default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 25 matches
- 2010
- Ehab Al-Shaer:
Automated management of network access control from design to enforcement. SACMAT 2010: 77 - Steve Barker:
Personalizing access control by generalizing access control. SACMAT 2010: 149-158 - David A. Basin, Felix Klaedtke, Samuel Müller:
Monitoring security policies with metric first-order temporal logic. SACMAT 2010: 23-34 - Lujo Bauer, Adam J. Lee:
Solving the access-control puzzle: finding the pieces and putting them together. SACMAT 2010: 159-160 - Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer:
A card requirements language enabling privacy-preserving access control. SACMAT 2010: 119-128 - Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:
Towards analyzing complex operating system access control configurations. SACMAT 2010: 13-22 - Kathi Fisler, Shriram Krishnamurthi:
A model of triangulating environments for policy authoring. SACMAT 2010: 3-12 - Mario Frank, Joachim M. Buhmann, David A. Basin:
On the definition of role mining. SACMAT 2010: 35-44 - Virgil D. Gligor:
Architectures for practical security. SACMAT 2010: 161-162 - Tyrone Grandison:
New access models for healthcare. SACMAT 2010: 1-2 - Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita:
Capability-based delegation model in RBAC. SACMAT 2010: 109-118 - Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. SACMAT 2010: 163-172 - Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
Role updating for assignments. SACMAT 2010: 89-98 - Florian Kerschbaum:
An access control model for mobile physical objects. SACMAT 2010: 193-202 - Michael S. Kirkpatrick, Elisa Bertino:
Enforcing spatial constraints for mobile RBAC systems. SACMAT 2010: 99-108 - Gregory Leighton, Denilson Barbosa:
Access control policy translation and verification within heterogeneous data federations. SACMAT 2010: 173-182 - Dan Lin, Anna Cinzia Squicciarini:
Data protection models for service provisioning in the cloud. SACMAT 2010: 183-192 - Xiaopu Ma, Ruixuan Li, Zhengding Lu:
Role mining based on weights. SACMAT 2010: 65-74 - Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
Mining roles with noisy data. SACMAT 2010: 45-54 - Oscar García Morchon, Klaus Wehrle:
Modular context-aware access control for medical sensor networks. SACMAT 2010: 129-138 - Hassan Takabi, James B. D. Joshi:
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. SACMAT 2010: 55-64 - Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram:
Access control in practice: pain points. SACMAT 2010: 75-76 - Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam:
Privacy-preserving trust verification. SACMAT 2010: 139-148 - Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam:
Role-based access control (RBAC) in Java via proxy objects using annotations. SACMAT 2010: 79-88 - James B. D. Joshi, Barbara Carminati:
15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings. ACM 2010, ISBN 978-1-4503-0049-0 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-24 13:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint