Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2017.bht:"
@inproceedings{DBLP:conf/sacmat/AbidinAP17, author = {Aysajan Abidin and Enrique Argones{-}R{\'{u}}a and Roel Peeters}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {21--29}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078863}, doi = {10.1145/3078861.3078863}, timestamp = {Tue, 09 Feb 2021 08:50:30 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AbidinAP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AhmadinejadF17, author = {Seyed Hossein Ahmadinejad and Philip W. L. Fong}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {55--66}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078867}, doi = {10.1145/3078861.3078867}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AhmadinejadF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AldermanCF17, author = {James Alderman and Jason Crampton and Naomi Farley}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {A Framework for the Cryptographic Enforcement of Information Flow Policies}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {143--154}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078868}, doi = {10.1145/3078861.3078868}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AldermanCF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BuiSL17, author = {Thang Bui and Scott D. Stoller and Jiajie Li}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Mining Relationship-Based Access Control Policies}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {239--246}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078878}, doi = {10.1145/3078861.3078878}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BuiSL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CaloVB17, author = {Seraphin B. Calo and Dinesh C. Verma and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Distributed Intelligence: Trends in the Management of Complex Systems}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {1--7}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078881}, doi = {10.1145/3078861.3078881}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CaloVB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonGW17, author = {Jason Crampton and Gregory Z. Gutin and R{\'{e}}mi Watrigant}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {On the Satisfiability of Workflows with Release Points}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {207--217}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078866}, doi = {10.1145/3078861.3078866}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonGW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonW17, author = {Jason Crampton and Conrad Williams}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Attribute Expressions, Policy Tables and Attribute-Based Access Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {79--90}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078865}, doi = {10.1145/3078861.3078865}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GautamJSVA17, author = {Mayank Gautam and Sadhana Jha and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: Constrained Policy Mining in Attribute Based Access Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {121--123}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084163}, doi = {10.1145/3078861.3084163}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GautamJSVA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuardaRS17, author = {Paolo Guarda and Silvio Ranise and Hari Siswantoro}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {247--254}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078879}, doi = {10.1145/3078861.3078879}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GuardaRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuptaPBS17, author = {Maanak Gupta and Farhan Patwa and James O. Benson and Ravi S. Sandhu}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {183--190}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084173}, doi = {10.1145/3078861.3084173}, timestamp = {Fri, 14 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GuptaPBS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuptaPS17, author = {Maanak Gupta and Farhan Patwa and Ravi S. Sandhu}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {{POSTER:} Access Control Model for the Hadoop Ecosystem}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {125--127}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084164}, doi = {10.1145/3078861.3084164}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/GuptaPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HaiderOLDD17, author = {Syed Kamran Haider and Hamza Omar and Ilia A. Lebedev and Srinivas Devadas and Marten van Dijk}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Leveraging Hardware Isolation for Process Level Access Control {\&} Authentication}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {133--141}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078882}, doi = {10.1145/3078861.3078882}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HaiderOLDD17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JohnsonMHBR017, author = {Claiborne Johnson and Thomas MacGahan and John Heaps and Kevin Baldor and Jeffery von Ronne and Jianwei Niu}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {167--178}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078873}, doi = {10.1145/3078861.3078873}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JohnsonMHBR017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KarafiliL17, author = {Erisa Karafili and Emil C. Lupu}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {231--238}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078876}, doi = {10.1145/3078861.3078876}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/KarafiliL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeeCKCLKK17, author = {Sanghak Lee and Jiwon Choi and Jihun Kim and Beumjin Cho and Sangho Lee and Hanjun Kim and Jong Kim}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {{FACT:} Functionality-centric Access Control System for IoT Programming Frameworks}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {43--54}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078864}, doi = {10.1145/3078861.3078864}, timestamp = {Thu, 28 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LeeCKCLKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeeLSJL17, author = {Wei{-}Han Lee and Xiaochen Liu and Yilin Shen and Hongxia Jin and Ruby B. Lee}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Secure Pick Up: Implicit Authentication When You Start Using the Smartphone}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {67--78}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078870}, doi = {10.1145/3078861.3078870}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LeeLSJL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LiDHWAZH17, author = {Hongda Li and Juan Deng and Hongxin Hu and Kuang{-}Ching Wang and Gail{-}Joon Ahn and Ziming Zhao and Wonkyu Han}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {129--131}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084166}, doi = {10.1145/3078861.3084166}, timestamp = {Mon, 12 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LiDHWAZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LuhSMJW17, author = {Robert Luh and Sebastian Schrittwieser and Stefan Marschalek and Helge Janicke and Edgar R. Weippl}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: Design of an Anomaly-based Threat Detection {\&} Explication System}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {119--120}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084162}, doi = {10.1145/3078861.3084162}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LuhSMJW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MacGahanJRR017, author = {Thomas MacGahan and Claiborne Johnson and Armando Rodriguez and Jeffery von Ronne and Jianwei Niu}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {191--198}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084176}, doi = {10.1145/3078861.3084176}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/MacGahanJRR017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MehnazBB17, author = {Shagufta Mehnaz and Gowtham Bellala and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {219--230}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078869}, doi = {10.1145/3078861.3078869}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/MehnazBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NaroueiKTPN17, author = {Masoud Narouei and Hamed Khanpour and Hassan Takabi and Natalie Parde and Rodney D. Nielsen}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Towards a Top-down Policy Engineering Framework for Attribute-based Access Control}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {103--114}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078874}, doi = {10.1145/3078861.3078874}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/NaroueiKTPN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PasarellaL17, author = {Edelmira Pasarella and Jorge Lobo}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {A Datalog Framework for Modeling Relationship-based Access Control Policies}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {91--102}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078871}, doi = {10.1145/3078861.3078871}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/PasarellaL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PetraccaCSJ17, author = {Giuseppe Petracca and Frank Capobianco and Christian Skalka and Trent Jaeger}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {On Risk in Access Control Enforcement}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {31--42}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078872}, doi = {10.1145/3078861.3078872}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/PetraccaCSJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PoratTS17, author = {Ehood Porat and Shmuel Tikochinski and Ariel Stulman}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Authorization Enforcement Detection}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {179--182}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084172}, doi = {10.1145/3078861.3084172}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PoratTS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PussewalageO17, author = {Harsha S. Gardiyawasam Pussewalage and Vladimir A. Oleshchuk}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {255--262}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078880}, doi = {10.1145/3078861.3078880}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/PussewalageO17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RodriguezMW17, author = {Rodney Rodriguez and Shaikh Mostafa and Xiaoyin Wang}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {NTApps: {A} Network Traffic Analyzer of Android Applications}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {199--206}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084175}, doi = {10.1145/3078861.3084175}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/RodriguezMW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SteiertLCJ17, author = {Douglas Steiert and Dan Lin and Quincy Conduff and Wei Jiang}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Poster: {A} Location-Privacy Approach for Continuous Queries}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {115--117}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3084161}, doi = {10.1145/3078861.3084161}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SteiertLCJ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TasaliCV17, author = {Qais Tasali and Chandan Chowdhury and Eugene Y. Vasserman}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {A Flexible Authorization Architecture for Systems of Interoperable Medical Devices}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {9--20}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078862}, doi = {10.1145/3078861.3078862}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TasaliCV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VishwamitraLWHC17, author = {Nishant Vishwamitra and Yifang Li and Kevin Wang and Hongxin Hu and Kelly Caine and Gail{-}Joon Ahn}, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks}, booktitle = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, pages = {155--166}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861.3078875}, doi = {10.1145/3078861.3078875}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VishwamitraLWHC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2017, editor = {Elisa Bertino and Ravi S. Sandhu and Edgar R. Weippl}, title = {Proceedings of the 22nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2017, Indianapolis, IN, USA, June 21-23, 2017}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3078861}, doi = {10.1145/3078861}, isbn = {978-1-4503-4702-0}, timestamp = {Tue, 09 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.