The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2006 (conf/sacmat/2006)

  1. Bhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan
    Access control, confidentiality and privacy for video surveillance databases. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:1-10 [Conf]
  2. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
    Key management for non-tree access hierarchies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:11-18 [Conf]
  3. Trent Jaeger, Reiner Sailer, Umesh Shankar
    PRIMA: policy-reduced integrity measurement architecture. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:19-28 [Conf]
  4. Kevin Kane, James C. Browne
    On classifying access control implementations for distributed systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:29-38 [Conf]
  5. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:39-48 [Conf]
  6. Sudip Chakraborty, Indrajit Ray
    TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:49-58 [Conf]
  7. Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki
    Integrating presence inference into trust management for ubiquitous systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:59-68 [Conf]
  8. Andreas Schaad
    Security in enterprise resource planning systems and service-oriented architectures. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:69-70 [Conf]
  9. Ajay Ravichandran, Jongpil Yoon
    Trust management with delegation in grouped peer-to-peer communities. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:71-80 [Conf]
  10. James B. D. Joshi, Elisa Bertino
    Fine-grained role-based delegation in presence of the hybrid role hierarchy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:81-90 [Conf]
  11. He Wang, Sylvia L. Osborn
    Delegation in the role graph model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:91-100 [Conf]
  12. Ji-Won Byun, Yonglak Sohn, Elisa Bertino
    Systematic control and management of data integrity. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:101-110 [Conf]
  13. Jason Crampton, Wing Leung, Konstantin Beznosov
    The secondary and approximate authorization model and its application to Bell-LaPadula policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:111-120 [Conf]
  14. Amit Jain, Csilla Farkas
    Secure resource description framework: an access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:121-129 [Conf]
  15. Hong Chen, Ninghui Li
    Constraint generation for separation of duty. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:130-138 [Conf]
  16. Andreas Schaad, Volkmar Lotz, Karsten Sohr
    A model-checking approach to analysing organisational controls in a loan origination process. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:139-149 [Conf]
  17. Fredrik Seehusen, Ketil Stølen
    Information flow property preserving transformation of UML interaction diagrams. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:150-159 [Conf]
  18. Michael Carl Tschantz, Shriram Krishnamurthi
    Towards reasonability properties for access-control policy languages. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:160-169 [Conf]
  19. Vugranam C. Sreedhar
    Data-centric security: role analysis and role typestates. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:170-179 [Conf]
  20. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu
    A usage-based authorization framework for collaborative computing systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:180-189 [Conf]
  21. Janice Warner, Vijayalakshmi Atluri
    Inter-instance authorization constraints for secure workflow management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:190-199 [Conf]
  22. Jing Jin, Gail-Joon Ahn
    Role-based access management for ad-hoc collaborative sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:200-209 [Conf]
  23. David Keppler, Vipin Swarup, Sushil Jajodia
    Redirection policies for mission-based information sharing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:210-218 [Conf]
  24. Pietro Mazzoleni, Elisa Bertino, Bruno Crispo
    XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:219-227 [Conf]
  25. Siqing Du, James B. D. Joshi
    Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:228-236 [Conf]
  26. Chi-Chun Pan, Prasenjit Mitra, Peng Liu
    Semantic access control for information interoperation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:237-246 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002