default search action
SACMAT 2007: Sophia Antipolis, France
- Volkmar Lotz, Bhavani Thuraisingham:
12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings. ACM 2007, ISBN 978-1-59593-745-2
Policy management
- Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo:
An approach to evaluate policy similarity. 1-10 - Sandro Etalle, William H. Winsborough:
A posteriori compliance control. 11-20
Access control in novel systems
- Barbara Carminati, Elena Ferrari, Kian-Lee Tan:
Enforcing access control over data streams. 21-30 - Alex Roichman, Ehud Gudes:
Fine-grained access control to web databases. 31-40
Privacy management
- Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo:
Privacy-aware role based access control. 41-50 - Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin:
A privacy preserving assertion based policy language for federation systems. 51-60 - Bogdan Cautis:
Distributed access control: a privacy-conscious approach. 61-70
Secure operating systems
- Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang:
Towards a VMM-based usage control framework for OS kernel integrity protection. 71-80 - Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan:
Managing the risk of covert information flows in virtual machine systems. 81-90 - Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel:
A logical specification and analysis for SELinux MLS policy. 91-100
Consistency enforcement and secure grids
- Adam J. Lee, Kazuhiro Minami, Marianne Winslett:
Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. 101-110 - Paul Z. Kolano:
Mesh: secure, lightweight grid middleware using existing SSH infrastructure. 111-120
Short papers: high assurance systems
- Glenn Faden:
Multilevel filesystems in solaris trusted extensions. 121-126 - Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens:
A formal approach for testing security rules. 127-132 - Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
New constructions for provably-secure time-bound hierarchical key assignment schemes. 133-138 - Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer:
Role engineering using graph optimisation. 139-144 - Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan:
PEI models towards scalable, usable and high-assurance information sharing. 145-150
Short papers: access control
- He Wang, Sylvia L. Osborn:
Discretionary access control with the administrative role graph model. 151-156 - Liang Chen, Jason Crampton:
Inter-domain role mapping and least privilege. 157-162 - Helge Janicke, Antonio Cau, Hussein Zedan:
A note on the formalisation of UCON. 163-168 - Irini Fundulaki, Sebastian Maneth:
Formalizing XML access control for update operations. 169-174
Roles and policies
- Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo:
The role mining problem: finding a minimal descriptive set of roles. 175-184 - Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher:
Specifications of a high-level conflict-free firewall policy language for multi-domain networks. 185-194
Novel access control techniques
- Steve Barker:
Action-status access control. 195-204 - Michael LeMay, Omid Fatemieh, Carl A. Gunter:
PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. 205-214 - Gail-Joon Ahn, Hongxin Hu:
Towards realizing a formal RBAC model in real systems. 215-224 - Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo:
Chinese-wall process confinement for practical distributed coalitions. 225-234 - Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya:
Using semantics for automatic enforcement of access control policies among dynamic coalitions. 235-244
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.