120
click to vote
SACMAT
15 years 6 months ago
2005 ACM
With continuously growing numbers of applications, enterprises face the problem of efficiently managing the assignment of access permissions to their users. On the one hand, secur...
111
Voted
SACMAT
15 years 6 months ago
2005 ACM
It has been recognized for some time that software alone does not provide an adequate foundation for building a high-assurance trusted platform. The emergence of industry-standard...
75
Voted
SACMAT
15 years 6 months ago
2005 ACM 102
Voted
SACMAT
15 years 6 months ago
2005 ACM
As privacy becomes a major concern for both consumers and enterprises, many research efforts have been devoted to the development of privacy protecting technology. We recently pr...
104
Voted
SACMAT
15 years 6 months ago
2005 ACM
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
|