The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Symposium on Access Control Models and Technologies (SACMAT) (sacmat)
2005 (conf/sacmat/2005)

  1. Sandro Etalle, William H. Winsborough
    Integrity constraints in trust management. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:1-10 [Conf]
  2. David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn
    Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:11-20 [Conf]
  3. Andreas Matheus
    Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:21-28 [Conf]
  4. Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca
    GEO-RBAC: a spatially aware RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:29-37 [Conf]
  5. Jason Crampton
    A reference monitor for workflow systems with constrained task execution. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:38-47 [Conf]
  6. Konstantin Beznosov
    Future direction of access control models, architectures, and technologies. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:48- [Conf]
  7. Vijayalakshmi Atluri, Janice Warner
    Supporting conditional delegation in secure workflow management systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:49-58 [Conf]
  8. Jacques Wainer, Akhil Kumar
    A fine-grained, controllable, user-to-user delegation method in RBAC. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:59-66 [Conf]
  9. Barbara Carminati, Elena Ferrari
    AC-XML documents: improving the performance of a web access control module. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:67-76 [Conf]
  10. Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko
    Generalized XML security views. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:77-84 [Conf]
  11. Mizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse
    Relevancy based access control of versioned XML documents. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:85-94 [Conf]
  12. Marina Blanton, Mikhail J. Atallah
    Provable bounds for portable and flexible privacy-preserving access. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:95-101 [Conf]
  13. Ji-Won Byun, Elisa Bertino, Ninghui Li
    Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:102-110 [Conf]
  14. R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma
    Context sensitive access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:111-119 [Conf]
  15. Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger Alexander
    Verifiable composition of access control and application features. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:120-129 [Conf]
  16. Axel Kern, Claudia Walhorn
    Rule support for role-based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:130-138 [Conf]
  17. Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons
    Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:139-146 [Conf]
  18. Ravi S. Sandhu, Xinwen Zhang
    Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:147-158 [Conf]
  19. Mohamed Shehab, Elisa Bertino, Arif Ghafoor
    SERAT: SEcure role mApping technique for decentralized secure interoperability. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:159-167 [Conf]
  20. Jürgen Schlegelmilch, Ulrike Steffens
    Role mining with ORCA. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2005, pp:168-176 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002