Abstract is missing.
- Access control, confidentiality and privacy for video surveillance databasesBhavani M. Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan. 1-10 [doi]
- Key management for non-tree access hierarchiesMikhail J. Atallah, Marina Blanton, Keith B. Frikken. 11-18 [doi]
- PRIMA: policy-reduced integrity measurement architectureTrent Jaeger, Reiner Sailer, Umesh Shankar. 19-28 [doi]
- On classifying access control implementations for distributed systemsKevin Kane, James C. Browne. 29-38 [doi]
- Traust: a trust negotiation-based authorization service for open systemsAdam J. Lee, Marianne Winslett, Jim Basney, Von Welch. 39-48 [doi]
- TrustBAC: integrating trust relationships into the RBAC model for access control in open systemsSudip Chakraborty, Indrajit Ray. 49-58 [doi]
- Integrating presence inference into trust management for ubiquitous systemsJun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki. 59-68 [doi]
- Security in enterprise resource planning systems and service-oriented architecturesAndreas Schaad. 69-70 [doi]
- Trust management with delegation in grouped peer-to-peer communitiesAjay Ravichandran, Jongpil Yoon. 71-80 [doi]
- Fine-grained role-based delegation in presence of the hybrid role hierarchyJames B. D. Joshi, Elisa Bertino. 81-90 [doi]
- Delegation in the role graph modelHe Wang, Sylvia L. Osborn. 91-100 [doi]
- Systematic control and management of data integrityJi-Won Byun, Yonglak Sohn, Elisa Bertino. 101-110 [doi]
- The secondary and approximate authorization model and its application to Bell-LaPadula policiesJason Crampton, Wing Leung, Konstantin Beznosov. 111-120 [doi]
- Secure resource description framework: an access control modelAmit Jain, Csilla Farkas. 121-129 [doi]
- Constraint generation for separation of dutyHong Chen, Ninghui Li. 130-138 [doi]
- A model-checking approach to analysing organisational controls in a loan origination processAndreas Schaad, Volkmar Lotz, Karsten Sohr. 139-149 [doi]
- Information flow property preserving transformation of UML interaction diagramsFredrik Seehusen, Ketil Stølen. 150-159 [doi]
- Towards reasonability properties for access-control policy languagesMichael Carl Tschantz, Shriram Krishnamurthi. 160-169 [doi]
- Data-centric security: role analysis and role typestatesVugranam C. Sreedhar. 170-179 [doi]
- A usage-based authorization framework for collaborative computing systemsXinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu. 180-189 [doi]
- Inter-instance authorization constraints for secure workflow managementJanice Warner, Vijayalakshmi Atluri. 190-199 [doi]
- Role-based access management for ad-hoc collaborative sharingJing Jin, Gail-Joon Ahn. 200-209 [doi]
- Redirection policies for mission-based information sharingDavid Keppler, Vipin Swarup, Sushil Jajodia. 210-218 [doi]
- XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!Pietro Mazzoleni, Elisa Bertino, Bruno Crispo. 219-227 [doi]
- Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchySiqing Du, James B. D. Joshi. 228-236 [doi]
- Semantic access control for information interoperationChi-Chun Pan, Prasenjit Mitra, Peng Liu. 237-246 [doi]