default search action
SACMAT 2010: Pittsburgh, Pennsylvania, USA
- James B. D. Joshi, Barbara Carminati:
15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings. ACM 2010, ISBN 978-1-4503-0049-0 - Tyrone Grandison:
New access models for healthcare. 1-2
Policy analysis
- Kathi Fisler, Shriram Krishnamurthi:
A model of triangulating environments for policy authoring. 3-12 - Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao:
Towards analyzing complex operating system access control configurations. 13-22 - David A. Basin, Felix Klaedtke, Samuel Müller:
Monitoring security policies with metric first-order temporal logic. 23-34
Role engineering
- Mario Frank, Joachim M. Buhmann, David A. Basin:
On the definition of role mining. 35-44 - Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens:
Mining roles with noisy data. 45-54 - Hassan Takabi, James B. D. Joshi:
StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. 55-64 - Xiaopu Ma, Ruixuan Li, Zhengding Lu:
Role mining based on weights. 65-74
Panel I
- Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram:
Access control in practice: pain points. 75-76 - Ehab Al-Shaer:
Automated management of network access control from design to enforcement. 77
Role based access control
- Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam:
Role-based access control (RBAC) in Java via proxy objects using annotations. 79-88 - Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
Role updating for assignments. 89-98 - Michael S. Kirkpatrick, Elisa Bertino:
Enforcing spatial constraints for mobile RBAC systems. 99-108 - Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita:
Capability-based delegation model in RBAC. 109-118
Privacy preserving access control
- Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer:
A card requirements language enabling privacy-preserving access control. 119-128 - Oscar García Morchon, Klaus Wehrle:
Modular context-aware access control for medical sensor networks. 129-138 - Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam:
Privacy-preserving trust verification. 139-148 - Steve Barker:
Personalizing access control by generalizing access control. 149-158
Panel II
- Lujo Bauer, Adam J. Lee:
Solving the access-control puzzle: finding the pieces and putting them together. 159-160 - Virgil D. Gligor:
Architectures for practical security. 161-162
Access control in distributed environments
- Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger:
An architecture for enforcing end-to-end access control over web applications. 163-172 - Gregory Leighton, Denilson Barbosa:
Access control policy translation and verification within heterogeneous data federations. 173-182 - Dan Lin, Anna Cinzia Squicciarini:
Data protection models for service provisioning in the cloud. 183-192 - Florian Kerschbaum:
An access control model for mobile physical objects. 193-202
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.