default search action
SACMAT 2004: IBM, Yorktown Heights, USA
- Trent Jaeger, Elena Ferrari:
9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings. ACM 2004, ISBN 1-58113-872-5 - Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu:
A logical specification for usage control. 1-10 - Urs Hengartner, Peter Steenkiste:
Implementing access control to people location information. 11-20 - Horst F. Wedde, Mario Lischka:
Role-based access control in ambient and remote space. 21-30 - Joachim Biskup, Sandra Wortmann:
Towards a credential-based implementation of compound access control policies. 31-40 - Marina Bykova, Mikhail J. Atallah:
Succinct specifications of portable document access policies. 41-50 - Xuhui Ao, Naftaly H. Minsky:
On the role of roles: from role-based to role-sensitive access control. 51-60 - Irini Fundulaki, Maarten Marx:
Specifying access control policies for XML documents with XPath. 61-69 - Jingzhu Wang, Sylvia L. Osborn:
A role-based approach to access control for XML databases. 70-77 - Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor:
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. 78-86 - Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert:
A meta model for authorisations in application security systems and their integration into RBAC administration. 87-96 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
Administrative scope in the graph-based framework. 97-104 - Trent Jaeger, Reiner Sailer, Xiaolan Zhang:
Resolving constraint conflicts. 105-114 - Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim:
Using uml to visualize role-based access control constraints. 115-124 - Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu:
Security for grid-based computing systems issues and challenges. 125 - Ninghui Li, Mahesh V. Tripunitara:
Security analysis in role-based access control. 126-135 - Giorgio Zanin, Luigi V. Mancini:
Towards a formal model for security policies specification and validation in the selinux system. 136-145 - Roberto Tamassia, Danfeng Yao, William H. Winsborough:
Role-based cascaded delegation. 146-155 - Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody:
Using trust and risk in role-based access control policies. 156-162 - Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito:
A composite rbac approach for large, complex organizations. 163-172
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.