SACMAT C

31 papers

YearTitle / Authors
201318th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013
Mauro Conti, Jaideep Vaidya, Andreas Schaad
2013A bigData platform for analytics on access control policies and logs.
Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken
2013A storage-efficient cryptography-based access control solution for subversion.
Dominik Leibenger, Christoph Sorge
2013A versatile access control implementation: secure box.
Bruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura
2013A white-box policy analysis and its efficient implementation.
Jayalakshmi Balasubramaniam, Philip W. L. Fong
2013An information flow control meta-model.
Dennis G. Kafura, Denis Gracanin
2013Beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
Nathalie Baracaldo, James Joshi
2013Combining social authentication and untrusted clouds for private location sharing.
Andrew K. Adams, Adam J. Lee
2013Constraint expressions and workflow satisfiability.
Jason Crampton, Gregory Z. Gutin
2013Content-based information protection and release in NATO operations.
Alessandro Armando, Matteo Grasso, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona
2013ERBAC: event-driven RBAC.
Piero A. Bonatti, Clemente Galdi, Davide Torres
2013Enabling intensional access control via preference-aware query optimization.
Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu
2013Ensuring continuous compliance through reconciling policy with usage.
Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken
2013Evolving role definitions through permission invocation patterns.
Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin
2013Heuristic safety analysis of access control models.
Peter Amthor, Winfried E. Kühnhauser, Anja Pölck
2013HyXAC: a hybrid approach for XML access control.
Manogna Thimma, Tsam Kai Tsui, Bo Luo
2013Information flow control for stream processing in clouds.
Xing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble
2013Least-restrictive enforcement of the Chinese wall security policy.
Alireza Sharifi, Mahesh V. Tripunitara
2013Mobile security and privacy: the quest for the mighty access control.
Ahmad-Reza Sadeghi
2013On the notion of redundancy in access control policies.
Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, Simone Mutti
2013Panel on granularity in access control.
Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri
2013Permission path analysis based on access intelligence.
Detlef Sturm, Axel Kern
2013Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule.
Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, William H. Winsborough
2013Private data warehouse queries.
Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu
2013Property-testing real-world authorization systems.
Alireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara
2013RMiner: a tool set for role mining.
Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu
2013Searching over encrypted data in cloud systems.
Florian Kerschbaum
2013Secure benchmarking in the cloud.
Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss
2013Specification and analysis of access control policies for mobile applications.
Ramadan Abdunabi, Indrakshi Ray, Robert B. France
2013Sticky policies for mobile devices.
Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi
2013User-centric management of distributed credential repositories: balancing availability and vulnerability.
Jens Köhler, Jens Mittag, Hannes Hartenstein