SACMAT C

24 papers

YearTitle / Authors
20038th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings
Elena Ferrari, David F. Ferraiolo
2003A methodology for managing roles in legacy systems.
Sylvia L. Osborn, Yan Han, Jun Liu
2003A stratification-based approach for handling conflicts in access control.
Salem Benferhat, Rania El Baida, Frédéric Cuppens
2003An access control model for dynamic client-side content.
Adam Hess, Kent E. Seamons
2003An administration concept for the enterprise role-based access control model.
Axel Kern, Andreas Schaad, Jonathan D. Moffett
2003An approach to engineer and enforce context constraints in an RBAC environment.
Gustaf Neumann, Mark Strembeck
2003An infrastructure for managing secure update operations on XML data.
Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari
2003Cooperative role-based administration.
Horst F. Wedde, Mario Lischka
2003Cryptographic access control in a distributed file system.
Anthony Harrington, Christian Damsgaard Jensen
2003Dependencies and separation of duty constraints in GTRBAC.
James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino
2003Dynamic access control: preserving safety and trust for network defense operations.
Prasad Naldurg, Roy H. Campbell
2003Dynamic and risk-aware network access management.
Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
2003Induced role hierarchies with attribute-based RBAC.
Mohammad A. Al-Kahtani, Ravi S. Sandhu
2003Model driven security for process-oriented systems.
David A. Basin, Jürgen Doser, Torsten Lodderstedt
2003On context in authorization policy.
Patrick D. McDaniel
2003On modeling system-centric information for role engineering.
Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
2003PBDM: a flexible delegation model in RBAC.
Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
2003Partial outsourcing: a new paradigm for access control.
Joerg Abendroth, Christian Damsgaard Jensen
2003Role mining - revealing business roles for security administration using data mining technology.
Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
2003Role-based access control for collaborative enterprise in peer-to-peer computing environments.
Joon S. Park, Junseok Hwang
2003Specifying and enforcing constraints in role-based access control.
Jason Crampton
2003Static verification of security requirements in role based CSCW systems.
Tanvir Ahmed, Anand R. Tripathi
2003The role control center: features and case studies.
David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila
2003The tees confidentiality model: an authorisation model for identities and roles.
Jim J. Longstaff, Mike A. Lockyer, John Nicholas