SACMAT C

25 papers

YearTitle / Authors
201015th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings
James B. D. Joshi, Barbara Carminati
2010A card requirements language enabling privacy-preserving access control.
Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer
2010A model of triangulating environments for policy authoring.
Kathi Fisler, Shriram Krishnamurthi
2010Access control in practice: pain points.
Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram
2010Access control policy translation and verification within heterogeneous data federations.
Gregory Leighton, Denilson Barbosa
2010An access control model for mobile physical objects.
Florian Kerschbaum
2010An architecture for enforcing end-to-end access control over web applications.
Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger
2010Architectures for practical security.
Virgil D. Gligor
2010Automated management of network access control from design to enforcement.
Ehab Al-Shaer
2010Capability-based delegation model in RBAC.
Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita
2010Data protection models for service provisioning in the cloud.
Dan Lin, Anna Cinzia Squicciarini
2010Enforcing spatial constraints for mobile RBAC systems.
Michael S. Kirkpatrick, Elisa Bertino
2010Mining roles with noisy data.
Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens
2010Modular context-aware access control for medical sensor networks.
Oscar García Morchon, Klaus Wehrle
2010Monitoring security policies with metric first-order temporal logic.
David A. Basin, Felix Klaedtke, Samuel Müller
2010New access models for healthcare.
Tyrone Grandison
2010On the definition of role mining.
Mario Frank, Joachim M. Buhmann, David A. Basin
2010Personalizing access control by generalizing access control.
Steve Barker
2010Privacy-preserving trust verification.
Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam
2010Role mining based on weights.
Xiaopu Ma, Ruixuan Li, Zhengding Lu
2010Role updating for assignments.
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
2010Role-based access control (RBAC) in Java via proxy objects using annotations.
Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam
2010Solving the access-control puzzle: finding the pieces and putting them together.
Lujo Bauer, Adam J. Lee
2010StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy.
Hassan Takabi, James B. D. Joshi
2010Towards analyzing complex operating system access control configurations.
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao