Abstract is missing.
- Integrity constraints in trust managementSandro Etalle, William H. Winsborough. 1-10 [doi]
- Composing and combining policies under the policy machineDavid F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn. 11-20 [doi]
- Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructureAndreas Matheus. 21-28 [doi]
- GEO-RBAC: a spatially aware RBACElisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca. 29-37 [doi]
- A reference monitor for workflow systems with constrained task executionJason Crampton. 38-47 [doi]
- Future direction of access control models, architectures, and technologiesKonstantin Beznosov. 48 [doi]
- Supporting conditional delegation in secure workflow management systemsVijayalakshmi Atluri, Janice Warner. 49-58 [doi]
- A fine-grained, controllable, user-to-user delegation method in RBACJacques Wainer, Akhil Kumar. 59-66 [doi]
- AC-XML documents: improving the performance of a web access control moduleBarbara Carminati, Elena Ferrari. 67-76 [doi]
- Generalized XML security viewsGabriel M. Kuper, Fabio Massacci, Nataliya Rassadko. 77-84 [doi]
- Relevancy based access control of versioned XML documentsMizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse. 85-94 [doi]
- Provable bounds for portable and flexible privacy-preserving accessMarina Blanton, Mikhail J. Atallah. 95-101 [doi]
- Purpose based access control of complex data for privacy protectionJi-Won Byun, Elisa Bertino, Ninghui Li. 102-110 [doi]
- Context sensitive access controlR. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma. 111-119 [doi]
- Verifiable composition of access control and application featuresEunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander. 120-129 [doi]
- Rule support for role-based access controlAxel Kern, Claudia Walhorn. 130-138 [doi]
- Adaptive trust negotiation and access controlTatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons. 139-146 [doi]
- Peer-to-peer access control architecture using trusted computing technologyRavi S. Sandhu, Xinwen Zhang. 147-158 [doi]
- SERAT: SEcure role mApping technique for decentralized secure interoperabilityMohamed Shehab, Elisa Bertino, Arif Ghafoor. 159-167 [doi]
- Role mining with ORCAJürgen Schlegelmilch, Ulrike Steffens. 168-176 [doi]