default search action
SACMAT 2011: Innsbruck, Austria
- Ruth Breu, Jason Crampton, Jorge Lobo:
16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings. ACM 2011, ISBN 978-1-4503-0688-1
Keynote address
- David A. Basin, Manuel Clavel, Marina Egea:
A decade of model-driven security. 1-10
Distributed processing and access control
- Anne Baumgrass, Mark Strembeck, Stefanie Rinderle-Ma:
Deriving role engineering artifacts from business processes and scenario models. 11-20 - Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, Uwe Zdun, Schahram Dustdar:
An integrated approach for identity and access management in a SOA context. 21-30 - Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali:
xDAuth: a scalable and lightweight framework for cross domain access control and delegation. 31-40
Policy languages
- Glenn Bruns, Michael Huth, Kumar Avijit:
Program synthesis in administration of higher-order permissions. 41-50 - Philip W. L. Fong, Ida Sri Rejeki Siahaan:
Relationship-based access control policies and their policy languages. 51-60 - Qun Ni, Elisa Bertino:
xfACL: an extensible functional language for access control. 61-72
Logic programming based access control specification
- Srdjan Marinovic, Robert Craven, Jiefei Ma, Naranker Dulay:
Rumpole: a flexible break-glass access control model. 73-82 - Prasad Naldurg, K. R. Raghavendra:
SEAL: a logic programming framework for specifying and verifying access control models. 83-92
Data flow and access control
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
Transforming provenance using redaction. 93-102 - Qihua Wang, Hongxia Jin:
Data leakage mitigation for discretionary access control in collaboration clouds. 103-112 - Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Modeling data flow in socio-information networks: a risk estimation approach. 113-122
Applications
- Sitaram Chamarty, Hiren D. Patel, Mahesh V. Tripunitara:
An authorization scheme for version control systems. 123-132 - Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff:
An approach to modular and testable security models of real-world health-care applications. 133-142
System Demonstrations
- Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta:
Security validation tool for business processes. 143-144 - Youngja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari:
System for automatic estimation of data sensitivity with applications to access control and other applications. 145-146 - Ganna Monakova, Andreas Schaad:
Visualizing security in business processes. 147-148 - Matthew Hudnall, Maury Mitchell, Allen S. Parrish:
Access control for a federated police information system. 149-150 - Enrico Lovat, Alexander Pretschner:
Data-centric multi-layer usage control enforcement: a social network example. 151-152
Panel
- Robert W. Reeder:
Usable access control for all. 153-154
Policy analysis and obligations
- Yves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh:
Validation of security policies by the animation of Z specifications. 155-164 - Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Anomaly discovery and resolution in web access control policies. 165-174 - Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin:
On the management of user obligations. 175-184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.