Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2010
An access control model for mobile physical objects
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPages 193–202https://doi.org/10.1145/1809842.1809873Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects' trajectories. Existing access control models cannot encode this information efficiently. This poses a policy management ...
- research-articleJune 2010
Data protection models for service provisioning in the cloud
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPages 183–192https://doi.org/10.1145/1809842.1809872Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. While cloud computing is expanding rapidly and used by many individuals and organizations internationally, data protection issues in the ...
- research-articleJune 2010
Role-based access control (RBAC) in Java via proxy objects using annotations
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPages 79–88https://doi.org/10.1145/1809842.1809858We propose a new approach for applying Role-Based Access Control (RBAC) to methods in objects in the Java programming language. In our approach, a policy implementer (usually a developer) annotates methods, interfaces, and classes with roles. Our system ...
- research-articleJune 2010
Monitoring security policies with metric first-order temporal logic
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPages 23–34https://doi.org/10.1145/1809842.1809849We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how a wide variety of security policies can be naturally formalized in this ...
- keynoteJune 2010
Automated management of network access control from design to enforcement
SACMAT '10: Proceedings of the 15th ACM symposium on Access control models and technologiesPage 77https://doi.org/10.1145/1809842.1809844Recent studies show that more than 65% of the network vulnerabilities are due to misconfigured network access control. Arbor Networks in their ISP survey shows that managing access control is the top challenge in ISP networks today, which creates major ...