SACMAT C

24 papers

YearTitle / Authors
20016th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001
Ravi S. Sandhu, Trent Jaeger
2001A graphical definition of authorization schema in the DTAC model.
Jonathon Tidswell, John Potter
2001A logical framework for reasoning about access control models.
Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
2001A model of OASIS role-based access control and its support for active security.
Walt Yao, Ken Moody, Jean Bacon
2001A rule-based framework for role based delegation.
Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu
2001Access control mechanisms for inter-organizational workflow.
Myong H. Kang, Joon S. Park, Judith N. Froscher
2001An argument for the role-based access control model.
David F. Ferraiolo
2001Flexible team-based access control using contexts.
Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas
2001Improving the granularity of access control in Windows NT.
Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth
2001Managing access control complexity using metrices.
Trent Jaeger
2001Modular authorization.
Horst F. Wedde, Mario Lischka
2001On specifying security policies for web documents with an XML-based language.
Elisa Bertino, Silvana Castano, Elena Ferrari
2001On the specification and evolution of access control policies.
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
2001Panel: The next generation of acess control models (panel session): do we need them and what should they be?
Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
2001Panel: which access control technique will provide the greatest overall benefit-Abstract.
Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
2001Position paper.
Mikel L. Matthews
2001Securing context-aware applications using environment roles.
Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd
2001Security verification of programs with stack inspection.
Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata
2001Statement for SACMAT 2001 panel.
Robert Watson
2001Structured management of role-permission relationships.
Najam Perwaiz
2001The YGuard access control model: set-based access control.
Ty van den Akker, Quinn Snell, Mark J. Clement
2001The role-based access control system of a European bank: a case study and discussion.
Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob
2001They want froot loops why industry will continue to deliver multi-level security.
Casey Schaufler
2001Which operating system access control technique will provide the greatest overall benefit to users?.
Stephen Smalley