Paper 1 |
Title |
Systematic Control and Management of Data Integrity |
Authors |
Ji-Won Byun (Purdue University)
Yonglak Sohn (Seokyeong University)
Elisa Bertino (Purdue University) |
Paper 2 |
Title |
TrustBAC - Integrating Trust Relationships into the RBAC Model
for Access Control in Open Systems |
Authors |
Sudip Chakraborty and indrajit Ray (Colorado State University) |
Paper 3 |
Title |
Secure Resource Description Framework: an Access Control Model |
Authors |
Amit Jain and Csilla Farkas (University of South Carolina) |
Paper 4 |
Title |
Traust: A Trust Negotiation-Based Authorization Service for Open
Systems |
Authors |
Adam J. Lee, Marianne Winslett, Jim Basney and Von Welch (University
of Illinois at Urbana-Champaign)
|
Paper 5 |
Title |
PRIMA: Policy-Reduced Integrity Measurement Architecture |
Authors |
Trent Jaeger (Pennsylvania State University)
Reiner Sailer (IBM)
Umesh Shankar (UC Berkeley) |
Paper 6 |
Title |
Information Flow Property Preserving Transformation
of UML Interaction Di
agrams |
Authors |
Fredrik Seehusen and Ketil (University of Oslo) |
Paper 7 |
Title |
Integrating Presence Inference into Trust Management for Ubiquitous
Systems |
Authors |
Jun Noda, Mie Takahashi and Itaru Hosomi (NEC Corporation)
Hisashi Mouri, Yoshiaki Takata and Hiroyuki Seki (Nara Institute of
Science and Technology)
|
Paper 8 |
Title |
Data-Centric Security: Role Analysis and Role Typestates |
Authors |
Vugranam C. Sreedhar (IBM)
|
Paper 9 |
Title |
Towards Reasonability Properties for Access-Control Policy Languages |
Authors |
Michael Carl Tschantz (Brown University (Current affiliation: Carnegie
Mellon University))
Shriram Krishnamurthi (Brown University) |
Paper 10 |
Title |
Redirection Policies for Mission-Based Information Sharing |
Authors |
David Keppler, Vipin Swarup, and Sushil Jajodia (The MITRE Corporation) |
Paper 11 |
Title |
Trust Management with Delegation in Grouped Peer-to-Peer Communities |
Authors |
Ajay Ravichandran and Jong P. Yoon (University of Louisiana)
|
Paper 12 |
Title |
Key Management for Non-Tree Access Hierarchies |
Authors |
Mikhail J. Atallah, Marina Blanton, and Keith B. Frikken (Purdue University) |
Paper 13 |
Title |
Inter-Instance Authorization Constraints in Secure Collaborative
Workflows |
Authors |
Janice Warner, Vijay Atluri (Rutgers University)
Akhil Kumar (Penn State University) |
Paper 14 |
Title |
The Secondary and Approximate Authorization Model and its Application
to Bell-LaPadula Policies |
Authors |
Jason Crampton (University of London)
Wing Leung and Konstantin Beznosov (University of British Columbia)
|
Paper 15 |
Title |
A Usage-based Authorization Framework for Collaborative Computing
Systems |
Authors |
Xinwen Zhang (Goerge Mason University)
Masayuki Nakae (NEC Corporation)
Michael J. Covington (Intel Corporation)
Ravi Sandhu (George Mason University) |
Paper 16 |
Title |
Supporting Authorization Query and Inter-domain Role Mapping in
Presence of Hybrid Role Hierarchy |
Authors |
Siqing Du and James B.D. Joshi (University of Pittsburgh)
|
Paper 17 |
Title |
Role-based Access Management for Ad-hoc Collaboration |
Authors |
Jing Jin and Gail-Joon Ahn (University of North Carolina at Charlotte) |
Paper 18 |
Title |
Access Control, Confidentiality and Privacy for Video Surveillance
Databases |
Authors |
Bhavani Thuraisingham and Gal Lavee (University of Texas at Dallas )
Elisa Bertino (Purdue University)
Jianping Fan (University of North Carolina) |
Paper 19 |
Title |
Fine-grained Role-based Delegation in Presence of Hybrid Role Hierarchy |
Authors |
James B.D. Joshi (University off Pittsburgh)
Elisa Bertino (Purdue University) |
Paper 20 |
Title |
XACML Policy Integration Algorithms |
Authors |
P. Mazzoleni (University of Milan)
Elisa Bertino (Purdue University)
B. Crispo (University of Trento)
S. Sivasubramanian (Vrije Universiteit) |
Paper 21 |
Title |
A model-checking approach to analysing organisational controls in
a loan origination process |
Authors |
Andreas Schaad (Security & Trust Group)
Karsten Sohr (Universitat Bremen) |
Paper 22 |
Title |
Semantic Access Control for Information Interoperation |
Authors |
Chi-Chun Pan, Prasenjit Mitra, and Peng Liu (The Pennsylvania State
University) |
Paper 23 |
Title |
Constraint Generation for Separation of Duty |
Authors |
Hong Chen and Ninghui Li (Purdue University) |
Paper 24 |
Title |
On Classifying Access Control Implementations for Distributed Systems |
Authors |
Kevin Kane and James C. Browne (The University of Texas at Austin) |
Paper 25 |
Title |
Delegation in the Role Graph Model |
Authors |
He Wang and Sylvia L. Osborn (The University of Western Ontario) |