


default search action
SACMAT 2005: Stockholm, Sweden
- Elena Ferrari, Gail-Joon Ahn:

10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings. ACM 2005, ISBN 1-59593-045-0
Access control policy management
- Sandro Etalle, William H. Winsborough:

Integrity constraints in trust management. 1-10 - David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu

, D. Richard Kuhn:
Composing and combining policies under the policy machine. 11-20 - Andreas Matheus:

Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. 21-28
Access control model I
- Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca

:
GEO-RBAC: a spatially aware RBAC. 29-37 - Jason Crampton:

A reference monitor for workflow systems with constrained task execution. 38-47
Panel: Next generation access control models
- Konstantin Beznosov:

Future direction of access control models, architectures, and technologies. 48
Access control model II
- Vijayalakshmi Atluri

, Janice Warner:
Supporting conditional delegation in secure workflow management systems. 49-58 - Jacques Wainer

, Akhil Kumar:
A fine-grained, controllable, user-to-user delegation method in RBAC. 59-66
Access control for XML document
- Barbara Carminati

, Elena Ferrari
:
AC-XML documents: improving the performance of a web access control module. 67-76 - Gabriel M. Kuper, Fabio Massacci

, Nataliya Rassadko:
Generalized XML security views. 77-84 - Mizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya

, Vilas Wuwongse:
Relevancy based access control of versioned XML documents. 85-94
Privacy control
- Marina Blanton

, Mikhail J. Atallah:
Provable bounds for portable and flexible privacy-preserving access. 95-101 - Ji-Won Byun, Elisa Bertino, Ninghui Li:

Purpose based access control of complex data for privacy protection. 102-110
Applications
- R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma:

Context sensitive access control. 111-119 - Eunjee Song

, Raghu Reddy
, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander:
Verifiable composition of access control and application features. 120-129 - Axel Kern, Claudia Walhorn:

Rule support for role-based access control. 130-138
Access management for distributed systems
- Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons

:
Adaptive trust negotiation and access control. 139-146 - Ravi S. Sandhu, Xinwen Zhang:

Peer-to-peer access control architecture using trusted computing technology. 147-158
Role management
- Mohamed Shehab

, Elisa Bertino, Arif Ghafoor:
SERAT: SEcure role mApping technique for decentralized secure interoperability. 159-167 - Jürgen Schlegelmilch, Ulrike Steffens:

Role mining with ORCA. 168-176

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














