About
Accepted Papers
Advance Program
Call for Papers
Important Dates
Submission Site
Program Committee
Officers
Registration
Location
Miscellaneous
Since 1995

Maintained by

 

Formatting and submission instructions are available at : www.sheridanprinting.com/typedept/sacmat.htm

Paper 1
Title Systematic Control and Management of Data Integrity
Authors Ji-Won Byun (Purdue University)
Yonglak Sohn (Seokyeong University)
Elisa Bertino (Purdue University)
Paper 2
Title TrustBAC - Integrating Trust Relationships into the RBAC Model
for Access Control in Open Systems
Authors Sudip Chakraborty and indrajit Ray (Colorado State University)
Paper 3
Title Secure Resource Description Framework: an Access Control Model
Authors Amit Jain and Csilla Farkas (University of South Carolina)
Paper 4
Title Traust: A Trust Negotiation-Based Authorization Service for Open Systems
Authors

Adam J. Lee, Marianne Winslett, Jim Basney and Von Welch (University of Illinois at Urbana-Champaign)

Paper 5
Title PRIMA: Policy-Reduced Integrity Measurement Architecture
Authors Trent Jaeger (Pennsylvania State University)
Reiner Sailer (IBM)
Umesh Shankar (UC Berkeley)
Paper 6
Title Information Flow Property Preserving Transformation of UML Interaction Di
agrams
Authors Fredrik Seehusen and Ketil (University of Oslo)
Paper 7
Title Integrating Presence Inference into Trust Management for Ubiquitous Systems
Authors

Jun Noda, Mie Takahashi and Itaru Hosomi (NEC Corporation)
Hisashi Mouri, Yoshiaki Takata and Hiroyuki Seki (Nara Institute of Science and Technology)

Paper 8
Title Data-Centric Security: Role Analysis and Role Typestates
Authors Vugranam C. Sreedhar (IBM)
Paper 9
Title Towards Reasonability Properties for Access-Control Policy Languages
Authors Michael Carl Tschantz (Brown University (Current affiliation: Carnegie Mellon University))
Shriram Krishnamurthi (Brown University)
Paper 10
Title Redirection Policies for Mission-Based Information Sharing
Authors David Keppler, Vipin Swarup, and Sushil Jajodia (The MITRE Corporation)
Paper 11
Title Trust Management with Delegation in Grouped Peer-to-Peer Communities
Authors Ajay Ravichandran and Jong P. Yoon (University of Louisiana)
Paper 12
Title Key Management for Non-Tree Access Hierarchies
Authors Mikhail J. Atallah, Marina Blanton, and Keith B. Frikken (Purdue University)
Paper 13
Title Inter-Instance Authorization Constraints in Secure Collaborative Workflows
Authors Janice Warner, Vijay Atluri (Rutgers University)
Akhil Kumar (Penn State University)
Paper 14
Title The Secondary and Approximate Authorization Model and its Application to Bell-LaPadula Policies
Authors

Jason Crampton (University of London)
Wing Leung and Konstantin Beznosov (University of British Columbia)

Paper 15
Title A Usage-based Authorization Framework for Collaborative Computing Systems
Authors Xinwen Zhang (Goerge Mason University)
Masayuki Nakae (NEC Corporation)
Michael J. Covington (Intel Corporation)
Ravi Sandhu (George Mason University)
Paper 16
Title Supporting Authorization Query and Inter-domain Role Mapping in Presence of Hybrid Role Hierarchy
Authors Siqing Du and James B.D. Joshi (University of Pittsburgh)
Paper 17
Title Role-based Access Management for Ad-hoc Collaboration
Authors Jing Jin and Gail-Joon Ahn (University of North Carolina at Charlotte)
Paper 18
Title Access Control, Confidentiality and Privacy for Video Surveillance Databases
Authors Bhavani Thuraisingham and Gal Lavee (University of Texas at Dallas )
Elisa Bertino (Purdue University)
Jianping Fan (University of North Carolina)
Paper 19
Title Fine-grained Role-based Delegation in Presence of Hybrid Role Hierarchy
Authors James B.D. Joshi (University off Pittsburgh)
Elisa Bertino (Purdue University)
Paper 20
Title XACML Policy Integration Algorithms
Authors P. Mazzoleni (University of Milan)
Elisa Bertino (Purdue University)
B. Crispo (University of Trento)
S. Sivasubramanian (Vrije Universiteit)
Paper 21
Title A model-checking approach to analysing organisational controls in a loan origination process
Authors Andreas Schaad (Security & Trust Group)
Karsten Sohr (Universitat Bremen)
Paper 22
Title Semantic Access Control for Information Interoperation
Authors Chi-Chun Pan, Prasenjit Mitra, and Peng Liu (The Pennsylvania State University)
Paper 23
Title Constraint Generation for Separation of Duty
Authors Hong Chen and Ninghui Li (Purdue University)
Paper 24
Title On Classifying Access Control Implementations for Distributed Systems
Authors Kevin Kane and James C. Browne (The University of Texas at Austin)
Paper 25
Title Delegation in the Role Graph Model
Authors He Wang and Sylvia L. Osborn (The University of Western Ontario)

 

 


Copyright (c) 2005 ACM SACMAT All rights reserved.