


default search action
SACMAT 2012: Newark, NJ, USA
- Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu:
17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012. ACM 2012, ISBN 978-1-4503-1295-0
Keynote address
- Ruby B. Lee:
Hardware-enhanced access control for cloud computing. 1-2
Access control for mobile devices and social networks
- Giovanni Russello, Mauro Conti
, Bruno Crispo, Earlence Fernandes:
MOSES: supporting operation modes on smartphones. 3-12 - Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy:
Android permissions: a perspective combining risks and benefits. 13-22 - Gorrell P. Cheek, Mohamed Shehab
:
Policy-by-example for online social networks. 23-32
Role mining and user obligations
- Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu:
Ensuring authorization privileges for cascading user obligations. 33-44 - Ian M. Molloy, Youngja Park, Suresh Chari:
Generative models for access control policies: applications to role mining over logs with attribution. 45-56 - Zhongyuan Xu, Scott D. Stoller:
Algorithms for mining meaningful roles. 57-66
Panel
- Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino:
Emerging trends around big data analytics and security: panel. 67-68
Keynote address
- Ravi S. Sandhu:
The authorization leap from rights to attributes: maturation or chaos? 69-70
Access control applications
- Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj:
SCUTA: a server-side access control system for web applications. 71-82 - Santiago Pina Ros, Mario Lischka, Félix Gómez Mármol
:
Graph-based XACML evaluation. 83-92 - David A. Basin, Samuel J. Burri, Günter Karjoth:
Optimal workflow-aware authorizations. 93-102 - Vassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris, Grigoris Antoniou
:
Access control for RDF graphs using abstract models. 103-112
Demo session
- Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:
A cloud-based RDF policy engine for assured information sharing. 113-116 - Suresh Chari, Jorge Lobo
, Ian M. Molloy:
Practical risk aggregation in RBAC models. 117-118 - Florian Kelbert, Alexander Pretschner:
Towards a policy enforcement infrastructure for distributed usage control. 119-122 - Achim D. Brucker
, Isabelle Hang, Gero Lückemeyer, Raj Ruparel:
SecureBPMN: modeling and enforcing access control requirements in business processes. 123-126 - Florian Kerschbaum, Leonardo Weiss Ferreira Chaves:
Encryption-enforced access control for an RFID discovery service. 127-130 - Andreas Schaad, Alexandr Garaga:
Automating architectural security analysis. 131-132
Privacy
- Mohamed Nabeel, Ning Shang, Elisa Bertino:
Efficient privacy preserving content based publish subscribe systems. 133-144 - Ting Wang, Mudhakar Srivatsa, Ling Liu:
Fine-grained access control of personal data. 145-156 - Patrik Bichsel, Jan Camenisch, Dieter Sommer:
A calculus for privacy-friendly authentication. 157-166
Role-based access control
- Nathalie Baracaldo
, James Joshi:
A trust-and-risk aware RBAC framework: tackling insider threat. 167-176 - Emre Uzun, Vijayalakshmi Atluri
, Shamik Sural
, Jaideep Vaidya, Gennaro Parlato
, Anna Lisa Ferrara, Parthasarathy Madhusudan:
Analyzing temporal role based access control models. 177-186 - Jingwei Huang
, David M. Nicol, Rakesh Bobba
, Jun Ho Huh:
A framework integrating attribute-based policies into role-based access control. 187-196
Access control policies
- Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino:
A framework for verification and optimal reconfiguration of event-driven role based access control policies. 197-208 - Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon
:
A model-based approach to automated testing of access control policies. 209-218 - Yann Le Gall, Adam J. Lee
, Apu Kapadia:
PlexC: a policy language for exposure control. 219-228

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.