The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2001 (conf/sacmat/2001)

  1. Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob
    The role-based access control system of a European bank: a case study and discussion. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:3-9 [Conf]
  2. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd
    Securing context-aware applications using environment roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:10-20 [Conf]
  3. Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas
    Flexible team-based access control using contexts. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:21-27 [Conf]
  4. Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata
    Security verification of programs with stack inspection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:31-40 [Conf]
  5. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca
    A logical framework for reasoning about access control models. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:41-52 [Conf]
  6. Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr
    Panel: The next generation of acess control models (panel session): do we need them and what should they be? [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:53- [Conf]
  7. Elisa Bertino, Silvana Castano, Elena Ferrari
    On specifying security policies for web documents with an XML-based language. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:57-65 [Conf]
  8. Myong H. Kang, Joon S. Park, Judith N. Froscher
    Access control mechanisms for inter-organizational workflow. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:66-74 [Conf]
  9. Ty van den Akker, Quinn Snell, Mark J. Clement
    The YGuard access control model: set-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:75-84 [Conf]
  10. Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth
    Improving the granularity of access control in Windows NT. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:87-96 [Conf]
  11. Horst Wedde, Mario Lischka
    Modular authorization. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:97-105 [Conf]
  12. Jonathon Tidswell, John Potter
    A graphical definition of authorization schema in the DTAC model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:109-120 [Conf]
  13. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    On the specification and evolution of access control policies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:121-130 [Conf]
  14. Trent Jaeger
    Managing access control complexity using metrices. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:131-139 [Conf]
  15. Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson
    Panel: which access control technique will provide the greatest overall benefit-Abstract. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:141- [Conf]
  16. David F. Ferraiolo
    An argument for the role-based access control model. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:142-143 [Conf]
  17. Mikel L. Matthews
    Position paper. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:144- [Conf]
  18. Casey Schaufler
    They want froot loops why industry will continue to deliver multi-level security. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:145-146 [Conf]
  19. Stephen Smalley
    Which operating system access control technique will provide the greatest overall benefit to users?. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:147-148 [Conf]
  20. Robert Watson
    Statement for SACMAT 2001 panel. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:149- [Conf]
  21. Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
    A rule-based framework for role based delegation. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:153-162 [Conf]
  22. Najam Perwaiz
    Structured management of role-permission relationships. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:163-169 [Conf]
  23. Walt Yao, Ken Moody, Jean Bacon
    A model of OASIS role-based access control and its support for active security. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2001, pp:171-181 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002