The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2007 (conf/sacmat/2007)

  1. Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo
    An approach to evaluate policy similarity. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:1-10 [Conf]
  2. Sandro Etalle, William H. Winsborough
    A posteriori compliance control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:11-20 [Conf]
  3. Barbara Carminati, Elena Ferrari, Kian-Lee Tan
    Enforcing access control over data streams. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:21-30 [Conf]
  4. Alex Roichman, Ehud Gudes
    Fine-grained access control to web databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:31-40 [Conf]
  5. Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
    Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:41-50 [Conf]
  6. Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin
    A privacy preserving assertion based policy language for federation systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:51-60 [Conf]
  7. Bogdan Cautis
    Distributed access control: a privacy-conscious approach. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:61-70 [Conf]
  8. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang
    Towards a VMM-based usage control framework for OS kernel integrity protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:71-80 [Conf]
  9. Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan
    Managing the risk of covert information flows in virtual machine systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:81-90 [Conf]
  10. Boniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel
    A logical specification and analysis for SELinux MLS policy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:91-100 [Conf]
  11. Adam J. Lee, Kazuhiro Minami, Marianne Winslett
    Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:101-110 [Conf]
  12. Paul Z. Kolano
    Mesh: secure, lightweight grid middleware using existing SSH infrastructure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:111-120 [Conf]
  13. Glenn Faden
    Multilevel filesystems in solaris trusted extensions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:121-126 [Conf]
  14. Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens
    A formal approach for testing security rules. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:127-132 [Conf]
  15. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci
    New constructions for provably-secure time-bound hierarchical key assignment schemes. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:133-138 [Conf]
  16. Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer
    Role engineering using graph optimisation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:139-144 [Conf]
  17. Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan
    PEI models towards scalable, usable and high-assurance information sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:145-150 [Conf]
  18. He Wang, Sylvia L. Osborn
    Discretionary access control with the administrative role graph model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:151-156 [Conf]
  19. Liang Chen, Jason Crampton
    Inter-domain role mapping and least privilege. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:157-162 [Conf]
  20. Helge Janicke, Antonio Cau, Hussein Zedan
    A note on the formalisation of UCON. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:163-168 [Conf]
  21. Irini Fundulaki, Sebastian Maneth
    Formalizing XML access control for update operations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:169-174 [Conf]
  22. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo
    The role mining problem: finding a minimal descriptive set of roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:175-184 [Conf]
  23. Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher
    Specifications of a high-level conflict-free firewall policy language for multi-domain networks. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:185-194 [Conf]
  24. Steve Barker
    Action-status access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:195-204 [Conf]
  25. Michael LeMay, Omid Fatemieh, Carl A. Gunter
    PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:205-214 [Conf]
  26. Gail-Joon Ahn, Hongxin Hu
    Towards realizing a formal RBAC model in real systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:215-224 [Conf]
  27. Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo
    Chinese-wall process confinement for practical distributed coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:225-234 [Conf]
  28. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya
    Using semantics for automatic enforcement of access control policies among dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:235-244 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002