:facetid:toc:\"db/conf/sacmat/sacmat2001.bht\"OK:facetid:toc:db/conf/sacmat/sacmat2001.bhtTy van den AkkerQuinn SnellMark J. ClementThe YGuard access control model: set-based access control.SACMAT75-842001Conference and Workshop Papersclosedconf/sacmat/AkkerSC0110.1145/373256.373268https://doi.org/10.1145/373256.373268https://dblp.org/rec/conf/sacmat/AkkerSC01URL#6388879Elisa BertinoSilvana CastanoElena FerrariOn specifying security policies for web documents with an XML-based language.SACMAT57-652001Conference and Workshop Papersclosedconf/sacmat/BertinoCF0110.1145/373256.373264https://doi.org/10.1145/373256.373264https://dblp.org/rec/conf/sacmat/BertinoCF01URL#6388880Elisa BertinoBarbara CataniaElena FerrariPaolo PerlascaA logical framework for reasoning about access control models.SACMAT41-522001Conference and Workshop Papersclosedconf/sacmat/BertinoCFP0110.1145/373256.373261https://doi.org/10.1145/373256.373261https://dblp.org/rec/conf/sacmat/BertinoCFP01URL#6388881Michael J. CovingtonWende LongSrividhya SrinivasanAnind K. DeyMustaque AhamadGregory D. AbowdSecuring context-aware applications using environment roles.SACMAT10-202001Conference and Workshop Papersclosedconf/sacmat/CovingtonLSDAA0110.1145/373256.373258https://doi.org/10.1145/373256.373258https://dblp.org/rec/conf/sacmat/CovingtonLSDAA01URL#6388882David F. FerraioloAn argument for the role-based access control model.SACMAT142-1432001Conference and Workshop Papersclosedconf/sacmat/Ferraiolo0110.1145/373256.378405https://doi.org/10.1145/373256.378405https://dblp.org/rec/conf/sacmat/Ferraiolo01URL#6388883Timothy FraserDavid F. FerraioloMikel L. MatthewsCasey SchauflerStephen SmalleyRobert WatsonPanel: which access control technique will provide the greatest overall benefit-Abstract.SACMAT1412001Conference and Workshop Papersclosedconf/sacmat/FraserFMSSW0110.1145/373256.373285https://doi.org/10.1145/373256.373285https://dblp.org/rec/conf/sacmat/FraserFMSSW01URL#6388884Christos K. GeorgiadisIoannis MavridisGeorge PangalosRoshan K. ThomasFlexible team-based access control using contexts.SACMAT21-272001Conference and Workshop Papersclosedconf/sacmat/GeorgiadisMPT0110.1145/373256.373259https://doi.org/10.1145/373256.373259https://dblp.org/rec/conf/sacmat/GeorgiadisMPT01URL#6388885Trent JaegerManaging access control complexity using metrices.SACMAT131-1392001Conference and Workshop Papersclosedconf/sacmat/Jaeger0110.1145/373256.373283https://doi.org/10.1145/373256.373283https://dblp.org/rec/conf/sacmat/Jaeger01URL#6388886Myong H. KangJoon S. ParkJudith N. FroscherAccess control mechanisms for inter-organizational workflow.SACMAT66-742001Conference and Workshop Papersclosedconf/sacmat/KangPF0110.1145/373256.373266https://doi.org/10.1145/373256.373266https://dblp.org/rec/conf/sacmat/KangPF01URL#6388887Manuel KochLuigi V. ManciniFrancesco Parisi-PresicceOn the specification and evolution of access control policies.SACMAT121-1302001Conference and Workshop Papersclosedconf/sacmat/KochMP0110.1145/373256.373280https://doi.org/10.1145/373256.373280https://dblp.org/rec/conf/sacmat/KochMP01URL#6388888Mikel L. MatthewsPosition paper.SACMAT1442001Conference and Workshop Papersclosedconf/sacmat/Matthews0110.1145/373256.378406https://doi.org/10.1145/373256.378406https://dblp.org/rec/conf/sacmat/Matthews01URL#6388889Naoya NittaHiroyuki SekiYoshiaki TakataSecurity verification of programs with stack inspection.SACMAT31-402001Conference and Workshop Papersclosedconf/sacmat/NittaST0110.1145/373256.373260https://doi.org/10.1145/373256.373260https://dblp.org/rec/conf/sacmat/NittaST01URL#6388890Najam PerwaizStructured management of role-permission relationships.SACMAT163-1692001Conference and Workshop Papersclosedconf/sacmat/Perwaiz0110.1145/373256.373292https://doi.org/10.1145/373256.373292https://dblp.org/rec/conf/sacmat/Perwaiz01URL#6388891Ravi S. SandhuElisa BertinoTrent JaegerD. Richard KuhnCarl E. LandwehrPanel: The next generation of acess control models (panel session): do we need them and what should they be?SACMAT532001Conference and Workshop Papersclosedconf/sacmat/SandhuBJKL0110.1145/373256.373262https://doi.org/10.1145/373256.373262https://dblp.org/rec/conf/sacmat/SandhuBJKL01URL#6388892Andreas SchaadJonathan D. MoffettJeremy JacobThe role-based access control system of a European bank: a case study and discussion.SACMAT3-92001Conference and Workshop Papersclosedconf/sacmat/SchaadMJ0110.1145/373256.373257https://doi.org/10.1145/373256.373257https://dblp.org/rec/conf/sacmat/SchaadMJ01URL#6388893Casey SchauflerThey want froot loops why industry will continue to deliver multi-level security.SACMAT145-1462001Conference and Workshop Papersclosedconf/sacmat/Schaufler0110.1145/373256.378407https://doi.org/10.1145/373256.378407https://dblp.org/rec/conf/sacmat/Schaufler01URL#6388894Stephen SmalleyWhich operating system access control technique will provide the greatest overall benefit to users?.SACMAT147-1482001Conference and Workshop Papersclosedconf/sacmat/Smalley0110.1145/373256.378409https://doi.org/10.1145/373256.378409https://dblp.org/rec/conf/sacmat/Smalley01URL#6388895Michael M. SwiftPeter BrundrettCliff Van DykePraerit GargAnne HopkinsShannon ChanMario GoertzelGregory JensenworthImproving the granularity of access control in Windows NT.SACMAT87-962001Conference and Workshop Papersclosedconf/sacmat/SwiftBDGHCGJ0110.1145/373256.373271https://doi.org/10.1145/373256.373271https://dblp.org/rec/conf/sacmat/SwiftBDGHCGJ01URL#6388896Jonathon TidswellJohn PotterA graphical definition of authorization schema in the DTAC model.SACMAT109-1202001Conference and Workshop Papersclosedconf/sacmat/TidswellP0110.1145/373256.373276https://doi.org/10.1145/373256.373276https://dblp.org/rec/conf/sacmat/TidswellP01URL#6388897Robert WatsonStatement for SACMAT 2001 panel.SACMAT1492001Conference and Workshop Papersclosedconf/sacmat/Watson0110.1145/373256.378411https://doi.org/10.1145/373256.378411https://dblp.org/rec/conf/sacmat/Watson01URL#6388898Horst F. WeddeMario LischkaModular authorization.SACMAT97-1052001Conference and Workshop Papersclosedconf/sacmat/WeddeL0110.1145/373256.373274https://doi.org/10.1145/373256.373274https://dblp.org/rec/conf/sacmat/WeddeL01URL#6388899Walt YaoKen MoodyJean BaconA model of OASIS role-based access control and its support for active security.SACMAT171-1812001Conference and Workshop Papersclosedconf/sacmat/YaoMB0110.1145/373256.373294https://doi.org/10.1145/373256.373294https://dblp.org/rec/conf/sacmat/YaoMB01URL#6388900Longhua ZhangGail-Joon AhnBei-tseng ChuA rule-based framework for role based delegation.SACMAT153-1622001Conference and Workshop Papersclosedconf/sacmat/ZhangAC0110.1145/373256.373289https://doi.org/10.1145/373256.373289https://dblp.org/rec/conf/sacmat/ZhangAC01URL#6388901Ravi S. SandhuTrent Jaeger6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001SACMATACM2001Editorshipconf/sacmat/200110.1145/373256https://doi.org/10.1145/373256https://dblp.org/rec/conf/sacmat/2001URL#6398389