The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2003 (conf/sacmat/2003)

  1. Axel Kern, Andreas Schaad, Jonathan D. Moffett
    An administration concept for the enterprise role-based access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:3-11 [Conf]
  2. David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila
    The role control center: features and case studies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:12-20 [Conf]
  3. Horst Wedde, Mario Lischka
    Cooperative role-based administration. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:21-32 [Conf]
  4. Sylvia L. Osborn, Yan Han, Jun Liu
    A methodology for managing roles in legacy systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:33-40 [Conf]
  5. Jason Crampton
    Specifying and enforcing constraints in role-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:43-50 [Conf]
  6. James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino
    Dependencies and separation of duty constraints in GTRBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:51-64 [Conf]
  7. Gustaf Neumann, Mark Strembeck
    An approach to engineer and enforce context constraints in an RBAC environment. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:65-79 [Conf]
  8. Patrick Drew McDaniel
    On context in authorization policy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:80-89 [Conf]
  9. Joon S. Park, Junseok Hwang
    Role-based access control for collaborative enterprise in peer-to-peer computing environments. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:93-99 [Conf]
  10. David A. Basin, Jürgen Doser, Torsten Lodderstedt
    Model driven security for process-oriented systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:100-109 [Conf]
  11. Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari
    An infrastructure for managing secure update operations on XML data. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:110-122 [Conf]
  12. Jim J. Longstaff, Mike A. Lockyer, John Nicholas
    The tees confidentiality model: an authorisation model for identities and roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:125-133 [Conf]
  13. Joerg Abendroth, Christian Damsgaard Jensen
    Partial outsourcing: a new paradigm for access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:134-141 [Conf]
  14. Mohammad A. Al-Kahtani, Ravi S. Sandhu
    Induced role hierarchies with attribute-based RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:142-148 [Conf]
  15. Xinwen Zhang, Sejong Oh, Ravi S. Sandhu
    PBDM: a flexible delegation model in RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:149-157 [Conf]
  16. Anthony Harrington, Christian Damsgaard Jensen
    Cryptographic access control in a distributed file system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:158-165 [Conf]
  17. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin
    On modeling system-centric information for role engineering. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:169-178 [Conf]
  18. Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf
    Role mining - revealing business roles for security administration using data mining technology. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:179-186 [Conf]
  19. Salem Benferhat, Rania El Baida, Frédéric Cuppens
    A stratification-based approach for handling conflicts in access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:189-195 [Conf]
  20. Tanvir Ahmed, Anand R. Tripathi
    Static verification of security requirements in role based CSCW systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:196-203 [Conf]
  21. Adam Hess, Kent E. Seamons
    An access control model for dynamic client-side content. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:207-216 [Conf]
  22. Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng
    Dynamic and risk-aware network access management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:217-230 [Conf]
  23. Prasad Naldurg, Roy H. Campbell
    Dynamic access control: preserving safety and trust for network defense operations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2003, pp:231-237 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002