Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2014.bht:"
@inproceedings{DBLP:conf/sacmat/AhmedO14, author = {Sharmin Ahmed and Sylvia L. Osborn}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {A system for risk awareness during role mining}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {181--184}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613095}, doi = {10.1145/2613087.2613095}, timestamp = {Wed, 02 Jun 2021 09:13:31 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AhmedO14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ArmandoCCR14, author = {Alessandro Armando and Roberto Carbone and Eyasu Getahun Chekole and Silvio Ranise}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Attribute based access control for APIs in spring security}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {85--88}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613109}, doi = {10.1145/2613087.2613109}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ArmandoCCR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BauerK14, author = {Lujo Bauer and Florian Kerschbaum}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {127--128}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613090}, doi = {10.1145/2613087.2613090}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BauerK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BloomS14, author = {Gedare Bloom and Rahul Simha}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Hardware-enhanced distributed access enforcement for role-based access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {5--16}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613096}, doi = {10.1145/2613087.2613096}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BloomS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Clement14, author = {Andrew Clement}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Re-thinking networked privacy, security, identity and access control in our surveillance states}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {185--186}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613089}, doi = {10.1145/2613087.2613089}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Clement14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonS14, author = {Jason Crampton and James Sellwood}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Path conditions and principal matching: a new approach to access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {187--198}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613094}, doi = {10.1145/2613087.2613094}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GanselSGFDRM14, author = {Simon Gansel and Stephan Schnitzer and Ahmad Gilbeau{-}Hammoud and Viktor Friesen and Frank D{\"{u}}rr and Kurt Rothermel and Christian Maih{\"{o}}fer}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {An access control concept for novel automotive {HMI} systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {17--28}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613104}, doi = {10.1145/2613087.2613104}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/GanselSGFDRM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GarrisonLH14, author = {William C. Garrison III and Adam J. Lee and Timothy L. Hinrichs}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {An actor-based, application-aware access control evaluation framework}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {199--210}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613099}, doi = {10.1145/2613087.2613099}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/GarrisonLH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuriKCE14, author = {Mordechai Guri and Gabi Kedma and Buky Carmeli and Yuval Elovici}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Limiting access to unintentionally leaked sensitive documents using malware signatures}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {129--140}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613103}, doi = {10.1145/2613087.2613103}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/GuriKCE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HuAZY14, author = {Hongxin Hu and Gail{-}Joon Ahn and Ziming Zhao and Dejun Yang}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Game theoretic analysis of multiparty access control in online social networks}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {93--102}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613097}, doi = {10.1145/2613087.2613097}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HuAZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Juels14, author = {Ari Juels}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {A bodyguard of lies: the use of honey objects in information security}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {1--4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613088}, doi = {10.1145/2613087.2613088}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Juels14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KuijperE14, author = {Wouter Kuijper and Victor Ermolaev}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Sorting out role based access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {63--74}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613101}, doi = {10.1145/2613087.2613101}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KuijperE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeitnerR14, author = {Maria Leitner and Stefanie Rinderle{-}Ma}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Anomaly detection and visualization in generative {RBAC} models}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {41--52}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613105}, doi = {10.1145/2613087.2613105}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LeitnerR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MorissetZ14, author = {Charles Morisset and Nicola Zannone}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Reduction of access control decisions}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {53--62}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613106}, doi = {10.1145/2613087.2613106}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/MorissetZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RachapalliKKT14, author = {Jyothsna Rachapalli and Vaibhav Khadilkar and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Towards fine grained {RDF} access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {165--176}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613092}, doi = {10.1145/2613087.2613092}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/RachapalliKKT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RachapalliKKT14a, author = {Jyothsna Rachapalli and Vaibhav Khadilkar and Murat Kantarcioglu and Bhavani Thuraisingham}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Redaction based {RDF} access control language}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {177--180}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613108}, doi = {10.1145/2613087.2613108}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/RachapalliKKT14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/RaniseTA14, author = {Silvio Ranise and Anh Tuan Truong and Alessandro Armando}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Scalable and precise automated analysis of administrative temporal role-based access control}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {103--114}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613102}, doi = {10.1145/2613087.2613102}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/RaniseTA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SchaadBKCCG14, author = {Andreas Schaad and Anis Bkakria and Florian Kerschbaum and Fr{\'{e}}d{\'{e}}ric Cuppens and Nora Cuppens{-}Boulahia and David Gross{-}Amblard}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Optimized and controlled provisioning of encrypted outsourced data}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {141--152}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613100}, doi = {10.1145/2613087.2613100}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SchaadBKCCG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SlamanigSZ14, author = {Daniel Slamanig and Klaus Stranacher and Bernd Zwattendorfer}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {User-centric identity as a service-architecture for eIDs with selective attribute disclosure}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {153--164}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613093}, doi = {10.1145/2613087.2613093}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SlamanigSZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SzeMS14, author = {Wai{-}Kit Sze and Bhuvan Mital and R. Sekar}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Towards more usable information flow policies for contemporary operating systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {75--84}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613110}, doi = {10.1145/2613087.2613110}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SzeMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SzeS14, author = {Wai{-}Kit Sze and R. Sekar}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Comprehensive integrity protection for desktop linux}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {89--92}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613112}, doi = {10.1145/2613087.2613112}, timestamp = {Thu, 18 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/SzeS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TaleleTEJ14, author = {Nirupama Talele and Jason Teutsch and Robert F. Erbacher and Trent Jaeger}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Monitor placement for large-scale systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {29--40}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613107}, doi = {10.1145/2613087.2613107}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TaleleTEJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TarameshlooF14, author = {Ebrahim Tarameshloo and Philip W. L. Fong}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Access control models for geo-social computing systems}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {115--126}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613098}, doi = {10.1145/2613087.2613098}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TarameshlooF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VijayakumarGJ14, author = {Hayawardh Vijayakumar and Xinyang Ge and Trent Jaeger}, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {Policy models to protect resource retrieval}, booktitle = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, pages = {211--222}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087.2613111}, doi = {10.1145/2613087.2613111}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/VijayakumarGJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2014, editor = {Sylvia L. Osborn and Mahesh V. Tripunitara and Ian M. Molloy}, title = {19th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} '14, London, ON, Canada - June 25 - 27, 2014}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2613087}, doi = {10.1145/2613087}, isbn = {978-1-4503-2939-2}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.