The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2008 (conf/sacmat/2008)


  1. Fast exact and heuristic methods for role minimization problems. [Citation Graph (, )][DBLP]


  2. Migrating to optimal RBAC with minimal perturbation. [Citation Graph (, )][DBLP]


  3. Mining roles with semantic meanings. [Citation Graph (, )][DBLP]


  4. Delegation and satisfiability in workflow systems. [Citation Graph (, )][DBLP]


  5. Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP]


  6. Task-based entailment constraints for basic workflow patterns. [Citation Graph (, )][DBLP]


  7. Panel on role engineering. [Citation Graph (, )][DBLP]


  8. Authorization recycling in RBAC systems. [Citation Graph (, )][DBLP]


  9. ROWLBAC: representing role based access control in OWL. [Citation Graph (, )][DBLP]


  10. UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. [Citation Graph (, )][DBLP]


  11. RBAC administration in distributed systems. [Citation Graph (, )][DBLP]


  12. Policy decomposition for collaborative access control. [Citation Graph (, )][DBLP]


  13. Context-aware role-based access control in pervasive computing systems. [Citation Graph (, )][DBLP]


  14. A general obligation model and continuity: enhanced policy enforcement engine for usage control. [Citation Graph (, )][DBLP]


  15. An obligation model bridging access control policies and privacy policies. [Citation Graph (, )][DBLP]


  16. Access control by action control. [Citation Graph (, )][DBLP]


  17. A meta model for access control: why is it needed and is it even possible to achieve? [Citation Graph (, )][DBLP]


  18. Measuring integrity on mobile phone systems. [Citation Graph (, )][DBLP]


  19. Visualization based policy analysis: case study in SELinux. [Citation Graph (, )][DBLP]


  20. Model-based behavioral attestation. [Citation Graph (, )][DBLP]


  21. Detecting and resolving policy misconfigurations in access-control systems. [Citation Graph (, )][DBLP]


  22. Enabling verification and conformance testing for access control model. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002