Abstract is missing.
- New access models for healthcareTyrone Grandison. 1-2 [doi]
- A model of triangulating environments for policy authoringKathi Fisler, Shriram Krishnamurthi. 3-12 [doi]
- Towards analyzing complex operating system access control configurationsHong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao. 13-22 [doi]
- Monitoring security policies with metric first-order temporal logicDavid A. Basin, Felix Klaedtke, Samuel Müller. 23-34 [doi]
- On the definition of role miningMario Frank, Joachim M. Buhmann, David A. Basin. 35-44 [doi]
- Mining roles with noisy dataIan Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens. 45-54 [doi]
- StateMiner: an efficient similarity-based approach for optimal mining of role hierarchyHassan Takabi, James B. D. Joshi. 55-64 [doi]
- Role mining based on weightsXiaopu Ma, Ruixuan Li, Zhengding Lu. 65-74 [doi]
- Access control in practice: pain pointsMahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram. 75-76 [doi]
- Automated management of network access control from design to enforcementEhab Al-Shaer. 77 [doi]
- Role-based access control (RBAC) in Java via proxy objects using annotationsJeff Zarnett, Mahesh V. Tripunitara, Patrick Lam. 79-88 [doi]
- Role updating for assignmentsJinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu. 89-98 [doi]
- Enforcing spatial constraints for mobile RBAC systemsMichael S. Kirkpatrick, Elisa Bertino. 99-108 [doi]
- Capability-based delegation model in RBACKoji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita. 109-118 [doi]
- A card requirements language enabling privacy-preserving access controlJan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer. 119-128 [doi]
- Modular context-aware access control for medical sensor networksOscar García Morchon, Klaus Wehrle. 129-138 [doi]
- Privacy-preserving trust verificationJaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam. 139-148 [doi]
- Personalizing access control by generalizing access controlSteve Barker. 149-158 [doi]
- Solving the access-control puzzle: finding the pieces and putting them togetherLujo Bauer, Adam J. Lee. 159-160 [doi]
- Architectures for practical securityVirgil D. Gligor. 161-162 [doi]
- An architecture for enforcing end-to-end access control over web applicationsBoniface Hicks, Sandra Rueda, Dave King 0002, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick McDaniel, Trent Jaeger. 163-172 [doi]
- Access control policy translation and verification within heterogeneous data federationsGregory Leighton, Denilson Barbosa. 173-182 [doi]
- Data protection models for service provisioning in the cloudDan Lin, Anna Cinzia Squicciarini. 183-192 [doi]
- An access control model for mobile physical objectsFlorian Kerschbaum. 193-202 [doi]