callback( { "result":{ "query":":facetid:toc:\"db/conf/sacmat/sacmat2007.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"193.06" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"29", "@dc":"29", "@oc":"29", "@id":"43317902", "text":":facetid:toc:db/conf/sacmat/sacmat2007.bht" } }, "hits":{ "@total":"29", "@computed":"29", "@sent":"29", "@first":"0", "hit":[{ "@score":"1", "@id":"5579791", "info":{"authors":{"author":[{"@pid":"a/GailJoonAhn","text":"Gail-Joon Ahn"},{"@pid":"02/2870","text":"Hongxin Hu"}]},"title":"Towards realizing a formal RBAC model in real systems.","venue":"SACMAT","pages":"215-224","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/AhnH07","doi":"10.1145/1266840.1266875","ee":"https://doi.org/10.1145/1266840.1266875","url":"https://dblp.org/rec/conf/sacmat/AhnH07"}, "url":"URL#5579791" }, { "@score":"1", "@id":"5579792", "info":{"authors":{"author":{"@pid":"31/6949","text":"Steve Barker"}},"title":"Action-status access control.","venue":"SACMAT","pages":"195-204","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/Barker07","doi":"10.1145/1266840.1266873","ee":"https://doi.org/10.1145/1266840.1266873","url":"https://dblp.org/rec/conf/sacmat/Barker07"}, "url":"URL#5579792" }, { "@score":"1", "@id":"5579793", "info":{"authors":{"author":[{"@pid":"83/2099","text":"Barbara Carminati"},{"@pid":"f/ElenaFerrari","text":"Elena Ferrari"},{"@pid":"t/KianLeeTan","text":"Kian-Lee Tan"}]},"title":"Enforcing access control over data streams.","venue":"SACMAT","pages":"21-30","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/CarminatiFT07","doi":"10.1145/1266840.1266845","ee":"https://doi.org/10.1145/1266840.1266845","url":"https://dblp.org/rec/conf/sacmat/CarminatiFT07"}, "url":"URL#5579793" }, { "@score":"1", "@id":"5579794", "info":{"authors":{"author":{"@pid":"05/6939","text":"Bogdan Cautis"}},"title":"Distributed access control: a privacy-conscious approach.","venue":"SACMAT","pages":"61-70","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/Cautis07","doi":"10.1145/1266840.1266850","ee":"https://doi.org/10.1145/1266840.1266850","url":"https://dblp.org/rec/conf/sacmat/Cautis07"}, "url":"URL#5579794" }, { "@score":"1", "@id":"5579795", "info":{"authors":{"author":[{"@pid":"01/5394","text":"Liang Chen"},{"@pid":"c/JasonCrampton","text":"Jason Crampton"}]},"title":"Inter-domain role mapping and least privilege.","venue":"SACMAT","pages":"157-162","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/ChenC07","doi":"10.1145/1266840.1266866","ee":"https://doi.org/10.1145/1266840.1266866","url":"https://dblp.org/rec/conf/sacmat/ChenC07"}, "url":"URL#5579795" }, { "@score":"1", "@id":"5579796", "info":{"authors":{"author":[{"@pid":"e/SandroEtalle","text":"Sandro Etalle"},{"@pid":"45/6818","text":"William H. Winsborough"}]},"title":"A posteriori compliance control.","venue":"SACMAT","pages":"11-20","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/EtalleW07","doi":"10.1145/1266840.1266843","ee":"https://doi.org/10.1145/1266840.1266843","url":"https://dblp.org/rec/conf/sacmat/EtalleW07"}, "url":"URL#5579796" }, { "@score":"1", "@id":"5579797", "info":{"authors":{"author":{"@pid":"76/2350","text":"Glenn Faden"}},"title":"Multilevel filesystems in solaris trusted extensions.","venue":"SACMAT","pages":"121-126","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/Faden07","doi":"10.1145/1266840.1266859","ee":"https://doi.org/10.1145/1266840.1266859","url":"https://dblp.org/rec/conf/sacmat/Faden07"}, "url":"URL#5579797" }, { "@score":"1", "@id":"5579798", "info":{"authors":{"author":[{"@pid":"74/6086","text":"Irini Fundulaki"},{"@pid":"m/SebastianManeth","text":"Sebastian Maneth"}]},"title":"Formalizing XML access control for update operations.","venue":"SACMAT","pages":"169-174","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/FundulakiM07","doi":"10.1145/1266840.1266868","ee":"https://doi.org/10.1145/1266840.1266868","url":"https://dblp.org/rec/conf/sacmat/FundulakiM07"}, "url":"URL#5579798" }, { "@score":"1", "@id":"5579799", "info":{"authors":{"author":[{"@pid":"16/626","text":"Boniface Hicks"},{"@pid":"173/2490","text":"Sandra Julieta Rueda"},{"@pid":"65/6057","text":"Luke St. Clair"},{"@pid":"45/576","text":"Trent Jaeger"},{"@pid":"m/PatrickDrewMcDaniel","text":"Patrick D. McDaniel"}]},"title":"A logical specification and analysis for SELinux MLS policy.","venue":"SACMAT","pages":"91-100","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/HicksRCJM07","doi":"10.1145/1266840.1266854","ee":"https://doi.org/10.1145/1266840.1266854","url":"https://dblp.org/rec/conf/sacmat/HicksRCJM07"}, "url":"URL#5579799" }, { "@score":"1", "@id":"5579800", "info":{"authors":{"author":[{"@pid":"45/576","text":"Trent Jaeger"},{"@pid":"86/4992","text":"Reiner Sailer"},{"@pid":"39/6953","text":"Yogesh Sreenivasan"}]},"title":"Managing the risk of covert information flows in virtual machine systems.","venue":"SACMAT","pages":"81-90","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/JaegerSS07","doi":"10.1145/1266840.1266853","ee":"https://doi.org/10.1145/1266840.1266853","url":"https://dblp.org/rec/conf/sacmat/JaegerSS07"}, "url":"URL#5579800" }, { "@score":"1", "@id":"5579801", "info":{"authors":{"author":[{"@pid":"69/1646","text":"Helge Janicke"},{"@pid":"89/2332","text":"Antonio Cau"},{"@pid":"z/HZedan","text":"Hussein Zedan"}]},"title":"A note on the formalisation of UCON.","venue":"SACMAT","pages":"163-168","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/JanickeCZ07","doi":"10.1145/1266840.1266867","ee":"https://doi.org/10.1145/1266840.1266867","url":"https://dblp.org/rec/conf/sacmat/JanickeCZ07"}, "url":"URL#5579801" }, { "@score":"1", "@id":"5579802", "info":{"authors":{"author":[{"@pid":"29/5816","text":"Yasuharu Katsuno"},{"@pid":"36/56","text":"Yuji Watanabe"},{"@pid":"53/3469","text":"Sanehiro Furuichi"},{"@pid":"58/3839","text":"Michiharu Kudo"}]},"title":"Chinese-wall process confinement for practical distributed coalitions.","venue":"SACMAT","pages":"225-234","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/KatsunoWFK07","doi":"10.1145/1266840.1266876","ee":"https://doi.org/10.1145/1266840.1266876","url":"https://dblp.org/rec/conf/sacmat/KatsunoWFK07"}, "url":"URL#5579802" }, { "@score":"1", "@id":"5579803", "info":{"authors":{"author":{"@pid":"47/1304","text":"Paul Z. Kolano"}},"title":"Mesh: secure, lightweight grid middleware using existing SSH infrastructure.","venue":"SACMAT","pages":"111-120","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/Kolano07","doi":"10.1145/1266840.1266857","ee":"https://doi.org/10.1145/1266840.1266857","url":"https://dblp.org/rec/conf/sacmat/Kolano07"}, "url":"URL#5579803" }, { "@score":"1", "@id":"5579804", "info":{"authors":{"author":[{"@pid":"84/6470","text":"Ram Krishnan"},{"@pid":"s/RaviSSandhu","text":"Ravi S. Sandhu"},{"@pid":"95/334","text":"Kumar Ranganathan"}]},"title":"PEI models towards scalable, usable and high-assurance information sharing.","venue":"SACMAT","pages":"145-150","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/KrishnanSR07","doi":"10.1145/1266840.1266863","ee":"https://doi.org/10.1145/1266840.1266863","url":"https://dblp.org/rec/conf/sacmat/KrishnanSR07"}, "url":"URL#5579804" }, { "@score":"1", "@id":"5579805", "info":{"authors":{"author":[{"@pid":"81/178","text":"Michael LeMay"},{"@pid":"34/2145","text":"Omid Fatemieh"},{"@pid":"g/CarlAGunter","text":"Carl A. Gunter"}]},"title":"PolicyMorph: interactive policy transformations for a logical attribute-based access control framework.","venue":"SACMAT","pages":"205-214","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/LeMayFG07","doi":"10.1145/1266840.1266874","ee":"https://doi.org/10.1145/1266840.1266874","url":"https://dblp.org/rec/conf/sacmat/LeMayFG07"}, "url":"URL#5579805" }, { "@score":"1", "@id":"5579806", "info":{"authors":{"author":[{"@pid":"62/1373","text":"Adam J. Lee"},{"@pid":"57/3771","text":"Kazuhiro Minami"},{"@pid":"w/MarianneWinslett","text":"Marianne Winslett"}]},"title":"Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.","venue":"SACMAT","pages":"101-110","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/LeeMW07","doi":"10.1145/1266840.1266856","ee":"https://doi.org/10.1145/1266840.1266856","url":"https://dblp.org/rec/conf/sacmat/LeeMW07"}, "url":"URL#5579806" }, { "@score":"1", "@id":"5579807", "info":{"authors":{"author":[{"@pid":"l/DanLin","text":"Dan Lin 0001"},{"@pid":"41/1524","text":"Prathima Rao"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"l/JorgeLobo1","text":"Jorge Lobo 0001"}]},"title":"An approach to evaluate policy similarity.","venue":"SACMAT","pages":"1-10","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/LinRBL07","doi":"10.1145/1266840.1266842","ee":"https://doi.org/10.1145/1266840.1266842","url":"https://dblp.org/rec/conf/sacmat/LinRBL07"}, "url":"URL#5579807" }, { "@score":"1", "@id":"5579808", "info":{"authors":{"author":[{"@pid":"74/4777","text":"Wissam Mallouli"},{"@pid":"68/5050","text":"Jean-Marie Orset"},{"@pid":"51/5965","text":"Ana R. Cavalli"},{"@pid":"c/NoraCuppens","text":"Nora Cuppens-Boulahia"},{"@pid":"c/FredericCuppens","text":"Frédéric Cuppens"}]},"title":"A formal approach for testing security rules.","venue":"SACMAT","pages":"127-132","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/MallouliOCCC07","doi":"10.1145/1266840.1266860","ee":"https://doi.org/10.1145/1266840.1266860","url":"https://dblp.org/rec/conf/sacmat/MallouliOCCC07"}, "url":"URL#5579808" }, { "@score":"1", "@id":"5579809", "info":{"authors":{"author":[{"@pid":"10/3141","text":"Qun Ni"},{"@pid":"97/2730","text":"Alberto Trombetta"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"l/JorgeLobo1","text":"Jorge Lobo 0001"}]},"title":"Privacy-aware role based access control.","venue":"SACMAT","pages":"41-50","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/NiTBL07","doi":"10.1145/1266840.1266848","ee":"https://doi.org/10.1145/1266840.1266848","url":"https://dblp.org/rec/conf/sacmat/NiTBL07"}, "url":"URL#5579809" }, { "@score":"1", "@id":"5579810", "info":{"authors":{"author":[{"@pid":"15/297","text":"Alex Roichman"},{"@pid":"g/EhudGudes","text":"Ehud Gudes"}]},"title":"Fine-grained access control to web databases.","venue":"SACMAT","pages":"31-40","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/RoichmanG07","doi":"10.1145/1266840.1266846","ee":"https://doi.org/10.1145/1266840.1266846","url":"https://dblp.org/rec/conf/sacmat/RoichmanG07"}, "url":"URL#5579810" }, { "@score":"1", "@id":"5579811", "info":{"authors":{"author":[{"@pid":"19/4614","text":"Alfredo De Santis"},{"@pid":"60/6199","text":"Anna Lisa Ferrara"},{"@pid":"39/5874","text":"Barbara Masucci"}]},"title":"New constructions for provably-secure time-bound hierarchical key assignment schemes.","venue":"SACMAT","pages":"133-138","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/SantisFM07","doi":"10.1145/1266840.1266861","ee":"https://doi.org/10.1145/1266840.1266861","url":"https://dblp.org/rec/conf/sacmat/SantisFM07"}, "url":"URL#5579811" }, { "@score":"1", "@id":"5579812", "info":{"authors":{"author":[{"@pid":"s/AnnaCinziaSquicciarini","text":"Anna Cinzia Squicciarini"},{"@pid":"91/1678","text":"Ayça Azgin Hintoglu"},{"@pid":"b/ElisaBertino","text":"Elisa Bertino"},{"@pid":"48/5154","text":"Yücel Saygin"}]},"title":"A privacy preserving assertion based policy language for federation systems.","venue":"SACMAT","pages":"51-60","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/SquicciariniHBS07","doi":"10.1145/1266840.1266849","ee":"https://doi.org/10.1145/1266840.1266849","url":"https://dblp.org/rec/conf/sacmat/SquicciariniHBS07"}, "url":"URL#5579812" }, { "@score":"1", "@id":"5579813", "info":{"authors":{"author":[{"@pid":"61/3091","text":"Jaideep Vaidya"},{"@pid":"a/VAtluri","text":"Vijayalakshmi Atluri"},{"@pid":"67/398","text":"Qi Guo"}]},"title":"The role mining problem: finding a minimal descriptive set of roles.","venue":"SACMAT","pages":"175-184","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/VaidyaAG07","doi":"10.1145/1266840.1266870","ee":"https://doi.org/10.1145/1266840.1266870","url":"https://dblp.org/rec/conf/sacmat/VaidyaAG07"}, "url":"URL#5579813" }, { "@score":"1", "@id":"5579814", "info":{"authors":{"author":[{"@pid":"01/6368-20","text":"He Wang 0020"},{"@pid":"o/SylviaLOsborn","text":"Sylvia L. Osborn"}]},"title":"Discretionary access control with the administrative role graph model.","venue":"SACMAT","pages":"151-156","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/WangO07","doi":"10.1145/1266840.1266865","ee":"https://doi.org/10.1145/1266840.1266865","url":"https://dblp.org/rec/conf/sacmat/WangO07"}, "url":"URL#5579814" }, { "@score":"1", "@id":"5579815", "info":{"authors":{"author":[{"@pid":"98/927","text":"Janice Warner"},{"@pid":"a/VAtluri","text":"Vijayalakshmi Atluri"},{"@pid":"m/RaviMukkamala","text":"Ravi Mukkamala"},{"@pid":"61/3091","text":"Jaideep Vaidya"}]},"title":"Using semantics for automatic enforcement of access control policies among dynamic coalitions.","venue":"SACMAT","pages":"235-244","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/WarnerAMV07","doi":"10.1145/1266840.1266877","ee":"https://doi.org/10.1145/1266840.1266877","url":"https://dblp.org/rec/conf/sacmat/WarnerAMV07"}, "url":"URL#5579815" }, { "@score":"1", "@id":"5579816", "info":{"authors":{"author":[{"@pid":"09/0","text":"Min Xu"},{"@pid":"80/6988","text":"Xuxian Jiang"},{"@pid":"s/RaviSSandhu","text":"Ravi S. Sandhu"},{"@pid":"14/3612","text":"Xinwen Zhang"}]},"title":"Towards a VMM-based usage control framework for OS kernel integrity protection.","venue":"SACMAT","pages":"71-80","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/XuJSZ07","doi":"10.1145/1266840.1266852","ee":"https://doi.org/10.1145/1266840.1266852","url":"https://dblp.org/rec/conf/sacmat/XuJSZ07"}, "url":"URL#5579816" }, { "@score":"1", "@id":"5579817", "info":{"authors":{"author":[{"@pid":"13/5236-7","text":"Bin Zhang 0007"},{"@pid":"a/EhabAlShaer","text":"Ehab Al-Shaer"},{"@pid":"j/RJagadeesan","text":"Radha Jagadeesan"},{"@pid":"04/522","text":"James Riely"},{"@pid":"p/CorinPitcher","text":"Corin Pitcher"}]},"title":"Specifications of a high-level conflict-free firewall policy language for multi-domain networks.","venue":"SACMAT","pages":"185-194","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/ZhangAJRP07","doi":"10.1145/1266840.1266871","ee":"https://doi.org/10.1145/1266840.1266871","url":"https://dblp.org/rec/conf/sacmat/ZhangAJRP07"}, "url":"URL#5579817" }, { "@score":"1", "@id":"5579818", "info":{"authors":{"author":[{"@pid":"37/3597","text":"Dana Zhang"},{"@pid":"r/KRamamohanarao","text":"Kotagiri Ramamohanarao"},{"@pid":"81/4851","text":"Tim Ebringer"}]},"title":"Role engineering using graph optimisation.","venue":"SACMAT","pages":"139-144","year":"2007","type":"Conference and Workshop Papers","access":"closed","key":"conf/sacmat/ZhangRE07","doi":"10.1145/1266840.1266862","ee":"https://doi.org/10.1145/1266840.1266862","url":"https://dblp.org/rec/conf/sacmat/ZhangRE07"}, "url":"URL#5579818" }, { "@score":"1", "@id":"5601086", "info":{"authors":{"author":[{"@pid":"32/383","text":"Volkmar Lotz"},{"@pid":"t/BMThuraisingham","text":"Bhavani Thuraisingham"}]},"title":"12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings","venue":"SACMAT","publisher":"ACM","year":"2007","type":"Editorship","key":"conf/sacmat/2007","doi":"10.1145/1266840","ee":"https://doi.org/10.1145/1266840","url":"https://dblp.org/rec/conf/sacmat/2007"}, "url":"URL#5601086" } ] } } } )