|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 679 occurrences of 286 keywords
|
|
|
Results
Found 596 publication records. Showing 596 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Axel Kern, Claudia Walhorn |
Rule support for role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 130-138, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
SAM Jupiter, automated identity management, directoriescase studies, enterprise role-based access control (ERBAC), provisioning engine, rulesaccess rights, security provisioning, role-based access control (RBAC), rule engine, security administration |
1 | Vijayalakshmi Atluri, Janice Warner |
Supporting conditional delegation in secure workflow management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 49-58, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
workflow, constraints, delegation |
1 | R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma |
Context sensitive access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 111-119, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
context verification, service usage patterns, authentication, access control, context sensitive |
1 | Ravi S. Sandhu, Xinwen Zhang |
Peer-to-peer access control architecture using trusted computing technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 147-158, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, trusted computing, security architecture, policy enforcement |
1 | Marina Blanton, Mikhail J. Atallah |
Provable bounds for portable and flexible privacy-preserving access. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 95-101, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
compact policy representation, minimal perfect hash functions, order-preserving minimal perfect hash functions, portable access rights, algorithm analysis |
1 | Barbara Carminati, Elena Ferrari |
AC-XML documents: improving the performance of a web access control module. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 67-76, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
XML, access control, web |
1 | Jürgen Schlegelmilch, Ulrike Steffens |
Role mining with ORCA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 168-176, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
role definition, data mining, role-based access control, cluster analysis, role engineering, role mining, role hierarchy |
1 | Jacques Wainer, Akhil Kumar 0001 |
A fine-grained, controllable, user-to-user delegation method in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 59-66, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation, revocation |
1 | Trent Jaeger, Elena Ferrari (eds.) |
9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![ACM, 1-58113-872-5 The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Jingzhu Wang, Sylvia L. Osborn |
A role-based approach to access control for XML databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 70-77, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
xml databases, role-based access control |
1 | Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 |
Resolving constraint conflicts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 105-114, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control models, constraint models, policy design |
1 | Irini Fundulaki, Maarten Marx |
Specifying access control policies for XML documents with XPath. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 61-69, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
xml access control, xpath, xml |
1 | Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert |
A meta model for authorisations in application security systems and their integration into RBAC administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 87-96, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
automated identity management, enterprise role-based access control (ERBAC), enterprise roles, sam jupiter, security provisioning, role-based access control (RBAC), application security, security administration |
1 | Horst F. Wedde, Mario Lischka |
Role-based access control in ambient and remote space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 21-30, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
petri-nets, spatial, work-flow |
1 | Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody |
Using trust and risk in role-based access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 156-162, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SECURE, access control, trust, risk, OASIS |
1 | Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu |
A logical specification for usage control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 1-10, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
logic specification, access control, security policy, usage control |
1 | Urs Hengartner, Peter Steenkiste |
Implementing access control to people location information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 11-20, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust, rsa, location, certificates, delegation, dsa, spki/sdsi |
1 | Giorgio Zanin, Luigi V. Mancini |
Towards a formal model for security policies specification and validation in the selinux system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 136-145, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
security enhanced linux, configuration, formal model |
1 | Joachim Biskup, Sandra Wortmann |
Towards a credential-based implementation of compound access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 31-40, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
certificate chain discovery, policy algebra, access control, public key infrastructure, credential, spki/sdsi |
1 | Roberto Tamassia, Danfeng Yao, William H. Winsborough |
Role-based cascaded delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 146-155, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, RBAC, trust management, delegation |
1 | Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito |
A composite rbac approach for large, complex organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 163-172, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role structures, role-based access control, role mappings |
1 | Ninghui Li, Mahesh V. Tripunitara |
Security analysis in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 126-135, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role-based administration, role-based access control, trust management, delegation |
1 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
Administrative scope in the graph-based framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 97-104, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
role-based access control, graph transformations, administration |
1 | Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu |
Security for grid-based computing systems issues and challenges. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 125, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
1 | Xuhui Ao, Naftaly H. Minsky |
On the role of roles: from role-based to role-sensitive access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 51-60, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control policy specification and decentralized enforcement, security, role-based access control, law-governed interaction |
1 | Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim |
Using uml to visualize role-based access control constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 115-124, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
modeling, UML, RBAC |
1 | Marina Bykova, Mikhail J. Atallah |
Succinct specifications of portable document access policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 41-50, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control enforcement, compact policy representation, portable access rights, computational complexity, access control, algorithm design |
1 | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor |
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 78-86, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
decentralized administration, XML, role based access control, temporal constraints |
1 | Anthony Harrington, Christian Damsgaard Jensen |
Cryptographic access control in a distributed file system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 158-165, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, cryptography, network file systems |
1 | David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
The role control center: features and case studies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 12-20, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
administrative roles, role graph, separation of duty, role hierarchy, authorization management |
1 | Gustaf Neumann, Mark Strembeck |
An approach to engineer and enforce context constraints in an RBAC environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 65-79, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Sylvia L. Osborn, Yan Han, Jun Liu |
A methodology for managing roles in legacy systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 33-40, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
relational databases, role-based access control |
1 | Xinwen Zhang, Sejong Oh, Ravi S. Sandhu |
PBDM: a flexible delegation model in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 149-157, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, delegation |
1 | Patrick D. McDaniel |
On context in authorization policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 80-89, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
policy-oriented programming, distributed systems, context, authorization, policy, security requirements |
1 | Mohammad A. Al-Kahtani, Ravi S. Sandhu |
Induced role hierarchies with attribute-based RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 142-148, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access control, RBAC, roles, attributes, roles hierarchies, authorization rules |
1 | Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng 0001 |
Dynamic and risk-aware network access management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 217-230, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
risk awareness, network management, role, risk, dynamic access control |
1 | Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
On modeling system-centric information for role engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 169-178, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
attributive permissions, role-based access control, information flow, information model, role engineering |
1 | Jim J. Longstaff, Mike A. Lockyer, John Nicholas |
The tees confidentiality model: an authorisation model for identities and roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 125-133, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Tanvir Ahmed 0002, Anand R. Tripathi |
Static verification of security requirements in role based CSCW systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 196-203, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
finite-state based model checking, methodology for access control policy design, role based access control, security policy specification |
1 | Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf |
Role mining - revealing business roles for security administration using data mining technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 179-186, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enterprise systems management, security data models, single point of administration and control, data mining, role-based access control, migration, identity management, security management, provisioning, role engineering, security administration |
1 | Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari |
An infrastructure for managing secure update operations on XML data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 110-122, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed updates, integrity check protocols, XML |
1 | David A. Basin, Jürgen Doser, Torsten Lodderstedt |
Model driven security for process-oriented systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 100-109, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
UML, RBAC, model driven architecture, metamodeling, security engineering |
1 | Adam Hess, Kent E. Seamons |
An access control model for dynamic client-side content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 207-216, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authentication, access control, credentials, trust negotiation |
1 | Joon S. Park, Junseok Hwang |
Role-based access control for collaborative enterprise in peer-to-peer computing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 93-99, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, role-based access control, peer-to-peer computing |
1 | Elena Ferrari, David F. Ferraiolo (eds.) |
8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![ACM, 1-58113-681-1 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
1 | Axel Kern, Andreas Schaad, Jonathan D. Moffett |
An administration concept for the enterprise role-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 3-11, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SAM Jupiter, administrative role-based access control (ARBAC), automated identity management, enterprise role-based access control (ERBAC), enterprise roles, security provisioning, role-based access control (RBAC), scopes, security administration |
1 | Horst F. Wedde, Mario Lischka |
Cooperative role-based administration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 21-32, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Petri-Nets, modularity, composability, work-flow |
1 | Prasad Naldurg, Roy H. Campbell |
Dynamic access control: preserving safety and trust for network defense operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 231-237, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
access lists, capability lists, trust, safety, comparison, dynamic access control |
1 | James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino |
Dependencies and separation of duty constraints in GTRBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 51-64, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
security, role based access control, temporal constraints, separation of duty, cardinality constraint |
1 | Joerg Abendroth, Christian Damsgaard Jensen |
Partial outsourcing: a new paradigm for access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 134-141, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ASCap framework, active software capabilities, partial outsourcing, access control |
1 | Salem Benferhat, Rania El Baida, Frédéric Cuppens |
A stratification-based approach for handling conflicts in access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 189-195, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
prioritized knowledge bases, access control, security policy, conflicts, possibilistic logic |
1 | Jason Crampton |
Specifying and enforcing constraints in role-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings, pp. 43-50, 2003, ACM, 1-58113-681-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
enforcement context, separation of duty constraint, role-based access control, authorization constraint |
1 | Sejong Oh, Ravi S. Sandhu |
A model for role administration using organization structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 155-162, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role administration, access control, RBAC |
1 | Kan Zhang, Tim Kindberg |
An authorization infrastructure for nomadic computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 107-113, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
mobile computing, ubiquitous computing, access control, authorization, nomadic computing |
1 | Trent Jaeger, Antony Edwards, Xiaolan Zhang 0001 |
Managing access control policies using access control spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 3-12, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
A context-related authorization and access control method based on RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 117-124, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure health care system, trust infrastructure, role based access control (RBAC) |
1 | Charles E. Phillips, T. C. Ting, Steven A. Demurjian |
Information sharing and security in dynamic coalitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 87-96, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
dynamic coalitions, distributed systems, access control, information security |
1 | Sylvia L. Osborn |
Information flow analysis of an RBAC system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 163-168, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role graphs, role-based access control, mandatory access control |
1 | Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett |
Observations on the role life-cycle in the context of enterprise security management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 43-51, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
enterprise security management (ESM), enterprise user administration (EUA), role life-cycle, role management, security administration manager (SAM), process model, role engineering, distributed system management, security administration |
1 | Emin Gün Sirer, Ke Wang |
An access control language for web services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 23-30, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
web services, access control |
1 | Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner 0001 |
Cool security trends. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 53, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jaehong Park, Ravi S. Sandhu |
Towards usage control models: beyond traditional access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 57-64, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | David W. Chadwick, Alexander Otenko |
The PERMIS X.509 role based privilege management infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 135-140, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates |
1 | Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi |
A cryptographic solution to implement access control in a hierarchy and more. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 65-73, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, cryptography, hierarchy |
1 | Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu |
Making access control more usable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 141, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Jason Crampton |
Administrative scope and role hierarchy operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 145-154, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
administrative scope, encapsulated range, role hierarchy operation, role-based access control |
1 | James Joshi, Elisa Bertino, Arif Ghafoor |
Temporal hierarchies and inheritance semantics for GTRBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 74-83, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
security, role based access control, temporal constraints, role hierarchy |
1 | Ravi S. Sandhu, Elisa Bertino (eds.) |
7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![ACM, 1-58113-496-7 The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
1 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A role-based delegation framework for healthcare information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 125-134, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, role, delegation, revocation, healthcare information system |
1 | Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands |
Models for coalition-based access control (CBAC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 97-106, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
access control, authorizations, security policy, roles, tasks, domain models, teams, coalitions |
1 | Andreas Schaad, Jonathan D. Moffett |
A lightweight approach to specification and analysis of role-based access control extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 13-22, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
ARBAC97, alloy, separation of duties |
1 | Gustaf Neumann, Mark Strembeck |
A scenario-driven role engineering process for functional RBAC roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 33-42, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
role-based access control, scenarios, role engineering |
1 | Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata |
Security verification of programs with stack inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 31-40, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Java, Java, access control, stack inspection, security verification |
1 | Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu |
A rule-based framework for role based delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 153-162, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
access control, role, delegation, rule-based |
1 | Elisa Bertino, Silvana Castano, Elena Ferrari |
On specifying security policies for web documents with an XML-based language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 57-65, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
subject credentials, XML, XML, access control, security policies |
1 | Horst F. Wedde, Mario Lischka |
Modular authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 97-105, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
modularity, authorization, role-based access control, conflicts, composability, violations |
1 | Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr |
Panel: The next generation of acess control models (panel session): do we need them and what should they be? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 53, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson |
Panel: which access control technique will provide the greatest overall benefit-Abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 141, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jonathon Tidswell, John Potter |
A graphical definition of authorization schema in the DTAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 109-120, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
DTAC, access control, constraints, graphs, dynamic, computer security, type, roles, schema |
1 | Ravi S. Sandhu, Trent Jaeger (eds.) |
6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![ACM, 1-58113-350-2 The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth |
Improving the granularity of access control in Windows NT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 87-96, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Microsoft Windows NT, access control lists, Windows 2000 |
1 | Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob |
The role-based access control system of a European bank: a case study and discussion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 3-9, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
control principles, dual control, number of roles, role administration, role-based access control, inheritance, separation of duties, least privilege |
1 | Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca |
A logical framework for reasoning about access control models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 41-52, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas |
Flexible team-based access control using contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 21-27, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
active security, access control, contexts, teams |
1 | Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd |
Securing context-aware applications using environment roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 10-20, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
role-based access control, context aware computing |
1 | Ty van den Akker, Quinn Snell, Mark J. Clement |
The YGuard access control model: set-based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 75-84, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
XSet, XWeb, YGuard, XML, XML, WEB, set, access control model, access control list |
1 | Najam Perwaiz |
Structured management of role-permission relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 163-169, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Mikel L. Matthews |
Position paper. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 144, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Robert Watson |
Statement for SACMAT 2001 panel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 149, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Trent Jaeger |
Managing access control complexity using metrices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 131-139, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Myong H. Kang, Joon S. Park, Judith N. Froscher |
Access control mechanisms for inter-organizational workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 66-74, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
organizational security, security, access control, workflow, enterprise |
1 | David F. Ferraiolo |
An argument for the role-based access control model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 142-143, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Walt Yao, Ken Moody, Jean Bacon |
A model of OASIS role-based access control and its support for active security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 171-181, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
RBAC, role based access control, policy, service level agreements, certificates, OASIS |
1 | Casey Schaufler |
They want froot loops why industry will continue to deliver multi-level security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 145-146, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Stephen Smalley |
Which operating system access control technique will provide the greatest overall benefit to users?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 147-148, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
On the specification and evolution of access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001, pp. 121-130, 2001, ACM, 1-58113-350-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
specification, methodology, graph transformation systems |
Displaying result #501 - #596 of 596 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6] |
|