SACMAT C

27 papers

YearTitle / Authors
200611th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings
David F. Ferraiolo, Indrakshi Ray
2006A model-checking approach to analysing organisational controls in a loan origination process.
Andreas Schaad, Volkmar Lotz, Karsten Sohr
2006A usage-based authorization framework for collaborative computing systems.
Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
2006Access control, confidentiality and privacy for video surveillance databases.
Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
2006Constraint generation for separation of duty.
Hong Chen, Ninghui Li
2006Data-centric security: role analysis and role typestates.
Vugranam C. Sreedhar
2006Delegation in the role graph model.
He Wang, Sylvia L. Osborn
2006Fine-grained role-based delegation in presence of the hybrid role hierarchy.
James B. D. Joshi, Elisa Bertino
2006Information flow property preserving transformation of UML interaction diagrams.
Fredrik Seehusen, Ketil Stølen
2006Integrating presence inference into trust management for ubiquitous systems.
Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki
2006Inter-instance authorization constraints for secure workflow management.
Janice Warner, Vijayalakshmi Atluri
2006Key management for non-tree access hierarchies.
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2006On classifying access control implementations for distributed systems.
Kevin Kane, James C. Browne
2006PRIMA: policy-reduced integrity measurement architecture.
Trent Jaeger, Reiner Sailer, Umesh Shankar
2006Redirection policies for mission-based information sharing.
David R. Keppler, Vipin Swarup, Sushil Jajodia
2006Role-based access management for ad-hoc collaborative sharing.
Jing Jin, Gail-Joon Ahn
2006Secure resource description framework: an access control model.
Amit Jain, Csilla Farkas
2006Security in enterprise resource planning systems and service-oriented architectures.
Andreas Schaad
2006Semantic access control for information interoperation.
Chi-Chun Pan, Prasenjit Mitra, Peng Liu
2006Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy.
Siqing Du, James B. D. Joshi
2006Systematic control and management of data integrity.
Ji-Won Byun, Yonglak Sohn, Elisa Bertino
2006The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Jason Crampton, Wing Leung, Konstantin Beznosov
2006Towards reasonability properties for access-control policy languages.
Michael Carl Tschantz, Shriram Krishnamurthi
2006Traust: a trust negotiation-based authorization service for open systems.
Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
2006Trust management with delegation in grouped peer-to-peer communities.
Ajay Ravichandran, Jongpil Yoon
2006TrustBAC: integrating trust relationships into the RBAC model for access control in open systems.
Sudip Chakraborty, Indrajit Ray
2006XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!
Pietro Mazzoleni, Elisa Bertino, Bruno Crispo