Abstract is missing.
- Hardware-enhanced access control for cloud computingRuby B. Lee. 1-2 [doi]
- MOSES: supporting operation modes on smartphonesGiovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes. 3-12 [doi]
- Android permissions: a perspective combining risks and benefitsBhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian Molloy. 13-22 [doi]
- Policy-by-example for online social networksGorrell P. Cheek, Mohamed Shehab. 23-32 [doi]
- Ensuring authorization privileges for cascading user obligationsOmar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu. 33-44 [doi]
- Generative models for access control policies: applications to role mining over logs with attributionIan Molloy, Youngja Park, Suresh Chari. 45-56 [doi]
- Algorithms for mining meaningful rolesZhongyuan Xu, Scott D. Stoller. 57-66 [doi]
- Emerging trends around big data analytics and security: panelRafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino. 67-68 [doi]
- The authorization leap from rights to attributes: maturation or chaos?Ravi S. Sandhu. 69-70 [doi]
- SCUTA: a server-side access control system for web applicationsXi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj. 71-82 [doi]
- Graph-based XACML evaluationSantiago Pina Ros, Mario Lischka, Félix Gómez Mármol. 83-92 [doi]
- Optimal workflow-aware authorizationsDavid A. Basin, Samuel J. Burri, Günter Karjoth. 93-102 [doi]
- Access control for RDF graphs using abstract modelsVassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris, Grigoris Antoniou. 103-112 [doi]
- A cloud-based RDF policy engine for assured information sharingTyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani M. Thuraisingham. 113-116 [doi]
- Practical risk aggregation in RBAC modelsSuresh Chari, Jorge Lobo, Ian Molloy. 117-118 [doi]
- Towards a policy enforcement infrastructure for distributed usage controlFlorian Kelbert, Alexander Pretschner. 119-122 [doi]
- SecureBPMN: modeling and enforcing access control requirements in business processesAchim D. Brucker, Isabelle Hang, Gero Lückemeyer, Raj Ruparel. 123-126 [doi]
- Encryption-enforced access control for an RFID discovery serviceFlorian Kerschbaum, Leonardo Weiss Ferreira Chaves. 127-130 [doi]
- Automating architectural security analysisAndreas Schaad, Alexandr Garaga. 131-132 [doi]
- Efficient privacy preserving content based publish subscribe systemsMohamed Nabeel, Ning Shang, Elisa Bertino. 133-144 [doi]
- Fine-grained access control of personal dataTing Wang, Mudhakar Srivatsa, Ling Liu. 145-156 [doi]
- A calculus for privacy-friendly authenticationPatrik Bichsel, Jan Camenisch, Dieter Sommer. 157-166 [doi]
- A trust-and-risk aware RBAC framework: tackling insider threatNathalie Baracaldo, James Joshi. 167-176 [doi]
- Analyzing temporal role based access control modelsEmre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Parthasarathy Madhusudan. 177-186 [doi]
- A framework integrating attribute-based policies into role-based access controlJingwei Huang, David M. Nicol, Rakesh Bobba, Jun Ho Huh. 187-196 [doi]
- A framework for verification and optimal reconfiguration of event-driven role based access control policiesBasit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino. 197-208 [doi]
- A model-based approach to automated testing of access control policiesDianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon. 209-218 [doi]
- PlexC: a policy language for exposure controlYann Le Gall, Adam J. Lee, Apu Kapadia. 219-228 [doi]