SACMAT C

29 papers

YearTitle / Authors
200712th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings
Volkmar Lotz, Bhavani Thuraisingham
2007A formal approach for testing security rules.
Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens
2007A logical specification and analysis for SELinux MLS policy.
Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel
2007A note on the formalisation of UCON.
Helge Janicke, Antonio Cau, Hussein Zedan
2007A posteriori compliance control.
Sandro Etalle, William H. Winsborough
2007A privacy preserving assertion based policy language for federation systems.
Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin
2007Action-status access control.
Steve Barker
2007An approach to evaluate policy similarity.
Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo
2007Chinese-wall process confinement for practical distributed coalitions.
Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
2007Discretionary access control with the administrative role graph model.
He Wang, Sylvia L. Osborn
2007Distributed access control: a privacy-conscious approach.
Bogdan Cautis
2007Enforcing access control over data streams.
Barbara Carminati, Elena Ferrari, Kian-Lee Tan
2007Fine-grained access control to web databases.
Alex Roichman, Ehud Gudes
2007Formalizing XML access control for update operations.
Irini Fundulaki, Sebastian Maneth
2007Inter-domain role mapping and least privilege.
Liang Chen, Jason Crampton
2007Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Adam J. Lee, Kazuhiro Minami, Marianne Winslett
2007Managing the risk of covert information flows in virtual machine systems.
Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan
2007Mesh: secure, lightweight grid middleware using existing SSH infrastructure.
Paul Z. Kolano
2007Multilevel filesystems in solaris trusted extensions.
Glenn Faden
2007New constructions for provably-secure time-bound hierarchical key assignment schemes.
Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
2007PEI models towards scalable, usable and high-assurance information sharing.
Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan
2007PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.
Michael LeMay, Omid Fatemieh, Carl A. Gunter
2007Privacy-aware role based access control.
Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
2007Role engineering using graph optimisation.
Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
2007Specifications of a high-level conflict-free firewall policy language for multi-domain networks.
Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
2007The role mining problem: finding a minimal descriptive set of roles.
Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
2007Towards a VMM-based usage control framework for OS kernel integrity protection.
Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
2007Towards realizing a formal RBAC model in real systems.
Gail-Joon Ahn, Hongxin Hu
2007Using semantics for automatic enforcement of access control policies among dynamic coalitions.
Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya