Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001: Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
New York
ACM
2001
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VII, 182 S. graph. Darst. |
ISBN: | 1581133502 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013778039 | ||
003 | DE-604 | ||
005 | 20110331 | ||
007 | t | ||
008 | 010620s2001 d||| |||| 10||| eng d | ||
020 | |a 1581133502 |9 1-58113-350-2 | ||
035 | |a (OCoLC)47061173 | ||
035 | |a (DE-599)BVBBV013778039 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-20 |a DE-188 |a DE-11 |a DE-83 |a DE-706 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a SS 2001 |0 (DE-625)143438: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a DAT 650f |2 stub | ||
084 | |a DAT 005f |2 stub | ||
111 | 2 | |a Symposium on Access Control Models and Technologies |n 6 |d 2001 |c Chantilly, Va. |j Verfasser |0 (DE-588)10024017-3 |4 aut | |
245 | 1 | 0 | |a Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 |b Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
264 | 1 | |a New York |b ACM |c 2001 | |
300 | |a VII, 182 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Ordinateurs - Accès - Contrôle - Congrès | |
650 | 7 | |a Ordinateurs - Accès - Contrôle - Congrès |2 ram | |
650 | 4 | |a Réseaux d'ordinateurs - Congrès | |
650 | 7 | |a Systèmes informatiques - Mesures de sûreté - Congrès |2 ram | |
650 | 4 | |a Systèmes informatiques - Sécurité - Mesures - Congrès | |
650 | 7 | |a autorisation |2 inriac | |
650 | 7 | |a contrôle accès |2 inriac | |
650 | 7 | |a ressource répartie |2 inriac | |
650 | 7 | |a sécurité informatique |2 inriac | |
650 | 4 | |a Computer networks |x Access control |v Congresses | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 0 | 7 | |a Datenbank |0 (DE-588)4011119-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2001 |z Chantilly Va. |2 gnd-content | |
689 | 0 | 0 | |a Zugriffskontrolle |0 (DE-588)4293034-0 |D s |
689 | 0 | 1 | |a Datenbank |0 (DE-588)4011119-2 |D s |
689 | 0 | |5 DE-604 | |
710 | 2 | |a Association for Computing Machinery |e Sonstige |0 (DE-588)1222-1 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009418779&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009418779 |
Datensatz im Suchindex
_version_ | 1804128599793467392 |
---|---|
adam_text | Table
of
Contents
SACMAT
Committee List
...........................................................................................
vii
Session
1 :
Applications
Chair: David
Ferraiolo
(NIST)
•
The Role-Based Access Control System of a European Bank:
A Case Study and Discussion
................................................................................3
Andreas
Schaad,
Jonathan Moffett, and Jeremy Jacob (University of York)
•
Securing Context-Aware Applications Using Environment Roles
....................10
Michael J. Covington,
Wende
Long, Shvidhya Srinivasan, Anind K.
Dey, Mustaque
Ahamad,
and Gregory D. Abowd (Georgia Institute of Technology)
•
Flexible Team-Based Access Control Using Contexts
........................................21
Christas
K. Georgiadis,
loannis Mavridis, George
Pángalos
(Aristotle University of
Thessaloniki),
and Roshan K. Thomas
(ΝΑΙ
Labs)
Session
2:
Formal Analysis
Chair: Jonathan Moffett (University of York)
•
Security Verification of Programs with Stack Inspection
...................................31
Naoya Nitta, Yoshiaki Takata, and Hiroyuki
Seki (Nara
Institute of Science and Technology)
•
A Logical Framework for Reasoning about Access Control Models
................41
Elisa
Bertino,
Barbara Catania, Elena Ferrari, and Paolo Perlasca (University of
Milano)
Panel: The Next Generation of Access Control Models: Do we need them
and what should they be?
.....................................................................................53
Moderator: Ravi Sandhu (George Mason University)
Panelists:
Elisa
Bertino,
Trent Jaeger, Richard
Kuhn,
and
Carl Landwehr
Session 3:
Distributed
Systems
Chair:
Tim
Fraser
(ΝΑΙ
Labs)
•
On Specifying Security Policies for Web Documents with an XML-based
Language
.................................................................................................................57
Elisa
Bertino,
Silvana Castano, and
Elena Ferrari
(Università degli Studi di Milano)
•
Access
Control Mechanisms for Inter-Organizational Workflow
.......................66
Myong H. Kang,
Joon
S.
Park, and Judith
N.
Froscher (Naval Research Laboratory)
.
The YGuard Access Control Model: Set-Based Access Control
.......................75
Ту
van
den Akker,
Quinn
0.
Snell, and Mark J. Clement (Brigham Young University)
Session 4: Systems
Chair:
Carl Landwehr (Mitretek)
•
Improving the Granularity of
Access
Control in Windows NT
...........................87
Michael M. Swift, Peter Bundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan,
Mario Goertzel, and Gregory Jensenworth (Microsoft Corporation)
•
Modular Authorization
............................................................................................97
Horst F. Wedde
and Mario Lischka (University of Dortmund)
Session
5:
Graph Models
Chair: Vijay Atluri {Rutgers University)
.
A Graphical Definition of Authorisation Schema in the DTAC Model
.............109
Jonathon E. Tidswell and John M. Potter (University of New South Wales)
•
On the Specification and Evolution of Access Control Policies
......................121
M. Koch (P.S.I.
AG),
L. V.
Mancini (Univ. di Roma La Sapienza),
and F. Parisi-Presicce (George
Mason University)
•
Managing Access
Control Complexity Using Metrics
.......................................131
Trent Jaeger (IBM T.J. Watson Research Center)
Panel: Which Access Control Technique will Provide the Greatest
Overall Benefit (includes
8
pages of panelists positions)
...........................................141
Moderator: Timothy
Fraser
(ΝΑΙ
Labs)
Panelists:
David Ferraiolo, Mikel
Matthews, Casey
Schaufler,
Stephen Smalley, and Robert Watson,
Session
6:
Permission Management
Chair: Sylvia Osborn (University of Western Ontario)
•
A Rule-Based Framework for Role-Based Delegation
......................................153
Longhua Zhang,
Gail-Joon Ahn,
and Bei-Tseng
Chu
(University of North Carolina, Charlotte)
•
Structured Management of Role-Permission Relationships
.............................163
Najam
Perwaiz and Ian Sommerville (Lancaster University)
•
A Model of OASIS Role-Based Access Control and its Support
for Active Security
...............................................................................................171
Walt Yao, Ken Moody, and Jean Bacon (University of Cambridge)
Author Index
..............................................................................................................182
|
any_adam_object | 1 |
author_corporate | Symposium on Access Control Models and Technologies Chantilly, Va |
author_corporate_role | aut |
author_facet | Symposium on Access Control Models and Technologies Chantilly, Va |
author_sort | Symposium on Access Control Models and Technologies Chantilly, Va |
building | Verbundindex |
bvnumber | BV013778039 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 2001 ST 277 |
classification_tum | DAT 650f DAT 005f |
ctrlnum | (OCoLC)47061173 (DE-599)BVBBV013778039 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02480nam a2200565 c 4500</leader><controlfield tag="001">BV013778039</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110331 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">010620s2001 d||| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1581133502</subfield><subfield code="9">1-58113-350-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)47061173</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013778039</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 2001</subfield><subfield code="0">(DE-625)143438:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 650f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 005f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">Symposium on Access Control Models and Technologies</subfield><subfield code="n">6</subfield><subfield code="d">2001</subfield><subfield code="c">Chantilly, Va.</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10024017-3</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001</subfield><subfield code="b">Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">ACM</subfield><subfield code="c">2001</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VII, 182 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Ordinateurs - Accès - Contrôle - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Systèmes informatiques - Mesures de sûreté - Congrès</subfield><subfield code="2">ram</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systèmes informatiques - Sécurité - Mesures - Congrès</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">autorisation</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">contrôle accès</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">ressource répartie</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">sécurité informatique</subfield><subfield code="2">inriac</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2001</subfield><subfield code="z">Chantilly Va.</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Zugriffskontrolle</subfield><subfield code="0">(DE-588)4293034-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenbank</subfield><subfield code="0">(DE-588)4011119-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1222-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009418779&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009418779</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2001 Chantilly Va. gnd-content |
genre_facet | Konferenzschrift 2001 Chantilly Va. |
id | DE-604.BV013778039 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:51:49Z |
institution | BVB |
institution_GND | (DE-588)10024017-3 (DE-588)1222-1 |
isbn | 1581133502 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009418779 |
oclc_num | 47061173 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-20 DE-188 DE-11 DE-83 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-20 DE-188 DE-11 DE-83 DE-706 |
physical | VII, 182 S. graph. Darst. |
publishDate | 2001 |
publishDateSearch | 2001 |
publishDateSort | 2001 |
publisher | ACM |
record_format | marc |
spelling | Symposium on Access Control Models and Technologies 6 2001 Chantilly, Va. Verfasser (DE-588)10024017-3 aut Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA New York ACM 2001 VII, 182 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Réseaux d'ordinateurs - Congrès Systèmes informatiques - Mesures de sûreté - Congrès ram Systèmes informatiques - Sécurité - Mesures - Congrès autorisation inriac contrôle accès inriac ressource répartie inriac sécurité informatique inriac Computer networks Access control Congresses Computer security Congresses Computers Access control Congresses Datenbank (DE-588)4011119-2 gnd rswk-swf Zugriffskontrolle (DE-588)4293034-0 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2001 Chantilly Va. gnd-content Zugriffskontrolle (DE-588)4293034-0 s Datenbank (DE-588)4011119-2 s DE-604 Association for Computing Machinery Sonstige (DE-588)1222-1 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009418779&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Réseaux d'ordinateurs - Congrès Systèmes informatiques - Mesures de sûreté - Congrès ram Systèmes informatiques - Sécurité - Mesures - Congrès autorisation inriac contrôle accès inriac ressource répartie inriac sécurité informatique inriac Computer networks Access control Congresses Computer security Congresses Computers Access control Congresses Datenbank (DE-588)4011119-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
subject_GND | (DE-588)4011119-2 (DE-588)4293034-0 (DE-588)1071861417 |
title | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_auth | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_exact_search | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_full | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_fullStr | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_full_unstemmed | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
title_short | Proceedings of sixth ACM Symposium on Access Control Models and Technologies, SACMAT 2001 |
title_sort | proceedings of sixth acm symposium on access control models and technologies sacmat 2001 litton tasc westfields ii conference facility may 3 4 2001 chantilly virginia usa |
title_sub | Litton-TASC, Westfields II Conference Facility May 3 - 4, 2001 Chantilly, Virginia, USA |
topic | Ordinateurs - Accès - Contrôle - Congrès Ordinateurs - Accès - Contrôle - Congrès ram Réseaux d'ordinateurs - Congrès Systèmes informatiques - Mesures de sûreté - Congrès ram Systèmes informatiques - Sécurité - Mesures - Congrès autorisation inriac contrôle accès inriac ressource répartie inriac sécurité informatique inriac Computer networks Access control Congresses Computer security Congresses Computers Access control Congresses Datenbank (DE-588)4011119-2 gnd Zugriffskontrolle (DE-588)4293034-0 gnd |
topic_facet | Ordinateurs - Accès - Contrôle - Congrès Réseaux d'ordinateurs - Congrès Systèmes informatiques - Mesures de sûreté - Congrès Systèmes informatiques - Sécurité - Mesures - Congrès autorisation contrôle accès ressource répartie sécurité informatique Computer networks Access control Congresses Computer security Congresses Computers Access control Congresses Datenbank Zugriffskontrolle Konferenzschrift 2001 Chantilly Va. |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009418779&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT symposiumonaccesscontrolmodelsandtechnologieschantillyva proceedingsofsixthacmsymposiumonaccesscontrolmodelsandtechnologiessacmat2001littontascwestfieldsiiconferencefacilitymay342001chantillyvirginiausa AT associationforcomputingmachinery proceedingsofsixthacmsymposiumonaccesscontrolmodelsandtechnologiessacmat2001littontascwestfieldsiiconferencefacilitymay342001chantillyvirginiausa |