Abstract is missing.
- The role-based access control system of a European bank: a case study and discussionAndreas Schaad, Jonathan D. Moffett, Jeremy Jacob. 3-9 [doi]
- Securing context-aware applications using environment rolesMichael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd. 10-20 [doi]
- Flexible team-based access control using contextsChristos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas. 21-27 [doi]
- Security verification of programs with stack inspectionNaoya Nitta, Hiroyuki Seki, Yoshiaki Takata. 31-40 [doi]
- A logical framework for reasoning about access control modelsElisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca. 41-52 [doi]
- Panel: The next generation of acess control models (panel session): do we need them and what should they be?Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr. 53 [doi]
- On specifying security policies for web documents with an XML-based languageElisa Bertino, Silvana Castano, Elena Ferrari. 57-65 [doi]
- Access control mechanisms for inter-organizational workflowMyong H. Kang, Joon S. Park, Judith N. Froscher. 66-74 [doi]
- The YGuard access control model: set-based access controlTy van den Akker, Quinn Snell, Mark J. Clement. 75-84 [doi]
- Improving the granularity of access control in Windows NTMichael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth. 87-96 [doi]
- Modular authorizationHorst Wedde, Mario Lischka. 97-105 [doi]
- A graphical definition of authorization schema in the DTAC modelJonathon Tidswell, John Potter. 109-120 [doi]
- On the specification and evolution of access control policiesManuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce. 121-130 [doi]
- Panel: which access control technique will provide the greatest overall benefit-AbstractTimothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson. 141 [doi]
- An argument for the role-based access control modelDavid F. Ferraiolo. 142-143 [doi]
- Position paperMikel L. Matthews. 144 [doi]
- They want froot loops why industry will continue to deliver multi-level securityCasey Schaufler. 145-146 [doi]
- Which operating system access control technique will provide the greatest overall benefit to users?Stephen Smalley. 147-148 [doi]
- Statement for SACMAT 2001 panelRobert Watson. 149 [doi]
- A rule-based framework for role based delegationLonghua Zhang, Gail-Joon Ahn, Bei-tseng Chu. 153-162 [doi]
- A model of OASIS role-based access control and its support for active securityWalt Yao, Ken Moody, Jean Bacon. 171-181 [doi]