SACMAT C

20 papers

YearTitle / Authors
20049th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings
Trent Jaeger, Elena Ferrari
2004A composite rbac approach for large, complex organizations.
Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito
2004A logical specification for usage control.
Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
2004A meta model for authorisations in application security systems and their integration into RBAC administration.
Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert
2004A role-based approach to access control for XML databases.
Jingzhu Wang, Sylvia L. Osborn
2004Administrative scope in the graph-based framework.
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
2004Implementing access control to people location information.
Urs Hengartner, Peter Steenkiste
2004On the role of roles: from role-based to role-sensitive access control.
Xuhui Ao, Naftaly H. Minsky
2004Resolving constraint conflicts.
Trent Jaeger, Reiner Sailer, Xiaolan Zhang
2004Role-based access control in ambient and remote space.
Horst F. Wedde, Mario Lischka
2004Role-based cascaded delegation.
Roberto Tamassia, Danfeng Yao, William H. Winsborough
2004Security analysis in role-based access control.
Ninghui Li, Mahesh V. Tripunitara
2004Security for grid-based computing systems issues and challenges.
Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
2004Specifying access control policies for XML documents with XPath.
Irini Fundulaki, Maarten Marx
2004Succinct specifications of portable document access policies.
Marina Bykova, Mikhail J. Atallah
2004Towards a credential-based implementation of compound access control policies.
Joachim Biskup, Sandra Wortmann
2004Towards a formal model for security policies specification and validation in the selinux system.
Giorgio Zanin, Luigi V. Mancini
2004Using trust and risk in role-based access control policies.
Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
2004Using uml to visualize role-based access control constraints.
Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim
2004X-GTRBAC admin: a decentralized administration model for enterprise wide access control.
Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor