About
Advance Program
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Registration
Hotel Reservation
Miscellaneous
Since 1995

 

Maintained and
Sponsored by

 

Paper 1
Title Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations
Authors Jeff Zarnett, Mahesh Tripunitara, and Patrick Lam
Paper 2
Title An Access Control Model for Mobile Physical Objects
Authors Florian Kerschbaum
Paper 3
Title Towards Analyzing Complex Operating System Access Control Configurations
Authors Hong Chen, Ninghui Li, Christopher S. Gates, and Ziqing Mao
Paper 4
Title Role Mining Based on Weights
Authors Xiaopu Ma, Ruixuan Li, and Zhengding Lu
Paper 5
Title A Model of Triangulating Environments for Policy Authoring
Authors Kathi Fisler and Shriram Krishnamurthi
Paper 6
Title Data Protection Models for Service Provisioning in the Cloud
Authors Dan Lin and Anna Squicciarini
Paper 7
Title Modular Context-Aware Access Control for Medical Sensor Networks
Authors Oscar Garcia Morchon and Klaus Wehrle
Paper 8
Title Enforcing Spatial Contraints for Mobile RBAC Systems
Authors Michael Kirkpatrick and Elisa Bertino
Paper 9
Title On the Definition of Role Mining
Authors Mario Frank, Joachim M. Buhmann, and David Basin
Paper 10
Title Role Updating for Assignments
Authors Jinwei Hu, Yan Zhang, Ruixuan Li, and Zhengding Lu
Paper 11
Title Personalizing Access Control by Generalizing Access Control
Authors Steve Barker
Paper 12
Title Mining Roles with Noisy Data
Authors Ian Molloy, Ninghui Li, Jorge Lobo, Yuan (Alan) Qi, and Luke Dickens
Paper 13
Title Monitoring Security Policies with Metric First-order Temporal Logic
Authors David Basin, Felix Klaedtke, and Samuel Muller
Paper 14
Title CARL: A Language Enabling Privacy-Preserving Access Control
Authors Franz-Stefan Preiss, Jan Camenisch, Sebastian Modersheim, Gregory Neven, and Dieter Sommer
Paper 15
Title StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy
Authors Hassan Takabi and James Joshi
Paper 16
Title Privacy-preserving Trust Verification
Authors Jaideep Vaidya, Vijay Atluri, Basit Shafiq, and Nabil Adam
Paper 17
Title Capability-Based Delegation Model in RBAC
Authors Koji Hasebe, Mitsuhiro Mabuchi, and Akira Matsushita
Paper 18
Title An Architecture for Enforcing End-to-End Access Control Over Web Applications
Authors Sandra Rueda, Boniface Hicks, Yogesh Sreenivasan, Dave King, Joshua Schiffman, Thomas Moyer, Trent Jaeger, and Patrick McDaniel
Paper 19
Title Access Control Policy Translation and Verification within Heterogeneous Data Federations
Authors Greg Leighton and Denilson Barbosa

 

 


Copyright (c) ACM SACMAT All rights reserved.