default search action
SACMAT 2008: Estes Park, CO, USA
- Indrakshi Ray, Ninghui Li:
13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings. ACM 2008, ISBN 978-1-60558-129-3
Role mining
- Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan:
Fast exact and heuristic methods for role minimization problems. 1-10 - Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam:
Migrating to optimal RBAC with minimal perturbation. 11-20 - Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo:
Mining roles with semantic meanings. 21-30
Workflow systems
- Jason Crampton, Hemanth Khambhammettu:
Delegation and satisfiability in workflow systems. 31-40 - Keith Irwin, Ting Yu, William H. Winsborough:
Enforcing security properties in task-based systems. 41-50 - Christian Wolter, Andreas Schaad, Christoph Meinel:
Task-based entailment constraints for basic workflow patterns. 51-60
Panel on role engineering
- Vijay Atluri:
Panel on role engineering. 61-62
Role based access control
- Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu:
Authorization recycling in RBAC systems. 63-72 - Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. 73-82 - Yue Zhang, James B. D. Joshi:
UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. 83-92
Access control in distributed environments
- M. A. C. Dekker, Jason Crampton, Sandro Etalle:
RBAC administration in distributed systems. 93-102 - Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. 103-112 - Devdatta Kulkarni, Anand Tripathi:
Context-aware role-based access control in pervasive computing systems. 113-122
Obligations
- Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert:
A general obligation model and continuity: enhanced policy enforcement engine for usage control. 123-132 - Qun Ni, Elisa Bertino, Jorge Lobo:
An obligation model bridging access control policies and privacy policies. 133-142 - Steve Barker:
Access control by action control. 143-152
Panel on meta models for access control
- David F. Ferraiolo, Vijay Atluri:
A meta model for access control: why is it needed and is it even possible to achieve? 153-154
Access control in systems
- Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger:
Measuring integrity on mobile phone systems. 155-164 - Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn:
Visualization based policy analysis: case study in SELinux. 165-174 - Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert:
Model-based behavioral attestation. 175-184
Policy analysis
- Lujo Bauer, Scott Garriss, Michael K. Reiter:
Detecting and resolving policy misconfigurations in access-control systems. 185-194 - Hongxin Hu, Gail-Joon Ahn:
Enabling verification and conformance testing for access control model. 195-204
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.