Search dblp for Publications

export results for "toc:db/conf/sacmat/sacmat2008.bht:"

 download as .bib file

@inproceedings{DBLP:conf/sacmat/AlamZNAS08,
  author       = {Masoom Alam and
                  Xinwen Zhang and
                  Mohammad Nauman and
                  Tamleek Ali and
                  Jean{-}Pierre Seifert},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Model-based behavioral attestation},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {175--184},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377864},
  doi          = {10.1145/1377836.1377864},
  timestamp    = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/AlamZNAS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Atluri08,
  author       = {Vijay Atluri},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Panel on role engineering},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {61--62},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377846},
  doi          = {10.1145/1377836.1377846},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/Atluri08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/Barker08,
  author       = {Steve Barker},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Access control by action control},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {143--152},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377858},
  doi          = {10.1145/1377836.1377858},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/Barker08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BauerGR08,
  author       = {Lujo Bauer and
                  Scott Garriss and
                  Michael K. Reiter},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Detecting and resolving policy misconfigurations in access-control
                  systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {185--194},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377866},
  doi          = {10.1145/1377836.1377866},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/BauerGR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CramptonK08,
  author       = {Jason Crampton and
                  Hemanth Khambhammettu},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Delegation and satisfiability in workflow systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {31--40},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377842},
  doi          = {10.1145/1377836.1377842},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/CramptonK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/DekkerCE08,
  author       = {M. A. C. Dekker and
                  Jason Crampton and
                  Sandro Etalle},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {{RBAC} administration in distributed systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {93--102},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377852},
  doi          = {10.1145/1377836.1377852},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/DekkerCE08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/EneHMRST08,
  author       = {Alina Ene and
                  William G. Horne and
                  Nikola Milosavljevic and
                  Prasad Rao and
                  Robert Schreiber and
                  Robert Endre Tarjan},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Fast exact and heuristic methods for role minimization problems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {1--10},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377838},
  doi          = {10.1145/1377836.1377838},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/EneHMRST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FerraioloA08,
  author       = {David F. Ferraiolo and
                  Vijay Atluri},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {A meta model for access control: why is it needed and is it even possible
                  to achieve?},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {153--154},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377860},
  doi          = {10.1145/1377836.1377860},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/FerraioloA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/FininJKNSWT08,
  author       = {Timothy W. Finin and
                  Anupam Joshi and
                  Lalana Kagal and
                  Jianwei Niu and
                  Ravi S. Sandhu and
                  William H. Winsborough and
                  Bhavani Thuraisingham},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {R\emph{OWL}BAC: representing role based access control in \emph{OWL}},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {73--82},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377849},
  doi          = {10.1145/1377836.1377849},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/FininJKNSWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/HuA08,
  author       = {Hongxin Hu and
                  Gail{-}Joon Ahn},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Enabling verification and conformance testing for access control model},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {195--204},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377867},
  doi          = {10.1145/1377836.1377867},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/HuA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/IrwinYW08,
  author       = {Keith Irwin and
                  Ting Yu and
                  William H. Winsborough},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Enforcing security properties in task-based systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {41--50},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377843},
  doi          = {10.1145/1377836.1377843},
  timestamp    = {Mon, 04 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/IrwinYW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KattZBHS08,
  author       = {Basel Katt and
                  Xinwen Zhang and
                  Ruth Breu and
                  Michael Hafner and
                  Jean{-}Pierre Seifert},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {A general obligation model and continuity: enhanced policy enforcement
                  engine for usage control},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {123--132},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377856},
  doi          = {10.1145/1377836.1377856},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KattZBHS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/KulkarniT08,
  author       = {Devdatta Kulkarni and
                  Anand Tripathi},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Context-aware role-based access control in pervasive computing systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {113--122},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377854},
  doi          = {10.1145/1377836.1377854},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/KulkarniT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/LinRBLL08,
  author       = {Dan Lin and
                  Prathima Rao and
                  Elisa Bertino and
                  Ninghui Li and
                  Jorge Lobo},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Policy decomposition for collaborative access control},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {103--112},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377853},
  doi          = {10.1145/1377836.1377853},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/LinRBLL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MolloyCLWLBCL08,
  author       = {Ian M. Molloy and
                  Hong Chen and
                  Tiancheng Li and
                  Qihua Wang and
                  Ninghui Li and
                  Elisa Bertino and
                  Seraphin B. Calo and
                  Jorge Lobo},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Mining roles with semantic meanings},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {21--30},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377840},
  doi          = {10.1145/1377836.1377840},
  timestamp    = {Wed, 02 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/MolloyCLWLBCL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/MuthukumaranSSJJ08,
  author       = {Divya Muthukumaran and
                  Anuj Sawani and
                  Joshua Schiffman and
                  Brian M. Jung and
                  Trent Jaeger},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Measuring integrity on mobile phone systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {155--164},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377862},
  doi          = {10.1145/1377836.1377862},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/MuthukumaranSSJJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/NiBL08,
  author       = {Qun Ni and
                  Elisa Bertino and
                  Jorge Lobo},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {An obligation model bridging access control policies and privacy policies},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {133--142},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377857},
  doi          = {10.1145/1377836.1377857},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/NiBL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/VaidyaAGA08,
  author       = {Jaideep Vaidya and
                  Vijayalakshmi Atluri and
                  Qi Guo and
                  Nabil R. Adam},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Migrating to optimal {RBAC} with minimal perturbation},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {11--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377839},
  doi          = {10.1145/1377836.1377839},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/VaidyaAGA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/WeiCBR08,
  author       = {Qiang Wei and
                  Jason Crampton and
                  Konstantin Beznosov and
                  Matei Ripeanu},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Authorization recycling in {RBAC} systems},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {63--72},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377848},
  doi          = {10.1145/1377836.1377848},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/WeiCBR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/WolterSM08,
  author       = {Christian Wolter and
                  Andreas Schaad and
                  Christoph Meinel},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Task-based entailment constraints for basic workflow patterns},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {51--60},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377844},
  doi          = {10.1145/1377836.1377844},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/WolterSM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/XuSA08,
  author       = {Wenjuan Xu and
                  Mohamed Shehab and
                  Gail{-}Joon Ahn},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {Visualization based policy analysis: case study in SELinux},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {165--174},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377863},
  doi          = {10.1145/1377836.1377863},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacmat/XuSA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/ZhangJ08,
  author       = {Yue Zhang and
                  James B. D. Joshi},
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {{UAQ:} a framework for user authorization query processing in {RBAC}
                  extended with hybrid hierarchy and constraints},
  booktitle    = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  pages        = {83--92},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836.1377850},
  doi          = {10.1145/1377836.1377850},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/ZhangJ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacmat/2008,
  editor       = {Indrakshi Ray and
                  Ninghui Li},
  title        = {13th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
                  2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1377836},
  doi          = {10.1145/1377836},
  isbn         = {978-1-60558-129-3},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacmat/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics