Abstract is missing.
- A decade of model-driven securityDavid A. Basin, Manuel Clavel, Marina Egea. 1-10 [doi]
- Deriving role engineering artifacts from business processes and scenario modelsAnne Baumgrass, Mark Strembeck, Stefanie Rinderle-Ma. 11-20 [doi]
- An integrated approach for identity and access management in a SOA contextWaldemar Hummer, Patrick Gaubatz, Mark Strembeck, Uwe Zdun, Schahram Dustdar. 21-30 [doi]
- xDAuth: a scalable and lightweight framework for cross domain access control and delegationMasoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali. 31-40 [doi]
- Program synthesis in administration of higher-order permissionsGlenn Bruns, Michael Huth, Kumar Avijit. 41-50 [doi]
- Relationship-based access control policies and their policy languagesPhilip W. L. Fong, Ida Siahaan. 51-60 [doi]
- xfACL: an extensible functional language for access controlQun Ni, Elisa Bertino. 61-72 [doi]
- Rumpole: a flexible break-glass access control modelSrdjan Marinovic, Robert Craven, Jiefei Ma, Naranker Dulay. 73-82 [doi]
- SEAL: a logic programming framework for specifying and verifying access control modelsPrasad Naldurg, Raghavendra K. R.. 83-92 [doi]
- Transforming provenance using redactionTyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham. 93-102 [doi]
- Data leakage mitigation for discretionary access control in collaboration cloudsQihua Wang, Hongxia Jin. 103-112 [doi]
- Modeling data flow in socio-information networks: a risk estimation approachTing Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu. 113-122 [doi]
- An authorization scheme for version control systemsSitaram Chamarty, Hiren D. Patel, Mahesh V. Tripunitara. 123-132 [doi]
- An approach to modular and testable security models of real-world health-care applicationsAchim D. Brucker, Lukas Brügger, Paul Kearney, Burkhart Wolff. 133-142 [doi]
- Security validation tool for business processesWihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta. 143-144 [doi]
- System for automatic estimation of data sensitivity with applications to access control and other applicationsYoungja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari. 145-146 [doi]
- Visualizing security in business processesGanna Monakova, Andreas Schaad. 147-148 [doi]
- Access control for a federated police information systemMatthew Hudnall, Maury Mitchell, Allen S. Parrish. 149-150 [doi]
- Data-centric multi-layer usage control enforcement: a social network exampleEnrico Lovat, Alexander Pretschner. 151-152 [doi]
- Usable access control for allRobert W. Reeder. 153-154 [doi]
- Validation of security policies by the animation of Z specificationsYves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh. 155-164 [doi]
- Anomaly discovery and resolution in web access control policiesHongxin Hu, Gail-Joon Ahn, Ketan Kulkarni. 165-174 [doi]
- On the management of user obligationsMurillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin. 175-184 [doi]