146
Voted
SACMAT
15 years 8 months ago
2006 ACM
In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discu...
135
Voted
SACMAT
15 years 8 months ago
2006 ACM
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
140
click to vote
SACMAT
15 years 8 months ago
2006 ACM
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
120
Voted
SACMAT
15 years 8 months ago
2006 ACM
Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delega...
108
Voted
SACMAT
15 years 8 months ago
2006 ACM
Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary...
|