SACMAT C

28 papers

YearTitle / Authors
200914th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings
Barbara Carminati, James Joshi
2009A decision support system for secure information sharing.
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg
2009A formal framework to elicit roles with business meaning in RBAC systems.
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde
2009A semantic web based framework for social network access control.
Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham
2009Access control policy combining: theory meets practice.
Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin
2009An algebra for fine-grained integration of XACML policies.
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo
2009An efficient framework for user authorization queries in RBAC systems.
Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li
2009Analysis of virtual machine system policies.
Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger
2009Automating role-based provisioning by learning from examples.
Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino
2009Challenges and opportunities for virtualized security in the clouds.
Frank Siebenlist
2009Dynamic mandatory access control for multiple stakeholders.
Vikhyath Rao, Trent Jaeger
2009Efficient access enforcement in distributed role-based access control (RBAC) deployments.
Mahesh V. Tripunitara, Bogdan Carbunar
2009Ensuring spatio-temporal access control for real-world applications.
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar
2009Evaluating role mining algorithms.
Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo
2009Extending access control models with break-glass.
Achim D. Brucker, Helmut Petritsch
2009Foundations for group-centric secure information sharing models.
Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough
2009Patient-centric authorization framework for sharing electronic health records.
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang
2009Safety in discretionary access control for logic-based publish-subscribe systems.
Kazuhiro Minami, Nikita Borisov, Carl A. Gunter
2009Spatio-temporal access control: challenges and applications.
Maria Luisa Damiani, Hervé Martin, Yücel Saygin, Maria Rita Spada, Cédric Ulmer
2009Supporting RBAC with XACML+OWL.
Rodolfo Ferrini, Elisa Bertino
2009Symbolic reachability analysis for parameterized administrative role based access control.
Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan
2009The next 700 access control models or a unifying meta-model?
Steve Barker
2009Towards a dynamic and composable model of trust.
Adam J. Lee, Ting Yu
2009Towards formal security analysis of GTRBAC using timed automata.
Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri
2009Trojan horse resistant discretionary access control.
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
2009Usability meets access control: challenges and research opportunities.
Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko
2009Working set-based access control for network file systems.
Stephen Smaldone, Vinod Ganapathy, Liviu Iftode
2009xDomain: cross-border proofs of access.
Lujo Bauer, Limin Jia, Michael K. Reiter, David Swasey