Conferences in DBLP
Bhavani M. Thuraisingham , Gal Lavee , Elisa Bertino , Jianping Fan , Latifur Khan Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:1-10 [Conf ] Mikhail J. Atallah , Marina Blanton , Keith B. Frikken Key management for non-tree access hierarchies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:11-18 [Conf ] Trent Jaeger , Reiner Sailer , Umesh Shankar PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:19-28 [Conf ] Kevin Kane , James C. Browne On classifying access control implementations for distributed systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:29-38 [Conf ] Adam J. Lee , Marianne Winslett , Jim Basney , Von Welch Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:39-48 [Conf ] Sudip Chakraborty , Indrajit Ray TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:49-58 [Conf ] Jun Noda , Mie Takahashi , Itaru Hosomi , Hisashi Mouri , Yoshiaki Takata , Hiroyuki Seki Integrating presence inference into trust management for ubiquitous systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:59-68 [Conf ] Andreas Schaad Security in enterprise resource planning systems and service-oriented architectures. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:69-70 [Conf ] Ajay Ravichandran , Jongpil Yoon Trust management with delegation in grouped peer-to-peer communities. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:71-80 [Conf ] James B. D. Joshi , Elisa Bertino Fine-grained role-based delegation in presence of the hybrid role hierarchy. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:81-90 [Conf ] He Wang , Sylvia L. Osborn Delegation in the role graph model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:91-100 [Conf ] Ji-Won Byun , Yonglak Sohn , Elisa Bertino Systematic control and management of data integrity. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:101-110 [Conf ] Jason Crampton , Wing Leung , Konstantin Beznosov The secondary and approximate authorization model and its application to Bell-LaPadula policies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:111-120 [Conf ] Amit Jain , Csilla Farkas Secure resource description framework: an access control model. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:121-129 [Conf ] Hong Chen , Ninghui Li Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:130-138 [Conf ] Andreas Schaad , Volkmar Lotz , Karsten Sohr A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:139-149 [Conf ] Fredrik Seehusen , Ketil Stølen Information flow property preserving transformation of UML interaction diagrams. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:150-159 [Conf ] Michael Carl Tschantz , Shriram Krishnamurthi Towards reasonability properties for access-control policy languages. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:160-169 [Conf ] Vugranam C. Sreedhar Data-centric security: role analysis and role typestates. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:170-179 [Conf ] Xinwen Zhang , Masayuki Nakae , Michael J. Covington , Ravi S. Sandhu A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:180-189 [Conf ] Janice Warner , Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:190-199 [Conf ] Jing Jin , Gail-Joon Ahn Role-based access management for ad-hoc collaborative sharing. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:200-209 [Conf ] David Keppler , Vipin Swarup , Sushil Jajodia Redirection policies for mission-based information sharing. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:210-218 [Conf ] Pietro Mazzoleni , Elisa Bertino , Bruno Crispo XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:219-227 [Conf ] Siqing Du , James B. D. Joshi Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:228-236 [Conf ] Chi-Chun Pan , Prasenjit Mitra , Peng Liu Semantic access control for information interoperation. [Citation Graph (0, 0)][DBLP ] SACMAT, 2006, pp:237-246 [Conf ]