Abstract is missing.
- An approach to evaluate policy similarityDan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo. 1-10 [doi]
- A posteriori compliance controlSandro Etalle, William H. Winsborough. 11-20 [doi]
- Enforcing access control over data streamsBarbara Carminati, Elena Ferrari, Kian-Lee Tan. 21-30 [doi]
- Fine-grained access control to web databasesAlex Roichman, Ehud Gudes. 31-40 [doi]
- Privacy-aware role based access controlQun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo. 41-50 [doi]
- A privacy preserving assertion based policy language for federation systemsAnna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin. 51-60 [doi]
- Distributed access control: a privacy-conscious approachBogdan Cautis. 61-70 [doi]
- Towards a VMM-based usage control framework for OS kernel integrity protectionMin Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang. 71-80 [doi]
- Managing the risk of covert information flows in virtual machine systemsTrent Jaeger, Reiner Sailer, Yogesh Sreenivasan. 81-90 [doi]
- A logical specification and analysis for SELinux MLS policyBoniface Hicks, Sandra Rueda, Luke St. Clair, Trent Jaeger, Patrick Drew McDaniel. 91-100 [doi]
- Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtreesAdam J. Lee, Kazuhiro Minami, Marianne Winslett. 101-110 [doi]
- Mesh: secure, lightweight grid middleware using existing SSH infrastructurePaul Z. Kolano. 111-120 [doi]
- Multilevel filesystems in solaris trusted extensionsGlenn Faden. 121-126 [doi]
- A formal approach for testing security rulesWissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens. 127-132 [doi]
- New constructions for provably-secure time-bound hierarchical key assignment schemesAlfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. 133-138 [doi]
- Role engineering using graph optimisationDana Zhang, Kotagiri Ramamohanarao, Tim Ebringer. 139-144 [doi]
- PEI models towards scalable, usable and high-assurance information sharingRam Krishnan, Ravi S. Sandhu, Kumar Ranganathan. 145-150 [doi]
- Discretionary access control with the administrative role graph modelHe Wang, Sylvia L. Osborn. 151-156 [doi]
- Inter-domain role mapping and least privilegeLiang Chen, Jason Crampton. 157-162 [doi]
- A note on the formalisation of UCONHelge Janicke, Antonio Cau, Hussein Zedan. 163-168 [doi]
- Formalizing XML access control for update operationsIrini Fundulaki, Sebastian Maneth. 169-174 [doi]
- The role mining problem: finding a minimal descriptive set of rolesJaideep Vaidya, Vijayalakshmi Atluri, Qi Guo. 175-184 [doi]
- Specifications of a high-level conflict-free firewall policy language for multi-domain networksBin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher. 185-194 [doi]
- Action-status access controlSteve Barker. 195-204 [doi]
- PolicyMorph: interactive policy transformations for a logical attribute-based access control frameworkMichael LeMay, Omid Fatemieh, Carl A. Gunter. 205-214 [doi]
- Towards realizing a formal RBAC model in real systemsGail-Joon Ahn, Hongxin Hu. 215-224 [doi]
- Chinese-wall process confinement for practical distributed coalitionsYasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo. 225-234 [doi]
- Using semantics for automatic enforcement of access control policies among dynamic coalitionsJanice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya. 235-244 [doi]