SACMAT C

24 papers

YearTitle / Authors
201116th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings
Ruth Breu, Jason Crampton, Jorge Lobo
2011A decade of model-driven security.
David A. Basin, Manuel Clavel, Marina Egea
2011Access control for a federated police information system.
Matthew Hudnall, Maury Mitchell, Allen S. Parrish
2011An approach to modular and testable security models of real-world health-care applications.
Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff
2011An authorization scheme for version control systems.
Sitaram Chamarty, Hiren D. Patel, Mahesh V. Tripunitara
2011An integrated approach for identity and access management in a SOA context.
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, Uwe Zdun, Schahram Dustdar
2011Anomaly discovery and resolution in web access control policies.
Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni
2011Data leakage mitigation for discretionary access control in collaboration clouds.
Qihua Wang, Hongxia Jin
2011Data-centric multi-layer usage control enforcement: a social network example.
Enrico Lovat, Alexander Pretschner
2011Deriving role engineering artifacts from business processes and scenario models.
Anne Baumgrass, Mark Strembeck, Stefanie Rinderle-Ma
2011Modeling data flow in socio-information networks: a risk estimation approach.
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
2011On the management of user obligations.
Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin
2011Program synthesis in administration of higher-order permissions.
Glenn Bruns, Michael Huth, Kumar Avijit
2011Relationship-based access control policies and their policy languages.
Philip W. L. Fong, Ida Sri Rejeki Siahaan
2011Rumpole: a flexible break-glass access control model.
Srdjan Marinovic, Robert Craven, Jiefei Ma, Naranker Dulay
2011SEAL: a logic programming framework for specifying and verifying access control models.
Prasad Naldurg, K. R. Raghavendra
2011Security validation tool for business processes.
Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta
2011System for automatic estimation of data sensitivity with applications to access control and other applications.
Youngja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari
2011Transforming provenance using redaction.
Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham
2011Usable access control for all.
Robert W. Reeder
2011Validation of security policies by the animation of Z specifications.
Yves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh
2011Visualizing security in business processes.
Ganna Monakova, Andreas Schaad
2011xDAuth: a scalable and lightweight framework for cross domain access control and delegation.
Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali
2011xfACL: an extensible functional language for access control.
Qun Ni, Elisa Bertino