SACMAT C

23 papers

YearTitle / Authors
200813th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings
Indrakshi Ray, Ninghui Li
2008A general obligation model and continuity: enhanced policy enforcement engine for usage control.
Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert
2008A meta model for access control: why is it needed and is it even possible to achieve?
David F. Ferraiolo, Vijay Atluri
2008Access control by action control.
Steve Barker
2008An obligation model bridging access control policies and privacy policies.
Qun Ni, Elisa Bertino, Jorge Lobo
2008Authorization recycling in RBAC systems.
Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu
2008Context-aware role-based access control in pervasive computing systems.
Devdatta Kulkarni, Anand Tripathi
2008Delegation and satisfiability in workflow systems.
Jason Crampton, Hemanth Khambhammettu
2008Detecting and resolving policy misconfigurations in access-control systems.
Lujo Bauer, Scott Garriss, Michael K. Reiter
2008Enabling verification and conformance testing for access control model.
Hongxin Hu, Gail-Joon Ahn
2008Enforcing security properties in task-based systems.
Keith Irwin, Ting Yu, William H. Winsborough
2008Fast exact and heuristic methods for role minimization problems.
Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan
2008Measuring integrity on mobile phone systems.
Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger
2008Migrating to optimal RBAC with minimal perturbation.
Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam
2008Mining roles with semantic meanings.
Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo
2008Model-based behavioral attestation.
Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert
2008Panel on role engineering.
Vijay Atluri
2008Policy decomposition for collaborative access control.
Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo
2008R
Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham
2008RBAC administration in distributed systems.
M. A. C. Dekker, Jason Crampton, Sandro Etalle
2008Task-based entailment constraints for basic workflow patterns.
Christian Wolter, Andreas Schaad, Christoph Meinel
2008UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints.
Yue Zhang, James B. D. Joshi
2008Visualization based policy analysis: case study in SELinux.
Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn