default search action
SACMAT 2005: Stockholm, Sweden
- Elena Ferrari, Gail-Joon Ahn:
10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings. ACM 2005, ISBN 1-59593-045-0
Access control policy management
- Sandro Etalle, William H. Winsborough:
Integrity constraints in trust management. 1-10 - David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn:
Composing and combining policies under the policy machine. 11-20 - Andreas Matheus:
Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. 21-28
Access control model I
- Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca:
GEO-RBAC: a spatially aware RBAC. 29-37 - Jason Crampton:
A reference monitor for workflow systems with constrained task execution. 38-47
Panel: Next generation access control models
- Konstantin Beznosov:
Future direction of access control models, architectures, and technologies. 48
Access control model II
- Vijayalakshmi Atluri, Janice Warner:
Supporting conditional delegation in secure workflow management systems. 49-58 - Jacques Wainer, Akhil Kumar:
A fine-grained, controllable, user-to-user delegation method in RBAC. 59-66
Access control for XML document
- Barbara Carminati, Elena Ferrari:
AC-XML documents: improving the performance of a web access control module. 67-76 - Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko:
Generalized XML security views. 77-84 - Mizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse:
Relevancy based access control of versioned XML documents. 85-94
Privacy control
- Marina Blanton, Mikhail J. Atallah:
Provable bounds for portable and flexible privacy-preserving access. 95-101 - Ji-Won Byun, Elisa Bertino, Ninghui Li:
Purpose based access control of complex data for privacy protection. 102-110
Applications
- R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma:
Context sensitive access control. 111-119 - Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander:
Verifiable composition of access control and application features. 120-129 - Axel Kern, Claudia Walhorn:
Rule support for role-based access control. 130-138
Access management for distributed systems
- Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons:
Adaptive trust negotiation and access control. 139-146 - Ravi S. Sandhu, Xinwen Zhang:
Peer-to-peer access control architecture using trusted computing technology. 147-158
Role management
- Mohamed Shehab, Elisa Bertino, Arif Ghafoor:
SERAT: SEcure role mApping technique for decentralized secure interoperability. 159-167 - Jürgen Schlegelmilch, Ulrike Steffens:
Role mining with ORCA. 168-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.