaim/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2013spsm,
  editor    = {William Enck and
               Adrienne Porter Felt and
               N. Asokan},
  title     = {SPSM'13, Proceedings of the 2013 {ACM} Workshop on Security and Privacy
               in Smartphones and Mobile Devices, Co-located with {CCS} 2013, November
               8, 2013, Berlin, Germany},
  publisher = {{ACM}},
  year      = {2013},
  url       = {http://dl.acm.org/citation.cfm?id=2516760},
  isbn      = {978-1-4503-2491-5},
  timestamp = {Fri, 31 Jan 2014 10:49:31 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2013spsm},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nss/2013,
  editor    = {Javier L{\'{o}}pez and
               Xinyi Huang and
               Ravi Sandhu},
  title     = {Network and System Security - 7th International Conference, {NSS}
               2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7873},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-38631-2},
  doi       = {10.1007/978-3-642-38631-2},
  isbn      = {978-3-642-38630-5},
  timestamp = {Mon, 07 May 2018 15:01:38 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nss/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pst/2013,
  editor    = {Jordi Castell{\`{a}}{-}Roca and
               Josep Domingo{-}Ferrer and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Ali A. Ghorbani and
               Christian D. Jensen and
               Jes{\'{u}}s A. Manj{\'{o}}n and
               Iosif{-}Viorel Onut and
               Natalia Stakhanova and
               Vicen{\c{c}} Torra and
               Jie Zhang},
  title     = {Eleventh Annual International Conference on Privacy, Security and
               Trust, {PST} 2013, 10-12 July, 2013, Tarragona, Catalonia, Spain,
               July 10-12, 2013},
  publisher = {{IEEE} Computer Society},
  year      = {2013},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6589044},
  isbn      = {978-1-4673-5839-2},
  timestamp = {Fri, 23 Dec 2016 13:11:12 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pst/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2013,
  editor    = {Mauro Conti and
               Jaideep Vaidya and
               Andreas Schaad},
  title     = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '13, Amsterdam, The Netherlands, June 12-14, 2013},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2462410},
  doi       = {10.1145/2462410},
  isbn      = {978-1-4503-1950-8},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cade/2012paar,
  editor    = {Pascal Fontaine and
               Renate A. Schmidt and
               Stephan Schulz},
  title     = {Third Workshop on Practical Aspects of Automated Reasoning, PAAR-2012,
               Manchester, UK, June 30 - July 1, 2012},
  series    = {EPiC Series in Computing},
  volume    = {21},
  publisher = {EasyChair},
  year      = {2013},
  url       = {http://www.easychair.org/publications/?page=1924317986},
  timestamp = {Wed, 29 Mar 2017 16:45:22 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cade/2012paar},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2012,
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  publisher = {{ACM}},
  year      = {2012},
  url       = {http://dl.acm.org/citation.cfm?id=2382196},
  isbn      = {978-1-4503-1651-4},
  timestamp = {Tue, 16 Oct 2012 19:02:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/post/2012,
  editor    = {Pierpaolo Degano and
               Joshua D. Guttman},
  title     = {Principles of Security and Trust - First International Conference,
               {POST} 2012, Held as Part of the European Joint Conferences on Theory
               and Practice of Software, {ETAPS} 2012, Tallinn, Estonia, March 24
               - April 1, 2012, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7215},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28641-4},
  doi       = {10.1007/978-3-642-28641-4},
  isbn      = {978-3-642-28640-7},
  timestamp = {Wed, 24 May 2017 08:30:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/post/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pst/2012,
  editor    = {Nora Cuppens{-}Boulahia and
               Philip Fong and
               Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
               Stephen Marsh and
               Jan{-}Philipp Stegh{\"{o}}fer},
  title     = {Tenth Annual International Conference on Privacy, Security and Trust,
               {PST} 2012, Paris, France, July 16-18, 2012},
  publisher = {{IEEE} Computer Society},
  year      = {2012},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6287257},
  isbn      = {978-1-4673-2323-9},
  timestamp = {Fri, 23 Dec 2016 13:11:38 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/pst/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bpm/2011w2,
  editor    = {Florian Daniel and
               Kamel Barkaoui and
               Schahram Dustdar},
  title     = {Business Process Management Workshops - {BPM} 2011 International Workshops,
               Clermont-Ferrand, France, August 29, 2011, Revised Selected Papers,
               Part {II}},
  series    = {Lecture Notes in Business Information Processing},
  volume    = {100},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28115-0},
  doi       = {10.1007/978-3-642-28115-0},
  isbn      = {978-3-642-28114-3},
  timestamp = {Fri, 02 Nov 2018 09:44:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/bpm/2011w2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2011,
  editor    = {Vijay Atluri and
               Claudia D{\'{\i}}az},
  title     = {Computer Security - {ESORICS} 2011 - 16th European Symposium on Research
               in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6879},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-23822-2},
  doi       = {10.1007/978-3-642-23822-2},
  isbn      = {978-3-642-23821-5},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2011,
  editor    = {Catherine A. Meadows and
               M. Carmen Fern{\'{a}}ndez Gago},
  title     = {Security and Trust Management - 7th International Workshop, {STM}
               2011, Copenhagen, Denmark, June 27-28, 2011, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7170},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-29963-6},
  doi       = {10.1007/978-3-642-29963-6},
  isbn      = {978-3-642-29962-9},
  timestamp = {Wed, 24 May 2017 08:30:51 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2010,
  editor    = {Sara Foresti and
               Sushil Jajodia},
  title     = {Data and Applications Security and Privacy XXIV, 24th Annual {IFIP}
               {WG} 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6166},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-13739-6},
  doi       = {10.1007/978-3-642-13739-6},
  isbn      = {978-3-642-13738-9},
  timestamp = {Tue, 18 Jul 2017 16:51:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2010,
  editor    = {Dimitris Gritzalis and
               Bart Preneel and
               Marianthi Theoharidou},
  title     = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research
               in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6345},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15497-3},
  doi       = {10.1007/978-3-642-15497-3},
  isbn      = {978-3-642-15496-6},
  timestamp = {Thu, 15 Jun 2017 21:35:50 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip1-7/2010,
  editor    = {Pierpaolo Degano and
               Sandro Etalle and
               Joshua D. Guttman},
  title     = {Formal Aspects of Security and Trust - 7th International Workshop,
               {FAST} 2010, Pisa, Italy, September 16-17, 2010. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6561},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19751-2},
  doi       = {10.1007/978-3-642-19751-2},
  isbn      = {978-3-642-19750-5},
  timestamp = {Fri, 19 May 2017 01:26:05 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/ifip1-7/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2010,
  editor    = {Tuomas Aura and
               Kimmo J{\"{a}}rvinen and
               Kaisa Nyberg},
  title     = {Information Security Technology for Applications - 15th Nordic Conference
               on Secure {IT} Systems, NordSec 2010, Espoo, Finland, October 27-29,
               2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7127},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27937-9},
  doi       = {10.1007/978-3-642-27937-9},
  isbn      = {978-3-642-27936-2},
  timestamp = {Wed, 27 Dec 2017 02:26:29 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/stm/2010,
  editor    = {Jorge Cu{\'{e}}llar and
               Gilles Barthe and
               Alexander Pretschner},
  title     = {Security and Trust Management - 6th International Workshop, {STM}
               2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6710},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22444-7},
  doi       = {10.1007/978-3-642-22444-7},
  isbn      = {978-3-642-22443-0},
  timestamp = {Sat, 06 Jan 2018 16:26:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/stm/2010},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/49,
  editor    = {Christian W. Probst and
               Jeffrey Hunker and
               Dieter Gollmann and
               Matt Bishop},
  title     = {Insider Threats in Cyber Security},
  series    = {Advances in Information Security},
  volume    = {49},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-1-4419-7133-3},
  doi       = {10.1007/978-1-4419-7133-3},
  isbn      = {978-1-4419-7132-6},
  timestamp = {Fri, 02 Nov 2018 09:27:00 +0100},
  biburl    = {https://dblp.org/rec/bib/series/ais/49},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cse/2009,
  title     = {Proceedings of the 12th {IEEE} International Conference on Computational
               Science and Engineering, {CSE} 2009, Vancouver, BC, Canada, August
               29-31, 2009},
  publisher = {{IEEE} Computer Society},
  year      = {2009},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5282954},
  isbn      = {978-1-4244-5334-4},
  timestamp = {Thu, 07 May 2015 18:17:21 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cse/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2009,
  editor    = {Michael Backes and
               Peng Ning},
  title     = {Computer Security - {ESORICS} 2009, 14th European Symposium on Research
               in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5789},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04444-1},
  doi       = {10.1007/978-3-642-04444-1},
  isbn      = {978-3-642-04443-4},
  timestamp = {Tue, 23 May 2017 01:07:17 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nordsec/2009,
  editor    = {Audun J{\o}sang and
               Torleiv Maseng and
               Svein J. Knapskog},
  title     = {Identity and Privacy in the Internet Age, 14th Nordic Conference on
               Secure {IT} Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5838},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-04766-4},
  doi       = {10.1007/978-3-642-04766-4},
  isbn      = {978-3-642-04765-7},
  timestamp = {Wed, 17 May 2017 10:54:37 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/nordsec/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2008asia,
  editor    = {Masayuki Abe and
               Virgil D. Gligor},
  title     = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
               2008},
  publisher = {{ACM}},
  year      = {2008},
  isbn      = {978-1-59593-979-1},
  timestamp = {Tue, 21 Nov 2017 18:32:25 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2008asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2008,
  editor    = {Vijay Atluri},
  title     = {Data and Applications Security XXII, 22nd Annual {IFIP} {WG} 11.3
               Working Conference on Data and Applications Security, London, UK,
               July 13-16, 2008, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5094},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-70567-3},
  doi       = {10.1007/978-3-540-70567-3},
  isbn      = {978-3-540-70566-6},
  timestamp = {Tue, 13 Jun 2017 10:37:56 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sac/2008,
  editor    = {Roger L. Wainwright and
               Hisham Haddad},
  title     = {Proceedings of the 2008 {ACM} Symposium on Applied Computing (SAC),
               Fortaleza, Ceara, Brazil, March 16-20, 2008},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1363686},
  doi       = {10.1145/1363686},
  isbn      = {978-1-59593-753-7},
  timestamp = {Tue, 06 Nov 2018 11:06:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sac/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2008,
  editor    = {Indrakshi Ray and
               Ninghui Li},
  title     = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1377836},
  doi       = {10.1145/1377836},
  isbn      = {978-1-60558-129-3},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2008,
  editor    = {Sushil Jajodia and
               Pierangela Samarati and
               Stelvio Cimato},
  title     = {Proceedings of The {IFIP} {TC-11} 23rd International Information Security
               Conference, {IFIP} 20th World Computer Congress, {IFIP} {SEC} 2008,
               September 7-10, 2008, Milano, Italy},
  series    = {{IFIP}},
  volume    = {278},
  publisher = {Springer},
  year      = {2008},
  isbn      = {978-0-387-09698-8},
  timestamp = {Wed, 17 Sep 2008 12:43:10 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sec/2008},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2007asia,
  editor    = {Feng Bao and
               Steven Miller},
  title     = {Proceedings of the 2007 {ACM} Symposium on Information, Computer and
               Communications Security, {ASIACCS} 2007, Singapore, March 20-22, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {1-59593-574-6},
  timestamp = {Tue, 21 Nov 2017 18:32:23 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2007asia},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/gecco/2007,
  editor    = {Hod Lipson},
  title     = {Genetic and Evolutionary Computation Conference, {GECCO} 2007, Proceedings,
               London, England, UK, July 7-11, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-697-4},
  timestamp = {Tue, 21 Aug 2007 12:31:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/gecco/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ipccc/2007,
  title     = {Proceedings of the 26th {IEEE} International Performance Computing
               and Communications Conference, {IPCCC} 2007, April 11-13, 2007, New
               Orleans, Louisiana, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4197898},
  isbn      = {1-4244-1138-6},
  timestamp = {Tue, 12 Feb 2019 15:51:34 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ipccc/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2007,
  editor    = {Volkmar Lotz and
               Bhavani M. Thuraisingham},
  title     = {12th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings},
  publisher = {{ACM}},
  year      = {2007},
  url       = {https://doi.org/10.1145/1266840},
  doi       = {10.1145/1266840},
  isbn      = {978-1-59593-745-2},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2007,
  editor    = {Peng Ning and
               Ernesto Damiani and
               Seth Proctor},
  title     = {Proceedings of the 4th {ACM} Workshop On Secure Web Services, {SWS}
               2007, Fairfax, VA, USA, November 2, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {978-1-59593-892-3},
  timestamp = {Tue, 22 Apr 2008 11:20:54 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/wosp/2007,
  editor    = {Vittorio Cortellessa and
               Sebasti{\'{a}}n Uchitel and
               Daniel Yankelevich},
  title     = {Proceedings of the 6th International Workshop on Software and Performance,
               {WOSP} 2007, Buenes Aires, Argentina, February 5-8, 2007},
  publisher = {{ACM}},
  year      = {2007},
  isbn      = {1-59593-297-6},
  timestamp = {Mon, 23 Apr 2007 07:42:48 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/wosp/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2006,
  title     = {19th {IEEE} Computer Security Foundations Workshop, {(CSFW-19} 2006),
               5-7 July 2006, Venice, Italy},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=10965},
  isbn      = {0-7695-2615-2},
  timestamp = {Fri, 13 May 2016 11:50:11 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/dbsec/2006,
  editor    = {Ernesto Damiani and
               Peng Liu},
  title     = {Data and Applications Security XX, 20th Annual {IFIP} {WG} 11.3 Working
               Conference on Data and Applications Security, Sophia Antipolis, France,
               July 31-August 2, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4127},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11805588},
  doi       = {10.1007/11805588},
  isbn      = {3-540-36796-9},
  timestamp = {Fri, 26 May 2017 00:49:35 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/dbsec/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2006,
  editor    = {Dieter Gollmann and
               Jan Meier and
               Andrei Sabelfeld},
  title     = {Computer Security - {ESORICS} 2006, 11th European Symposium on Research
               in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4189},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11863908},
  doi       = {10.1007/11863908},
  isbn      = {3-540-44601-X},
  timestamp = {Fri, 02 Jun 2017 13:01:07 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/esorics/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icws/2006,
  title     = {2006 {IEEE} International Conference on Web Services {(ICWS} 2006),
               18-22 September 2006, Chicago, Illinois, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2006},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=4031979},
  isbn      = {0-7695-2669-1},
  timestamp = {Wed, 19 Aug 2015 17:47:18 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icws/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2006,
  editor    = {David F. Ferraiolo and
               Indrakshi Ray},
  title     = {11th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1133058},
  doi       = {10.1145/1133058},
  isbn      = {1-59593-353-0},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2005,
  editor    = {Vijay Atluri and
               Catherine A. Meadows and
               Ari Juels},
  title     = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  publisher = {{ACM}},
  year      = {2005},
  isbn      = {1-59593-226-7},
  timestamp = {Mon, 14 Mar 2016 15:38:52 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cec/2005,
  title     = {Proceedings of the {IEEE} Congress on Evolutionary Computation, {CEC}
               2005, 2-4 September 2005, Edinburgh, {UK}},
  publisher = {{IEEE}},
  year      = {2005},
  isbn      = {0-7803-9363-5},
  timestamp = {Sun, 29 Jul 2007 13:54:06 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/cec/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2005,
  editor    = {Elena Ferrari and
               Gail{-}Joon Ahn},
  title     = {10th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2005, Stockholm, Sweden, June 1-3, 2005, Proceedings},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1063979},
  doi       = {10.1145/1063979},
  isbn      = {1-59593-045-0},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/csfw/2004,
  title     = {17th {IEEE} Computer Security Foundations Workshop, {(CSFW-17} 2004),
               28-30 June 2004, Pacific Grove, CA, {USA}},
  publisher = {{IEEE} Computer Society},
  year      = {2004},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=9168},
  isbn      = {0-7695-2169-X},
  timestamp = {Fri, 13 May 2016 11:50:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/csfw/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sws/2004,
  editor    = {Vijay Atluri},
  title     = {Proceedings of the 1st {ACM} Workshop On Secure Web Services, {SWS}
               2004, Fairfax, VA, USA, October 29, 2004},
  publisher = {{ACM}},
  year      = {2004},
  isbn      = {1-58113-973-X},
  timestamp = {Tue, 22 Apr 2008 12:11:53 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/sws/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2003,
  editor    = {Sushil Jajodia and
               Vijayalakshmi Atluri and
               Trent Jaeger},
  title     = {Proceedings of the 10th {ACM} Conference on Computer and Communications
               Security, {CCS} 2003, Washington, DC, USA, October 27-30, 2003},
  publisher = {{ACM}},
  year      = {2003},
  url       = {http://dl.acm.org/citation.cfm?id=948109},
  isbn      = {1-58113-738-9},
  timestamp = {Fri, 09 Dec 2011 14:34:06 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/ccs/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2003,
  editor    = {Elena Ferrari and
               David F. Ferraiolo},
  title     = {8th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings},
  publisher = {{ACM}},
  year      = {2003},
  url       = {https://doi.org/10.1145/775412},
  doi       = {10.1145/775412},
  isbn      = {1-58113-681-1},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2003},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2002,
  editor    = {Ravi Sandhu and
               Elisa Bertino},
  title     = {7th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2002, Naval Postgraduate School, Monterey, California, USA, June 3-4,
               2002},
  publisher = {{ACM}},
  year      = {2002},
  url       = {https://doi.org/10.1145/507711},
  doi       = {10.1145/507711},
  isbn      = {1-58113-496-7},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/sacmat/2002},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI, founded at University of Trier