The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2002 (conf/sacmat/2002)

  1. Trent Jaeger, Antony Edwards, Xiaolan Zhang
    Managing access control policies using access control spaces. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:3-12 [Conf]
  2. Andreas Schaad, Jonathan D. Moffett
    A lightweight approach to specification and analysis of role-based access control extensions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:13-22 [Conf]
  3. Emin Gün Sirer, Ke Wang
    An access control language for web services. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:23-30 [Conf]
  4. Gustaf Neumann, Mark Strembeck
    A scenario-driven role engineering process for functional RBAC roles. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:33-42 [Conf]
  5. Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett
    Observations on the role life-cycle in the context of enterprise security management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:43-51 [Conf]
  6. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David Wagner
    Cool security trends. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:53- [Conf]
  7. Jaehong Park, Ravi S. Sandhu
    Towards usage control models: beyond traditional access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:57-64 [Conf]
  8. Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi
    A cryptographic solution to implement access control in a hierarchy and more. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:65-73 [Conf]
  9. James Joshi, Elisa Bertino, Arif Ghafoor
    Temporal hierarchies and inheritance semantics for GTRBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:74-83 [Conf]
  10. Charles E. Phillips, T. C. Ting, Steven A. Demurjian
    Information sharing and security in dynamic coalitions. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:87-96 [Conf]
  11. Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands
    Models for coalition-based access control (CBAC). [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:97-106 [Conf]
  12. Kan Zhang, Tim Kindberg
    An authorization infrastructure for nomadic computing. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:107-113 [Conf]
  13. Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera
    A context-related authorization and access control method based on RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:117-124 [Conf]
  14. Longhua Zhang, Gail-Joon Ahn, Bei-tseng Chu
    A role-based delegation framework for healthcare information systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:125-134 [Conf]
  15. David W. Chadwick, Alexander Otenko
    The PERMIS X.509 role based privilege management infrastructure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:135-140 [Conf]
  16. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi Ravi
    Making access control more usable. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:141- [Conf]
  17. Jason Crampton
    Administrative scope and role hierarchy operations. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:145-154 [Conf]
  18. Sejong Oh, Ravi S. Sandhu
    A model for role administration using organization structure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:155-162 [Conf]
  19. Sylvia L. Osborn
    Information flow analysis of an RBAC system. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2002, pp:163-168 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002