The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2004 (conf/sacmat/2004)

  1. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu
    A logical specification for usage control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:1-10 [Conf]
  2. Urs Hengartner, Peter Steenkiste
    Implementing access control to people location information. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:11-20 [Conf]
  3. Horst Wedde, Mario Lischka
    Role-based access control in ambient and remote space. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:21-30 [Conf]
  4. Joachim Biskup, Sandra Wortmann
    Towards a credential-based implementation of compound access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:31-40 [Conf]
  5. Marina Bykova, Mikhail J. Atallah
    Succinct specifications of portable document access policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:41-50 [Conf]
  6. Xuhui Ao, Naftaly H. Minsky
    On the role of roles: from role-based to role-sensitive access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:51-60 [Conf]
  7. Irini Fundulaki, Maarten Marx
    Specifying access control policies for XML documents with XPath. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:61-69 [Conf]
  8. Jingzhu Wang, Sylvia L. Osborn
    A role-based approach to access control for XML databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:70-77 [Conf]
  9. Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor
    X-GTRBAC admin: a decentralized administration model for enterprise wide access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:78-86 [Conf]
  10. Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert
    A meta model for authorisations in application security systems and their integration into RBAC administration. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:87-96 [Conf]
  11. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    Administrative scope in the graph-based framework. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:97-104 [Conf]
  12. Trent Jaeger, Reiner Sailer, Xiaolan Zhang
    Resolving constraint conflicts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:105-114 [Conf]
  13. Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim
    Using uml to visualize role-based access control constraints. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:115-124 [Conf]
  14. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu
    Security for grid-based computing systems issues and challenges. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:125- [Conf]
  15. Ninghui Li, Mahesh V. Tripunitara
    Security analysis in role-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:126-135 [Conf]
  16. Giorgio Zanin, Luigi V. Mancini
    Towards a formal model for security policies specification and validation in the selinux system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:136-145 [Conf]
  17. Roberto Tamassia, Danfeng Yao, William H. Winsborough
    Role-based cascaded delegation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:146-155 [Conf]
  18. Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody
    Using trust and risk in role-based access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:156-162 [Conf]
  19. Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito
    A composite rbac approach for large, complex organizations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2004, pp:163-172 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002