Sciweavers

12 search results - page 1 / 3
» sacmat 2010
Sort
View
SACMAT
2010
ACM
13 years 7 months ago
Towards analyzing complex operating system access control configurations
Hong Chen, Ninghui Li, Christopher S. Gates, Ziqin...
SACMAT
2010
ACM
13 years 2 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
SACMAT
2010
ACM
13 years 7 months ago
An access control model for mobile physical objects
Access to distributed databases containing tuples collected about mobile physical objects requires information about the objects’ trajectories. Existing access control models ca...
Florian Kerschbaum
SACMAT
2010
ACM
13 years 7 months ago
A model of triangulating environments for policy authoring
Policy authors typically reconcile several different mental models and goals, such as enabling collaboration, securing information, and conveying trust in colleagues. The data un...
Kathi Fisler, Shriram Krishnamurthi
SACMAT
2010
ACM
13 years 7 months ago
Monitoring security policies with metric first-order temporal logic
We show the practical feasibility of monitoring complex security properties using a runtime monitoring approach for metric first-order temporal logic. In particular, we show how ...
David A. Basin, Felix Klaedtke, Samuel Müller