Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2013.bht:"
@inproceedings{DBLP:conf/sacmat/AbdunabiRF13, author = {Ramadan Abdunabi and Indrakshi Ray and Robert B. France}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Specification and analysis of access control policies for mobile applications}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {173--184}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463206}, doi = {10.1145/2462410.2463206}, timestamp = {Tue, 06 Nov 2018 16:57:58 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AbdunabiRF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AdamsL13, author = {Andrew K. Adams and Adam J. Lee}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Combining social authentication and untrusted clouds for private location sharing}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {15--24}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462421}, doi = {10.1145/2462410.2462421}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AdamsL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AmthorKP13, author = {Peter Amthor and Winfried E. K{\"{u}}hnhauser and Anja P{\"{o}}lck}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Heuristic safety analysis of access control models}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {137--148}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462413}, doi = {10.1145/2462410.2462413}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AmthorKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoGORW13, author = {Alessandro Armando and Matteo Grasso and Sander Oudkerk and Silvio Ranise and Konrad S. Wrona}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Content-based information protection and release in {NATO} operations}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {261--264}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462427}, doi = {10.1145/2462410.2462427}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoGORW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BalasubramaniamF13, author = {Jayalakshmi Balasubramaniam and Philip W. L. Fong}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {A white-box policy analysis and its efficient implementation}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {149--160}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462416}, doi = {10.1145/2462410.2462416}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BalasubramaniamF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BaracaldoJ13, author = {Nathalie Baracaldo and James Joshi}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Beyond accountability: using obligations to reduce risk exposure and deter insider attacks}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {213--224}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462411}, doi = {10.1145/2462410.2462411}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BaracaldoJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BonattiGT13, author = {Piero A. Bonatti and Clemente Galdi and Davide Torres}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {{ERBAC:} event-driven {RBAC}}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {125--136}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462415}, doi = {10.1145/2462410.2462415}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BonattiGT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BotelhoPN13, author = {Bruno Alves Pereira Botelho and Dennis Guimar{\~{a}}es Pelluzi and Emilio Tissato Nakamura}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {A versatile access control implementation: secure box}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {249--252}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463208}, doi = {10.1145/2462410.2463208}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BotelhoPN13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CerboTSDB13, author = {Francesco Di Cerbo and Slim Trabelsi and Thomas Steingruber and Gabriella Dodero and Michele Bezzi}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Sticky policies for mobile devices}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {257--260}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462429}, doi = {10.1145/2462410.2462429}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CerboTSDB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChariHMPT13, author = {Suresh Chari and Ted Habeck and Ian M. Molloy and Youngja Park and Wilfried Teiken}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {A bigData platform for analytics on access control policies and logs}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {185--188}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462433}, doi = {10.1145/2462410.2462433}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChariHMPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChariMPT13, author = {Suresh Chari and Ian M. Molloy and Youngja Park and Wilfried Teiken}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Ensuring continuous compliance through reconciling policy with usage}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {49--60}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462417}, doi = {10.1145/2462410.2462417}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChariMPT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ChowdhuryGNRBDJW13, author = {Omar Chowdhury and Andreas Gampe and Jianwei Niu and Jeffery von Ronne and Jared Bennatt and Anupam Datta and Limin Jia and William H. Winsborough}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Privacy promises that can be kept: a policy analysis method with application to the {HIPAA} privacy rule}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {3--14}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462423}, doi = {10.1145/2462410.2462423}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ChowdhuryGNRBDJW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonG13, author = {Jason Crampton and Gregory Z. Gutin}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Constraint expressions and workflow satisfiability}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {73--84}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462419}, doi = {10.1145/2462410.2462419}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FarnanLCY13, author = {Nicholas L. Farnan and Adam J. Lee and Panos K. Chrysanthis and Ting Yu}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Enabling intensional access control via preference-aware query optimization}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {189--192}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462428}, doi = {10.1145/2462410.2462428}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/FarnanLCY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuarnieriNMM13, author = {Marco Guarnieri and Mario Arrigoni Neri and Eros Magri and Simone Mutti}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {On the notion of redundancy in access control policies}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {161--172}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462426}, doi = {10.1145/2462410.2462426}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GuarnieriNMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KafuraG13, author = {Dennis G. Kafura and Denis Gracanin}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {An information flow control meta-model}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {101--112}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462414}, doi = {10.1145/2462410.2462414}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KafuraG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Kerschbaum13, author = {Florian Kerschbaum}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Searching over encrypted data in cloud systems}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {87--88}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462888}, doi = {10.1145/2462410.2462888}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Kerschbaum13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KohlerMH13, author = {Jens K{\"{o}}hler and Jens Mittag and Hannes Hartenstein}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {User-centric management of distributed credential repositories: balancing availability and vulnerability}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {237--248}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462412}, doi = {10.1145/2462410.2462412}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KohlerMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeibengerS13, author = {Dominik Leibenger and Christoph Sorge}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {A storage-efficient cryptography-based access control solution for subversion}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {201--212}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462420}, doi = {10.1145/2462410.2462420}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LeibengerS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LiLWMG13, author = {Ruixuan Li and Huaqing Li and Wei Wang and Xiaopu Ma and Xiwu Gu}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {RMiner: a tool set for role mining}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {193--196}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462431}, doi = {10.1145/2462410.2462431}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LiLWMG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MolloyTLKSA13, author = {Ian M. Molloy and Mahesh V. Tripunitara and Volkmar Lotz and Martin Kuhlmann and Casey Schaufler and Vijay Atluri}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Panel on granularity in access control}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {85--86}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462889}, doi = {10.1145/2462410.2462889}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MolloyTLKSA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Sadeghi13, author = {Ahmad{-}Reza Sadeghi}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Mobile security and privacy: the quest for the mighty access control}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {1--2}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463204}, doi = {10.1145/2462410.2463204}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Sadeghi13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchropferSKBJ13, author = {Axel Schr{\"{o}}pfer and Andreas Schaad and Florian Kerschbaum and Heiko Boehm and Joerg Jooss}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Secure benchmarking in the cloud}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {197--200}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462430}, doi = {10.1145/2462410.2462430}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SchropferSKBJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SharifiBT13, author = {Alireza Sharifi and Paul Bottinelli and Mahesh V. Tripunitara}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Property-testing real-world authorization systems}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {225--236}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463207}, doi = {10.1145/2462410.2463207}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SharifiBT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SharifiT13, author = {Alireza Sharifi and Mahesh V. Tripunitara}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Least-restrictive enforcement of the Chinese wall security policy}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {61--72}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462425}, doi = {10.1145/2462410.2462425}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SharifiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SturmK13, author = {Detlef Sturm and Axel Kern}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Permission path analysis based on access intelligence}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {253--256}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462432}, doi = {10.1145/2462410.2462432}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SturmK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ThimmaTL13, author = {Manogna Thimma and Tsam Kai Tsui and Bo Luo}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {HyXAC: a hybrid approach for {XML} access control}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {113--124}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462424}, doi = {10.1145/2462410.2462424}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ThimmaTL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XieRAG13, author = {Xing Xie and Indrakshi Ray and Raman Adaikkalavan and Rose F. Gamble}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Information flow control for stream processing in clouds}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {89--100}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2463205}, doi = {10.1145/2462410.2463205}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/XieRAG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/YiPBX13, author = {Xun Yi and Russell Paulet and Elisa Bertino and Guandong Xu}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Private data warehouse queries}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {25--36}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462418}, doi = {10.1145/2462410.2462418}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/YiPBX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangCGLM13, author = {Wen Zhang and You Chen and Carl A. Gunter and David M. Liebovitz and Bradley A. Malin}, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {Evolving role definitions through permission invocation patterns}, booktitle = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, pages = {37--48}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410.2462422}, doi = {10.1145/2462410.2462422}, timestamp = {Fri, 04 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangCGLM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2013, editor = {Mauro Conti and Jaideep Vaidya and Andreas Schaad}, title = {18th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '13, Amsterdam, The Netherlands, June 12-14, 2013}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2462410}, doi = {10.1145/2462410}, isbn = {978-1-4503-1950-8}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2013.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.