:facetid:toc:\"db/conf/sacmat/sacmat2007.bht\"OK:facetid:toc:db/conf/sacmat/sacmat2007.bhtGail-Joon AhnHongxin HuTowards realizing a formal RBAC model in real systems.SACMAT215-2242007Conference and Workshop Papersclosedconf/sacmat/AhnH0710.1145/1266840.1266875https://doi.org/10.1145/1266840.1266875https://dblp.org/rec/conf/sacmat/AhnH07URL#5577609Steve BarkerAction-status access control.SACMAT195-2042007Conference and Workshop Papersclosedconf/sacmat/Barker0710.1145/1266840.1266873https://doi.org/10.1145/1266840.1266873https://dblp.org/rec/conf/sacmat/Barker07URL#5577610Barbara CarminatiElena FerrariKian-Lee TanEnforcing access control over data streams.SACMAT21-302007Conference and Workshop Papersclosedconf/sacmat/CarminatiFT0710.1145/1266840.1266845https://doi.org/10.1145/1266840.1266845https://dblp.org/rec/conf/sacmat/CarminatiFT07URL#5577611Bogdan CautisDistributed access control: a privacy-conscious approach.SACMAT61-702007Conference and Workshop Papersclosedconf/sacmat/Cautis0710.1145/1266840.1266850https://doi.org/10.1145/1266840.1266850https://dblp.org/rec/conf/sacmat/Cautis07URL#5577612Liang ChenJason CramptonInter-domain role mapping and least privilege.SACMAT157-1622007Conference and Workshop Papersclosedconf/sacmat/ChenC0710.1145/1266840.1266866https://doi.org/10.1145/1266840.1266866https://dblp.org/rec/conf/sacmat/ChenC07URL#5577613Sandro EtalleWilliam H. WinsboroughA posteriori compliance control.SACMAT11-202007Conference and Workshop Papersclosedconf/sacmat/EtalleW0710.1145/1266840.1266843https://doi.org/10.1145/1266840.1266843https://dblp.org/rec/conf/sacmat/EtalleW07URL#5577614Glenn FadenMultilevel filesystems in solaris trusted extensions.SACMAT121-1262007Conference and Workshop Papersclosedconf/sacmat/Faden0710.1145/1266840.1266859https://doi.org/10.1145/1266840.1266859https://dblp.org/rec/conf/sacmat/Faden07URL#5577615Irini FundulakiSebastian ManethFormalizing XML access control for update operations.SACMAT169-1742007Conference and Workshop Papersclosedconf/sacmat/FundulakiM0710.1145/1266840.1266868https://doi.org/10.1145/1266840.1266868https://dblp.org/rec/conf/sacmat/FundulakiM07URL#5577616Boniface HicksSandra Julieta RuedaLuke St. ClairTrent JaegerPatrick D. McDanielA logical specification and analysis for SELinux MLS policy.SACMAT91-1002007Conference and Workshop Papersclosedconf/sacmat/HicksRCJM0710.1145/1266840.1266854https://doi.org/10.1145/1266840.1266854https://dblp.org/rec/conf/sacmat/HicksRCJM07URL#5577617Trent JaegerReiner SailerYogesh SreenivasanManaging the risk of covert information flows in virtual machine systems.SACMAT81-902007Conference and Workshop Papersclosedconf/sacmat/JaegerSS0710.1145/1266840.1266853https://doi.org/10.1145/1266840.1266853https://dblp.org/rec/conf/sacmat/JaegerSS07URL#5577618Helge JanickeAntonio CauHussein ZedanA note on the formalisation of UCON.SACMAT163-1682007Conference and Workshop Papersclosedconf/sacmat/JanickeCZ0710.1145/1266840.1266867https://doi.org/10.1145/1266840.1266867https://dblp.org/rec/conf/sacmat/JanickeCZ07URL#5577619Yasuharu KatsunoYuji WatanabeSanehiro FuruichiMichiharu KudoChinese-wall process confinement for practical distributed coalitions.SACMAT225-2342007Conference and Workshop Papersclosedconf/sacmat/KatsunoWFK0710.1145/1266840.1266876https://doi.org/10.1145/1266840.1266876https://dblp.org/rec/conf/sacmat/KatsunoWFK07URL#5577620Paul Z. KolanoMesh: secure, lightweight grid middleware using existing SSH infrastructure.SACMAT111-1202007Conference and Workshop Papersclosedconf/sacmat/Kolano0710.1145/1266840.1266857https://doi.org/10.1145/1266840.1266857https://dblp.org/rec/conf/sacmat/Kolano07URL#5577621Ram KrishnanRavi S. SandhuKumar RanganathanPEI models towards scalable, usable and high-assurance information sharing.SACMAT145-1502007Conference and Workshop Papersclosedconf/sacmat/KrishnanSR0710.1145/1266840.1266863https://doi.org/10.1145/1266840.1266863https://dblp.org/rec/conf/sacmat/KrishnanSR07URL#5577622Michael LeMayOmid FatemiehCarl A. GunterPolicyMorph: interactive policy transformations for a logical attribute-based access control framework.SACMAT205-2142007Conference and Workshop Papersclosedconf/sacmat/LeMayFG0710.1145/1266840.1266874https://doi.org/10.1145/1266840.1266874https://dblp.org/rec/conf/sacmat/LeMayFG07URL#5577623Adam J. LeeKazuhiro MinamiMarianne WinslettLightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.SACMAT101-1102007Conference and Workshop Papersclosedconf/sacmat/LeeMW0710.1145/1266840.1266856https://doi.org/10.1145/1266840.1266856https://dblp.org/rec/conf/sacmat/LeeMW07URL#5577624Dan Lin 0001Prathima RaoElisa BertinoJorge Lobo 0001An approach to evaluate policy similarity.SACMAT1-102007Conference and Workshop Papersclosedconf/sacmat/LinRBL0710.1145/1266840.1266842https://doi.org/10.1145/1266840.1266842https://dblp.org/rec/conf/sacmat/LinRBL07URL#5577625Wissam MallouliJean-Marie OrsetAna R. CavalliNora Cuppens-BoulahiaFrédéric CuppensA formal approach for testing security rules.SACMAT127-1322007Conference and Workshop Papersclosedconf/sacmat/MallouliOCCC0710.1145/1266840.1266860https://doi.org/10.1145/1266840.1266860https://dblp.org/rec/conf/sacmat/MallouliOCCC07URL#5577626Qun NiAlberto TrombettaElisa BertinoJorge Lobo 0001Privacy-aware role based access control.SACMAT41-502007Conference and Workshop Papersclosedconf/sacmat/NiTBL0710.1145/1266840.1266848https://doi.org/10.1145/1266840.1266848https://dblp.org/rec/conf/sacmat/NiTBL07URL#5577627Alex RoichmanEhud GudesFine-grained access control to web databases.SACMAT31-402007Conference and Workshop Papersclosedconf/sacmat/RoichmanG0710.1145/1266840.1266846https://doi.org/10.1145/1266840.1266846https://dblp.org/rec/conf/sacmat/RoichmanG07URL#5577628Alfredo De SantisAnna Lisa FerraraBarbara MasucciNew constructions for provably-secure time-bound hierarchical key assignment schemes.SACMAT133-1382007Conference and Workshop Papersclosedconf/sacmat/SantisFM0710.1145/1266840.1266861https://doi.org/10.1145/1266840.1266861https://dblp.org/rec/conf/sacmat/SantisFM07URL#5577629Anna Cinzia SquicciariniAyça Azgin HintogluElisa BertinoYücel SayginA privacy preserving assertion based policy language for federation systems.SACMAT51-602007Conference and Workshop Papersclosedconf/sacmat/SquicciariniHBS0710.1145/1266840.1266849https://doi.org/10.1145/1266840.1266849https://dblp.org/rec/conf/sacmat/SquicciariniHBS07URL#5577630Jaideep VaidyaVijayalakshmi AtluriQi GuoThe role mining problem: finding a minimal descriptive set of roles.SACMAT175-1842007Conference and Workshop Papersclosedconf/sacmat/VaidyaAG0710.1145/1266840.1266870https://doi.org/10.1145/1266840.1266870https://dblp.org/rec/conf/sacmat/VaidyaAG07URL#5577631He Wang 0020Sylvia L. OsbornDiscretionary access control with the administrative role graph model.SACMAT151-1562007Conference and Workshop Papersclosedconf/sacmat/WangO0710.1145/1266840.1266865https://doi.org/10.1145/1266840.1266865https://dblp.org/rec/conf/sacmat/WangO07URL#5577632Janice WarnerVijayalakshmi AtluriRavi MukkamalaJaideep VaidyaUsing semantics for automatic enforcement of access control policies among dynamic coalitions.SACMAT235-2442007Conference and Workshop Papersclosedconf/sacmat/WarnerAMV0710.1145/1266840.1266877https://doi.org/10.1145/1266840.1266877https://dblp.org/rec/conf/sacmat/WarnerAMV07URL#5577633Min XuXuxian JiangRavi S. SandhuXinwen ZhangTowards a VMM-based usage control framework for OS kernel integrity protection.SACMAT71-802007Conference and Workshop Papersclosedconf/sacmat/XuJSZ0710.1145/1266840.1266852https://doi.org/10.1145/1266840.1266852https://dblp.org/rec/conf/sacmat/XuJSZ07URL#5577634Bin Zhang 0007Ehab Al-ShaerRadha JagadeesanJames RielyCorin PitcherSpecifications of a high-level conflict-free firewall policy language for multi-domain networks.SACMAT185-1942007Conference and Workshop Papersclosedconf/sacmat/ZhangAJRP0710.1145/1266840.1266871https://doi.org/10.1145/1266840.1266871https://dblp.org/rec/conf/sacmat/ZhangAJRP07URL#5577635Dana ZhangKotagiri RamamohanaraoTim EbringerRole engineering using graph optimisation.SACMAT139-1442007Conference and Workshop Papersclosedconf/sacmat/ZhangRE0710.1145/1266840.1266862https://doi.org/10.1145/1266840.1266862https://dblp.org/rec/conf/sacmat/ZhangRE07URL#5577636Volkmar LotzBhavani Thuraisingham12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, ProceedingsSACMATACM2007Editorshipconf/sacmat/200710.1145/1266840https://doi.org/10.1145/1266840https://dblp.org/rec/conf/sacmat/2007URL#5598904