SACMAT C

21 papers

YearTitle / Authors
200510th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings
Elena Ferrari, Gail-Joon Ahn
2005A fine-grained, controllable, user-to-user delegation method in RBAC.
Jacques Wainer, Akhil Kumar
2005A reference monitor for workflow systems with constrained task execution.
Jason Crampton
2005AC-XML documents: improving the performance of a web access control module.
Barbara Carminati, Elena Ferrari
2005Adaptive trust negotiation and access control.
Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
2005Composing and combining policies under the policy machine.
David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn
2005Context sensitive access control.
R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma
2005Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure.
Andreas Matheus
2005Future direction of access control models, architectures, and technologies.
Konstantin Beznosov
2005GEO-RBAC: a spatially aware RBAC.
Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca
2005Generalized XML security views.
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko
2005Integrity constraints in trust management.
Sandro Etalle, William H. Winsborough
2005Peer-to-peer access control architecture using trusted computing technology.
Ravi S. Sandhu, Xinwen Zhang
2005Provable bounds for portable and flexible privacy-preserving access.
Marina Blanton, Mikhail J. Atallah
2005Purpose based access control of complex data for privacy protection.
Ji-Won Byun, Elisa Bertino, Ninghui Li
2005Relevancy based access control of versioned XML documents.
Mizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse
2005Role mining with ORCA.
Jürgen Schlegelmilch, Ulrike Steffens
2005Rule support for role-based access control.
Axel Kern, Claudia Walhorn
2005SERAT: SEcure role mApping technique for decentralized secure interoperability.
Mohamed Shehab, Elisa Bertino, Arif Ghafoor
2005Supporting conditional delegation in secure workflow management systems.
Vijayalakshmi Atluri, Janice Warner
2005Verifiable composition of access control and application features.
Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander