default search action
SACMAT 2001: Chantilly, Virginia, USA
- Ravi S. Sandhu, Trent Jaeger:
6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001. ACM 2001, ISBN 1-58113-350-2 - Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob:
The role-based access control system of a European bank: a case study and discussion. 3-9 - Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd:
Securing context-aware applications using environment roles. 10-20 - Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas:
Flexible team-based access control using contexts. 21-27 - Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata:
Security verification of programs with stack inspection. 31-40 - Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca:
A logical framework for reasoning about access control models. 41-52 - Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr:
Panel: The next generation of acess control models (panel session): do we need them and what should they be? 53 - Elisa Bertino, Silvana Castano, Elena Ferrari:
On specifying security policies for web documents with an XML-based language. 57-65 - Myong H. Kang, Joon S. Park, Judith N. Froscher:
Access control mechanisms for inter-organizational workflow. 66-74 - Ty van den Akker, Quinn Snell, Mark J. Clement:
The YGuard access control model: set-based access control. 75-84 - Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth:
Improving the granularity of access control in Windows NT. 87-96 - Horst F. Wedde, Mario Lischka:
Modular authorization. 97-105 - Jonathon Tidswell, John Potter:
A graphical definition of authorization schema in the DTAC model. 109-120 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
On the specification and evolution of access control policies. 121-130 - Trent Jaeger:
Managing access control complexity using metrices. 131-139 - Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson:
Panel: which access control technique will provide the greatest overall benefit-Abstract. 141 - David F. Ferraiolo:
An argument for the role-based access control model. 142-143 - Mikel L. Matthews:
Position paper. 144 - Casey Schaufler:
They want froot loops why industry will continue to deliver multi-level security. 145-146 - Stephen Smalley:
Which operating system access control technique will provide the greatest overall benefit to users?. 147-148 - Robert Watson:
Statement for SACMAT 2001 panel. 149 - Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu:
A rule-based framework for role based delegation. 153-162 - Najam Perwaiz:
Structured management of role-permission relationships. 163-169 - Walt Yao, Ken Moody, Jean Bacon:
A model of OASIS role-based access control and its support for active security. 171-181
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.