Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2008.bht:"
@inproceedings{DBLP:conf/sacmat/AlamZNAS08, author = {Masoom Alam and Xinwen Zhang and Mohammad Nauman and Tamleek Ali and Jean{-}Pierre Seifert}, editor = {Indrakshi Ray and Ninghui Li}, title = {Model-based behavioral attestation}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {175--184}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377864}, doi = {10.1145/1377836.1377864}, timestamp = {Tue, 06 Nov 2018 16:57:59 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AlamZNAS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Atluri08, author = {Vijay Atluri}, editor = {Indrakshi Ray and Ninghui Li}, title = {Panel on role engineering}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {61--62}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377846}, doi = {10.1145/1377836.1377846}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/Atluri08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Barker08, author = {Steve Barker}, editor = {Indrakshi Ray and Ninghui Li}, title = {Access control by action control}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {143--152}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377858}, doi = {10.1145/1377836.1377858}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Barker08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BauerGR08, author = {Lujo Bauer and Scott Garriss and Michael K. Reiter}, editor = {Indrakshi Ray and Ninghui Li}, title = {Detecting and resolving policy misconfigurations in access-control systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {185--194}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377866}, doi = {10.1145/1377836.1377866}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BauerGR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CramptonK08, author = {Jason Crampton and Hemanth Khambhammettu}, editor = {Indrakshi Ray and Ninghui Li}, title = {Delegation and satisfiability in workflow systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {31--40}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377842}, doi = {10.1145/1377836.1377842}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CramptonK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/DekkerCE08, author = {M. A. C. Dekker and Jason Crampton and Sandro Etalle}, editor = {Indrakshi Ray and Ninghui Li}, title = {{RBAC} administration in distributed systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {93--102}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377852}, doi = {10.1145/1377836.1377852}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/DekkerCE08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/EneHMRST08, author = {Alina Ene and William G. Horne and Nikola Milosavljevic and Prasad Rao and Robert Schreiber and Robert Endre Tarjan}, editor = {Indrakshi Ray and Ninghui Li}, title = {Fast exact and heuristic methods for role minimization problems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {1--10}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377838}, doi = {10.1145/1377836.1377838}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/EneHMRST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FerraioloA08, author = {David F. Ferraiolo and Vijay Atluri}, editor = {Indrakshi Ray and Ninghui Li}, title = {A meta model for access control: why is it needed and is it even possible to achieve?}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {153--154}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377860}, doi = {10.1145/1377836.1377860}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/FerraioloA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/FininJKNSWT08, author = {Timothy W. Finin and Anupam Joshi and Lalana Kagal and Jianwei Niu and Ravi S. Sandhu and William H. Winsborough and Bhavani Thuraisingham}, editor = {Indrakshi Ray and Ninghui Li}, title = {R\emph{OWL}BAC: representing role based access control in \emph{OWL}}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {73--82}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377849}, doi = {10.1145/1377836.1377849}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/FininJKNSWT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HuA08, author = {Hongxin Hu and Gail{-}Joon Ahn}, editor = {Indrakshi Ray and Ninghui Li}, title = {Enabling verification and conformance testing for access control model}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {195--204}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377867}, doi = {10.1145/1377836.1377867}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HuA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/IrwinYW08, author = {Keith Irwin and Ting Yu and William H. Winsborough}, editor = {Indrakshi Ray and Ninghui Li}, title = {Enforcing security properties in task-based systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {41--50}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377843}, doi = {10.1145/1377836.1377843}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/IrwinYW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KattZBHS08, author = {Basel Katt and Xinwen Zhang and Ruth Breu and Michael Hafner and Jean{-}Pierre Seifert}, editor = {Indrakshi Ray and Ninghui Li}, title = {A general obligation model and continuity: enhanced policy enforcement engine for usage control}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {123--132}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377856}, doi = {10.1145/1377836.1377856}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KattZBHS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/KulkarniT08, author = {Devdatta Kulkarni and Anand Tripathi}, editor = {Indrakshi Ray and Ninghui Li}, title = {Context-aware role-based access control in pervasive computing systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {113--122}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377854}, doi = {10.1145/1377836.1377854}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/KulkarniT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LinRBLL08, author = {Dan Lin and Prathima Rao and Elisa Bertino and Ninghui Li and Jorge Lobo}, editor = {Indrakshi Ray and Ninghui Li}, title = {Policy decomposition for collaborative access control}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {103--112}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377853}, doi = {10.1145/1377836.1377853}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/LinRBLL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MolloyCLWLBCL08, author = {Ian M. Molloy and Hong Chen and Tiancheng Li and Qihua Wang and Ninghui Li and Elisa Bertino and Seraphin B. Calo and Jorge Lobo}, editor = {Indrakshi Ray and Ninghui Li}, title = {Mining roles with semantic meanings}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {21--30}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377840}, doi = {10.1145/1377836.1377840}, timestamp = {Wed, 02 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MolloyCLWLBCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MuthukumaranSSJJ08, author = {Divya Muthukumaran and Anuj Sawani and Joshua Schiffman and Brian M. Jung and Trent Jaeger}, editor = {Indrakshi Ray and Ninghui Li}, title = {Measuring integrity on mobile phone systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {155--164}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377862}, doi = {10.1145/1377836.1377862}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/MuthukumaranSSJJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/NiBL08, author = {Qun Ni and Elisa Bertino and Jorge Lobo}, editor = {Indrakshi Ray and Ninghui Li}, title = {An obligation model bridging access control policies and privacy policies}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {133--142}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377857}, doi = {10.1145/1377836.1377857}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/NiBL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/VaidyaAGA08, author = {Jaideep Vaidya and Vijayalakshmi Atluri and Qi Guo and Nabil R. Adam}, editor = {Indrakshi Ray and Ninghui Li}, title = {Migrating to optimal {RBAC} with minimal perturbation}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {11--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377839}, doi = {10.1145/1377836.1377839}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/VaidyaAGA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WeiCBR08, author = {Qiang Wei and Jason Crampton and Konstantin Beznosov and Matei Ripeanu}, editor = {Indrakshi Ray and Ninghui Li}, title = {Authorization recycling in {RBAC} systems}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {63--72}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377848}, doi = {10.1145/1377836.1377848}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/WeiCBR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WolterSM08, author = {Christian Wolter and Andreas Schaad and Christoph Meinel}, editor = {Indrakshi Ray and Ninghui Li}, title = {Task-based entailment constraints for basic workflow patterns}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {51--60}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377844}, doi = {10.1145/1377836.1377844}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/WolterSM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XuSA08, author = {Wenjuan Xu and Mohamed Shehab and Gail{-}Joon Ahn}, editor = {Indrakshi Ray and Ninghui Li}, title = {Visualization based policy analysis: case study in SELinux}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {165--174}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377863}, doi = {10.1145/1377836.1377863}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/XuSA08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangJ08, author = {Yue Zhang and James B. D. Joshi}, editor = {Indrakshi Ray and Ninghui Li}, title = {{UAQ:} a framework for user authorization query processing in {RBAC} extended with hybrid hierarchy and constraints}, booktitle = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, pages = {83--92}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836.1377850}, doi = {10.1145/1377836.1377850}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2008, editor = {Indrakshi Ray and Ninghui Li}, title = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT} 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1377836}, doi = {10.1145/1377836}, isbn = {978-1-60558-129-3}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.