|
Conferences in DBLP
- Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo
An approach to evaluate policy similarity. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:1-10 [Conf]
- Sandro Etalle, William H. Winsborough
A posteriori compliance control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:11-20 [Conf]
- Barbara Carminati, Elena Ferrari, Kian-Lee Tan
Enforcing access control over data streams. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:21-30 [Conf]
- Alex Roichman, Ehud Gudes
Fine-grained access control to web databases. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:31-40 [Conf]
- Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:41-50 [Conf]
- Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin
A privacy preserving assertion based policy language for federation systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:51-60 [Conf]
- Bogdan Cautis
Distributed access control: a privacy-conscious approach. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:61-70 [Conf]
- Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:71-80 [Conf]
- Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan
Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:81-90 [Conf]
- Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel
A logical specification and analysis for SELinux MLS policy. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:91-100 [Conf]
- Adam J. Lee, Kazuhiro Minami, Marianne Winslett
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:101-110 [Conf]
- Paul Z. Kolano
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:111-120 [Conf]
- Glenn Faden
Multilevel filesystems in solaris trusted extensions. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:121-126 [Conf]
- Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens
A formal approach for testing security rules. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:127-132 [Conf]
- Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
New constructions for provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:133-138 [Conf]
- Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
Role engineering using graph optimisation. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:139-144 [Conf]
- Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan
PEI models towards scalable, usable and high-assurance information sharing. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:145-150 [Conf]
- He Wang, Sylvia L. Osborn
Discretionary access control with the administrative role graph model. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:151-156 [Conf]
- Liang Chen, Jason Crampton
Inter-domain role mapping and least privilege. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:157-162 [Conf]
- Helge Janicke, Antonio Cau, Hussein Zedan
A note on the formalisation of UCON. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:163-168 [Conf]
- Irini Fundulaki, Sebastian Maneth
Formalizing XML access control for update operations. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:169-174 [Conf]
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:175-184 [Conf]
- Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:185-194 [Conf]
- Steve Barker
Action-status access control. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:195-204 [Conf]
- Michael LeMay, Omid Fatemieh, Carl A. Gunter
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:205-214 [Conf]
- Gail-Joon Ahn, Hongxin Hu
Towards realizing a formal RBAC model in real systems. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:215-224 [Conf]
- Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
Chinese-wall process confinement for practical distributed coalitions. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:225-234 [Conf]
- Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP] SACMAT, 2007, pp:235-244 [Conf]
|