Paper 1 |
Title |
Working Set-Based Access Control for Network File Systems |
Authors |
Stephen Smaldone, Vinod Ganapathy and Liviu Iftode |
Paper 2 |
Title |
A Decision Support System for Secure Information Sharing |
Authors |
Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel and John Yesberg |
Paper 3 |
Title |
xDomain: Cross-border Proofs of Access |
Authors |
Lujo Bauer, Limin Jia, Mike Reiter and David Swasey |
Paper 4 |
Title |
Towards Formal Security Analysis of GTRBAC using Timed Automata |
Authors |
Samrat Mondal, Shamik Sural and Vijayalakshmi Atluri
|
Paper 5 |
Title |
Towards a Dynamic and Composite Model of Trust |
Authors |
Adam J. Lee and Ting Yu |
Paper 6 |
Title |
A Formal Framework to Elicit Roles with Business Meaning in RBAC Systems |
Authors |
Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello and Nino Vincenzo Verde. |
Paper 7 |
Title |
An Algebra for Fine-Grained Integration of XACML Policies |
Authors |
Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li and Jorge Lobo |
Paper 8 |
Title |
Formal Models for Group-Centric Secure Information Sharing |
Authors |
Ram Krishnan, Ravi Sandhu, Jianwei Niu and William Winsborough |
Paper 9 |
Title |
Evaluating Role Mining Algorithms |
Authors |
Ian Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao and Qihua Wang |
Paper 10 |
Title |
Access Control Policy Combination: Theory Meets Practice |
Authors |
Ninghui Li, Qihua Wang, Wahbeh Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo and Dan Lin |
Paper 11 |
Title |
Trojan Horse Resistant Discretionay Access Control |
Authors |
Ziqing Mao, Ninghui Li, Hong Chen and Xuxian Jiang |
Paper 12 |
Title |
An Efficient Framework for User Authorization Query in RBAC Systems |
Authors |
Guneshi Wickramaarachchi, Wahbeh Qardaji and Ninghui Li |
Paper 13 |
Title |
The Next 700 Access Control Models or a Unifying Meta-Model? |
Authors |
Steve Barker |
Paper 14 |
Title |
Efficient Access Enforcement in Distributed Role-Based Access Control (RBAC) Deployments |
Authors |
Mahesh Tripunitara and Bogdan Carbunar |
Paper 15 |
Title |
A semantic web based framework for social network |
Authors |
Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu and Bhavani Thuraisingham |
Paper 16 |
Title |
Extending Access Control Models with Break-glass |
Authors |
Achim D. Brucker and Helmut Petritsch |
Paper 17 |
Title |
Symbolic Policy Analysis for Parameterized Administrative Role Based Access Control |
Authors |
Scott Stoller, Ping Yang, Mikhail I. Gofman and C. R. Ramakrishnan |
Paper 18 |
Title |
Analysis of Virtual Machine System Policies |
Authors |
Sandra Rueda, Hayawardh Vijayakumar and Trent Jaeger |
Paper 19 |
Title |
Automating Role-based Provisioning by Learning from Examples |
Authors |
Qun Ni, Jorge Lobo, Seraphin Calo, Pankaj Rohatgi and Elisa Bertino |
Paper 20 |
Title |
Supporting RBAC with XACML+OWL |
Authors |
Rodolfo Ferrini and Elisa Bertino |
Paper 21 |
Title |
Safety in Discretionary Access Control for Logic-based Publish-subscribe Systems |
Authors |
Kazuhiro Minami, Nikita Borisov and Carl Gunter |
Paper 22 |
Title |
Patient-centric Authorization Framework for Sharing Electronic Health Records |
Authors |
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen Zhang |
Paper 23 |
Title |
Dynamic Mandatory Access Control for Multiple Stakeholders |
Authors |
Vikhyath Rao and Trent Jaeger |
Paper 24 |
Title |
Ensuring Spatio-Temporal Access Control for Real-World Applications |
Authors |
Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg and Behzad Bordbar |