The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2010 (conf/sacmat/2010)


  1. New access models for healthcare. [Citation Graph (, )][DBLP]


  2. A model of triangulating environments for policy authoring. [Citation Graph (, )][DBLP]


  3. Towards analyzing complex operating system access control configurations. [Citation Graph (, )][DBLP]


  4. Monitoring security policies with metric first-order temporal logic. [Citation Graph (, )][DBLP]


  5. On the definition of role mining. [Citation Graph (, )][DBLP]


  6. Mining roles with noisy data. [Citation Graph (, )][DBLP]


  7. StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. [Citation Graph (, )][DBLP]


  8. Role mining based on weights. [Citation Graph (, )][DBLP]


  9. Access control in practice: pain points. [Citation Graph (, )][DBLP]


  10. Automated management of network access control from design to enforcement. [Citation Graph (, )][DBLP]


  11. Role-based access control (RBAC) in Java via proxy objects using annotations. [Citation Graph (, )][DBLP]


  12. Role updating for assignments. [Citation Graph (, )][DBLP]


  13. Enforcing spatial constraints for mobile RBAC systems. [Citation Graph (, )][DBLP]


  14. Capability-based delegation model in RBAC. [Citation Graph (, )][DBLP]


  15. A card requirements language enabling privacy-preserving access control. [Citation Graph (, )][DBLP]


  16. Modular context-aware access control for medical sensor networks. [Citation Graph (, )][DBLP]


  17. Privacy-preserving trust verification. [Citation Graph (, )][DBLP]


  18. Personalizing access control by generalizing access control. [Citation Graph (, )][DBLP]


  19. Solving the access-control puzzle: finding the pieces and putting them together. [Citation Graph (, )][DBLP]


  20. Architectures for practical security. [Citation Graph (, )][DBLP]


  21. An architecture for enforcing end-to-end access control over web applications. [Citation Graph (, )][DBLP]


  22. Access control policy translation and verification within heterogeneous data federations. [Citation Graph (, )][DBLP]


  23. Data protection models for service provisioning in the cloud. [Citation Graph (, )][DBLP]


  24. An access control model for mobile physical objects. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002