![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
SACMAT 2013: Amsterdam, The Netherlands
- Mauro Conti, Jaideep Vaidya, Andreas Schaad:
18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013. ACM 2013, ISBN 978-1-4503-1950-8
Keynote address
- Ahmad-Reza Sadeghi:
Mobile security and privacy: the quest for the mighty access control. 1-2
Privacy & compliance
- Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne
, Jared Bennatt, Anupam Datta, Limin Jia
, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. 3-14 - Andrew K. Adams, Adam J. Lee
:
Combining social authentication and untrusted clouds for private location sharing. 15-24 - Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:
Private data warehouse queries. 25-36
Policy management & enforcement
- Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz
, Bradley A. Malin:
Evolving role definitions through permission invocation patterns. 37-48 - Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken:
Ensuring continuous compliance through reconciling policy with usage. 49-60 - Alireza Sharifi, Mahesh V. Tripunitara:
Least-restrictive enforcement of the Chinese wall security policy. 61-72 - Jason Crampton, Gregory Z. Gutin:
Constraint expressions and workflow satisfiability. 73-84
Panel
- Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
:
Panel on granularity in access control. 85-86
Keynote address
- Florian Kerschbaum:
Searching over encrypted data in cloud systems. 87-88
Systems & information flow
- Xing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble:
Information flow control for stream processing in clouds. 89-100 - Dennis G. Kafura, Denis Gracanin
:
An information flow control meta-model. 101-112 - Manogna Thimma, Tsam Kai Tsui, Bo Luo
:
HyXAC: a hybrid approach for XML access control. 113-124 - Piero A. Bonatti
, Clemente Galdi
, Davide Torres:
ERBAC: event-driven RBAC. 125-136
Policy analysis
- Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
Heuristic safety analysis of access control models. 137-148 - Jayalakshmi Balasubramaniam, Philip W. L. Fong:
A white-box policy analysis and its efficient implementation. 149-160 - Marco Guarnieri
, Mario Arrigoni Neri, Eros Magri, Simone Mutti:
On the notion of redundancy in access control policies. 161-172 - Ramadan Abdunabi, Indrakshi Ray, Robert B. France:
Specification and analysis of access control policies for mobile applications. 173-184
Demo session I
- Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken:
A bigData platform for analytics on access control policies and logs. 185-188 - Nicholas L. Farnan, Adam J. Lee
, Panos K. Chrysanthis
, Ting Yu:
Enabling intensional access control via preference-aware query optimization. 189-192 - Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu:
RMiner: a tool set for role mining. 193-196 - Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss:
Secure benchmarking in the cloud. 197-200
Applications
- Dominik Leibenger, Christoph Sorge:
A storage-efficient cryptography-based access control solution for subversion. 201-212 - Nathalie Baracaldo
, James Joshi:
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. 213-224 - Alireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara:
Property-testing real-world authorization systems. 225-236 - Jens Köhler, Jens Mittag, Hannes Hartenstein:
User-centric management of distributed credential repositories: balancing availability and vulnerability. 237-248
Demo session II
- Bruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura:
A versatile access control implementation: secure box. 249-252 - Detlef Sturm, Axel Kern:
Permission path analysis based on access intelligence. 253-256 - Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi:
Sticky policies for mobile devices. 257-260 - Alessandro Armando
, Matteo Grasso, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Content-based information protection and release in NATO operations. 261-264
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.