Conferences in DBLP
Sandro Etalle , William H. Winsborough Integrity constraints in trust management. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:1-10 [Conf ] David F. Ferraiolo , Serban I. Gavrila , Vincent C. Hu , D. Richard Kuhn Composing and combining policies under the policy machine. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:11-20 [Conf ] Andreas Matheus Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:21-28 [Conf ] Elisa Bertino , Barbara Catania , Maria Luisa Damiani , Paolo Perlasca GEO-RBAC: a spatially aware RBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:29-37 [Conf ] Jason Crampton A reference monitor for workflow systems with constrained task execution. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:38-47 [Conf ] Konstantin Beznosov Future direction of access control models, architectures, and technologies. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:48- [Conf ] Vijayalakshmi Atluri , Janice Warner Supporting conditional delegation in secure workflow management systems. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:49-58 [Conf ] Jacques Wainer , Akhil Kumar A fine-grained, controllable, user-to-user delegation method in RBAC. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:59-66 [Conf ] Barbara Carminati , Elena Ferrari AC-XML documents: improving the performance of a web access control module. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:67-76 [Conf ] Gabriel M. Kuper , Fabio Massacci , Nataliya Rassadko Generalized XML security views. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:77-84 [Conf ] Mizuho Iwaihara , Somchai Chatvichienchai , Chutiporn Anutariya , Vilas Wuwongse Relevancy based access control of versioned XML documents. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:85-94 [Conf ] Marina Blanton , Mikhail J. Atallah Provable bounds for portable and flexible privacy-preserving access. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:95-101 [Conf ] Ji-Won Byun , Elisa Bertino , Ninghui Li Purpose based access control of complex data for privacy protection. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:102-110 [Conf ] R. J. Hulsebosch , Alfons H. Salden , Mortaza S. Bargh , P. W. G. Ebben , J. Reitsma Context sensitive access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:111-119 [Conf ] Eunjee Song , Raghu Reddy , Robert B. France , Indrakshi Ray , Geri Georg , Roger Alexander Verifiable composition of access control and application features. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:120-129 [Conf ] Axel Kern , Claudia Walhorn Rule support for role-based access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:130-138 [Conf ] Tatyana Ryutov , Li Zhou , B. Clifford Neuman , Travis Leithead , Kent E. Seamons Adaptive trust negotiation and access control. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:139-146 [Conf ] Ravi S. Sandhu , Xinwen Zhang Peer-to-peer access control architecture using trusted computing technology. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:147-158 [Conf ] Mohamed Shehab , Elisa Bertino , Arif Ghafoor SERAT: SEcure role mApping technique for decentralized secure interoperability. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:159-167 [Conf ] Jürgen Schlegelmilch , Ulrike Steffens Role mining with ORCA. [Citation Graph (0, 0)][DBLP ] SACMAT, 2005, pp:168-176 [Conf ]