SACMAT C

20 papers

YearTitle / Authors
20027th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002
Ravi S. Sandhu, Elisa Bertino
2002A context-related authorization and access control method based on RBAC.
Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera
2002A cryptographic solution to implement access control in a hierarchy and more.
Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi
2002A lightweight approach to specification and analysis of role-based access control extensions.
Andreas Schaad, Jonathan D. Moffett
2002A model for role administration using organization structure.
Sejong Oh, Ravi S. Sandhu
2002A role-based delegation framework for healthcare information systems.
Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu
2002A scenario-driven role engineering process for functional RBAC roles.
Gustaf Neumann, Mark Strembeck
2002Administrative scope and role hierarchy operations.
Jason Crampton
2002An access control language for web services.
Emin Gün Sirer, Ke Wang
2002An authorization infrastructure for nomadic computing.
Kan Zhang, Tim Kindberg
2002Cool security trends.
Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner
2002Information flow analysis of an RBAC system.
Sylvia L. Osborn
2002Information sharing and security in dynamic coalitions.
Charles E. Phillips, T. C. Ting, Steven A. Demurjian
2002Making access control more usable.
Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu
2002Managing access control policies using access control spaces.
Trent Jaeger, Antony Edwards, Xiaolan Zhang
2002Models for coalition-based access control (CBAC).
Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands
2002Observations on the role life-cycle in the context of enterprise security management.
Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett
2002Temporal hierarchies and inheritance semantics for GTRBAC.
James Joshi, Elisa Bertino, Arif Ghafoor
2002The PERMIS X.509 role based privilege management infrastructure.
David W. Chadwick, Alexander Otenko
2002Towards usage control models: beyond traditional access control.
Jaehong Park, Ravi S. Sandhu