


default search action
SACMAT 2013: Amsterdam, The Netherlands
- Mauro Conti, Jaideep Vaidya, Andreas Schaad:

18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013. ACM 2013, ISBN 978-1-4503-1950-8
Keynote address
- Ahmad-Reza Sadeghi:

Mobile security and privacy: the quest for the mighty access control. 1-2
Privacy & compliance
- Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne

, Jared Bennatt, Anupam Datta, Limin Jia
, William H. Winsborough:
Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. 3-14 - Andrew K. Adams, Adam J. Lee

:
Combining social authentication and untrusted clouds for private location sharing. 15-24 - Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu:

Private data warehouse queries. 25-36
Policy management & enforcement
- Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz

, Bradley A. Malin
:
Evolving role definitions through permission invocation patterns. 37-48 - Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken:

Ensuring continuous compliance through reconciling policy with usage. 49-60 - Alireza Sharifi, Mahesh V. Tripunitara:

Least-restrictive enforcement of the Chinese wall security policy. 61-72 - Jason Crampton, Gregory Z. Gutin:

Constraint expressions and workflow satisfiability. 73-84
Panel
- Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri

:
Panel on granularity in access control. 85-86
Keynote address
- Florian Kerschbaum:

Searching over encrypted data in cloud systems. 87-88
Systems & information flow
- Xing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble:

Information flow control for stream processing in clouds. 89-100 - Dennis G. Kafura, Denis Gracanin

:
An information flow control meta-model. 101-112 - Manogna Thimma, Tsam Kai Tsui, Bo Luo

:
HyXAC: a hybrid approach for XML access control. 113-124 - Piero A. Bonatti

, Clemente Galdi
, Davide Torres:
ERBAC: event-driven RBAC. 125-136
Policy analysis
- Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:

Heuristic safety analysis of access control models. 137-148 - Jayalakshmi Balasubramaniam, Philip W. L. Fong:

A white-box policy analysis and its efficient implementation. 149-160 - Marco Guarnieri

, Mario Arrigoni Neri, Eros Magri, Simone Mutti:
On the notion of redundancy in access control policies. 161-172 - Ramadan Abdunabi, Indrakshi Ray, Robert B. France:

Specification and analysis of access control policies for mobile applications. 173-184
Demo session I
- Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken:

A bigData platform for analytics on access control policies and logs. 185-188 - Nicholas L. Farnan, Adam J. Lee

, Panos K. Chrysanthis
, Ting Yu:
Enabling intensional access control via preference-aware query optimization. 189-192 - Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu:

RMiner: a tool set for role mining. 193-196 - Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss:

Secure benchmarking in the cloud. 197-200
Applications
- Dominik Leibenger, Christoph Sorge:

A storage-efficient cryptography-based access control solution for subversion. 201-212 - Nathalie Baracaldo

, James Joshi:
Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. 213-224 - Alireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara:

Property-testing real-world authorization systems. 225-236 - Jens Köhler, Jens Mittag, Hannes Hartenstein:

User-centric management of distributed credential repositories: balancing availability and vulnerability. 237-248
Demo session II
- Bruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura:

A versatile access control implementation: secure box. 249-252 - Detlef Sturm, Axel Kern:

Permission path analysis based on access intelligence. 253-256 - Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi:

Sticky policies for mobile devices. 257-260 - Alessandro Armando

, Matteo Grasso, Sander Oudkerk, Silvio Ranise
, Konrad S. Wrona
:
Content-based information protection and release in NATO operations. 261-264

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














