Paper 1 |
Title |
Role-Based Access Control (RBAC) in Java via Proxy Objects using Annotations |
Authors |
Jeff Zarnett, Mahesh Tripunitara, and Patrick Lam |
Paper 2 |
Title |
An Access Control Model for Mobile Physical Objects |
Authors |
Florian Kerschbaum |
Paper 3 |
Title |
Towards Analyzing Complex Operating System Access Control Configurations |
Authors |
Hong Chen, Ninghui Li, Christopher S. Gates, and Ziqing Mao |
Paper 4 |
Title |
Role Mining Based on Weights |
Authors |
Xiaopu Ma, Ruixuan Li, and Zhengding Lu |
Paper 5 |
Title |
A Model of Triangulating Environments for Policy Authoring |
Authors |
Kathi Fisler and Shriram Krishnamurthi |
Paper 6 |
Title |
Data Protection Models for Service Provisioning in the Cloud |
Authors |
Dan Lin and Anna Squicciarini |
Paper 7 |
Title |
Modular Context-Aware Access Control for Medical Sensor Networks |
Authors |
Oscar Garcia Morchon and Klaus Wehrle |
Paper 8 |
Title |
Enforcing Spatial Contraints for Mobile RBAC Systems |
Authors |
Michael Kirkpatrick and Elisa Bertino |
Paper 9 |
Title |
On the Definition of Role Mining |
Authors |
Mario Frank, Joachim M. Buhmann, and David Basin |
Paper 10 |
Title |
Role Updating for Assignments |
Authors |
Jinwei Hu, Yan Zhang, Ruixuan Li, and Zhengding Lu |
Paper 11 |
Title |
Personalizing Access Control by Generalizing Access Control |
Authors |
Steve Barker |
Paper 12 |
Title |
Mining Roles with Noisy Data |
Authors |
Ian Molloy, Ninghui Li, Jorge Lobo, Yuan (Alan) Qi, and Luke Dickens |
Paper 13 |
Title |
Monitoring Security Policies with Metric First-order Temporal Logic |
Authors |
David Basin, Felix Klaedtke, and Samuel Muller |
Paper 14 |
Title |
CARL: A Language Enabling Privacy-Preserving Access Control |
Authors |
Franz-Stefan Preiss, Jan Camenisch, Sebastian Modersheim, Gregory Neven, and Dieter Sommer |
Paper 15 |
Title |
StateMiner: An Efficient Similarity-Based Approach for Optimal Mining of Role Hierarchy |
Authors |
Hassan Takabi and James Joshi |
Paper 16 |
Title |
Privacy-preserving Trust Verification |
Authors |
Jaideep Vaidya, Vijay Atluri, Basit Shafiq, and Nabil Adam |
Paper 17 |
Title |
Capability-Based Delegation Model in RBAC |
Authors |
Koji Hasebe, Mitsuhiro Mabuchi, and Akira Matsushita |
Paper 18 |
Title |
An Architecture for Enforcing End-to-End Access Control Over Web Applications |
Authors |
Sandra Rueda, Boniface Hicks, Yogesh Sreenivasan, Dave King, Joshua Schiffman, Thomas Moyer, Trent Jaeger, and Patrick McDaniel |
Paper 19 |
Title |
Access Control Policy Translation and Verification within Heterogeneous Data Federations |
Authors |
Greg Leighton and Denilson Barbosa |