default search action
SACMAT 2006: Lake Tahoe, California, USA
- David F. Ferraiolo, Indrakshi Ray:
11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings. ACM 2006, ISBN 1-59593-353-0
Access control technology
- Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan:
Access control, confidentiality and privacy for video surveillance databases. 1-10 - Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Key management for non-tree access hierarchies. 11-18 - Trent Jaeger, Reiner Sailer, Umesh Shankar:
PRIMA: policy-reduced integrity measurement architecture. 19-28 - Kevin Kane, James C. Browne:
On classifying access control implementations for distributed systems. 29-38
Trust-based authorization
- Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch:
Traust: a trust negotiation-based authorization service for open systems. 39-48 - Sudip Chakraborty, Indrajit Ray:
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. 49-58 - Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki:
Integrating presence inference into trust management for ubiquitous systems. 59-68 - Andreas Schaad:
Security in enterprise resource planning systems and service-oriented architectures. 69-70
Delegation
- Ajay Ravichandran, Jongpil Yoon:
Trust management with delegation in grouped peer-to-peer communities. 71-80 - James B. D. Joshi, Elisa Bertino:
Fine-grained role-based delegation in presence of the hybrid role hierarchy. 81-90 - He Wang, Sylvia L. Osborn:
Delegation in the role graph model. 91-100
Access control model
- Ji-Won Byun, Yonglak Sohn, Elisa Bertino:
Systematic control and management of data integrity. 101-110 - Jason Crampton, Wing Leung, Konstantin Beznosov:
The secondary and approximate authorization model and its application to Bell-LaPadula policies. 111-120 - Amit Jain, Csilla Farkas:
Secure resource description framework: an access control model. 121-129 - Hong Chen, Ninghui Li:
Constraint generation for separation of duty. 130-138
Access control analysis
- Andreas Schaad, Volkmar Lotz, Karsten Sohr:
A model-checking approach to analysing organisational controls in a loan origination process. 139-149 - Fredrik Seehusen, Ketil Stølen:
Information flow property preserving transformation of UML interaction diagrams. 150-159 - Michael Carl Tschantz, Shriram Krishnamurthi:
Towards reasonability properties for access-control policy languages. 160-169 - Vugranam C. Sreedhar:
Data-centric security: role analysis and role typestates. 170-179
Secure collaboration
- Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu:
A usage-based authorization framework for collaborative computing systems. 180-189 - Janice Warner, Vijayalakshmi Atluri:
Inter-instance authorization constraints for secure workflow management. 190-199 - Jing Jin, Gail-Joon Ahn:
Role-based access management for ad-hoc collaborative sharing. 200-209
Information sharing
- David R. Keppler, Vipin Swarup, Sushil Jajodia:
Redirection policies for mission-based information sharing. 210-218 - Pietro Mazzoleni, Elisa Bertino, Bruno Crispo:
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! 219-227 - Siqing Du, James B. D. Joshi:
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. 228-236 - Chi-Chun Pan, Prasenjit Mitra, Peng Liu:
Semantic access control for information interoperation. 237-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.