SACMAT C

29 papers

YearTitle / Authors
201217th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012
Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu
2012A calculus for privacy-friendly authentication.
Patrik Bichsel, Jan Camenisch, Dieter Sommer
2012A cloud-based RDF policy engine for assured information sharing.
Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham
2012A framework for verification and optimal reconfiguration of event-driven role based access control policies.
Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino
2012A framework integrating attribute-based policies into role-based access control.
Jingwei Huang, David M. Nicol, Rakesh Bobba, Jun Ho Huh
2012A model-based approach to automated testing of access control policies.
Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon
2012A trust-and-risk aware RBAC framework: tackling insider threat.
Nathalie Baracaldo, James Joshi
2012Access control for RDF graphs using abstract models.
Vassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris, Grigoris Antoniou
2012Algorithms for mining meaningful roles.
Zhongyuan Xu, Scott D. Stoller
2012Analyzing temporal role based access control models.
Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Parthasarathy Madhusudan
2012Android permissions: a perspective combining risks and benefits.
Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy
2012Automating architectural security analysis.
Andreas Schaad, Alexandr Garaga
2012Efficient privacy preserving content based publish subscribe systems.
Mohamed Nabeel, Ning Shang, Elisa Bertino
2012Emerging trends around big data analytics and security: panel.
Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino
2012Encryption-enforced access control for an RFID discovery service.
Florian Kerschbaum, Leonardo Weiss Ferreira Chaves
2012Ensuring authorization privileges for cascading user obligations.
Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu
2012Fine-grained access control of personal data.
Ting Wang, Mudhakar Srivatsa, Ling Liu
2012Generative models for access control policies: applications to role mining over logs with attribution.
Ian M. Molloy, Youngja Park, Suresh Chari
2012Graph-based XACML evaluation.
Santiago Pina Ros, Mario Lischka, Félix Gómez Mármol
2012Hardware-enhanced access control for cloud computing.
Ruby B. Lee
2012MOSES: supporting operation modes on smartphones.
Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes
2012Optimal workflow-aware authorizations.
David A. Basin, Samuel J. Burri, Günter Karjoth
2012PlexC: a policy language for exposure control.
Yann Le Gall, Adam J. Lee, Apu Kapadia
2012Policy-by-example for online social networks.
Gorrell P. Cheek, Mohamed Shehab
2012Practical risk aggregation in RBAC models.
Suresh Chari, Jorge Lobo, Ian M. Molloy
2012SCUTA: a server-side access control system for web applications.
Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj
2012SecureBPMN: modeling and enforcing access control requirements in business processes.
Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, Raj Ruparel
2012The authorization leap from rights to attributes: maturation or chaos?
Ravi S. Sandhu
2012Towards a policy enforcement infrastructure for distributed usage control.
Florian Kelbert, Alexander Pretschner