SACMAT
15 years 2 months ago
2005 ACM
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
SACMAT
15 years 2 months ago
2005 ACM
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
SACMAT
15 years 2 months ago
2005 ACM SACMAT
15 years 2 months ago
2005 ACM
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
SACMAT
15 years 2 months ago
2005 ACM
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
|