{"title":"Session details: Trust and access control in systems","authors":"I. Ray","doi":"10.1145/3257036","DOIUrl":"https://doi.org/10.1145/3257036","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"217 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114599385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Multidomain policy integration","authors":"Adam J. Lee","doi":"10.1145/3257031","DOIUrl":"https://doi.org/10.1145/3257031","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132443036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Security analysis and verification","authors":"Mahesh V. Tripunitara","doi":"10.1145/3257030","DOIUrl":"https://doi.org/10.1145/3257030","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"242 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133819828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: XACML and RBAC","authors":"Lujo Bauer","doi":"10.1145/3257034","DOIUrl":"https://doi.org/10.1145/3257034","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134120063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Role engineering","authors":"V. Atluri","doi":"10.1145/3257032","DOIUrl":"https://doi.org/10.1145/3257032","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Secure sharing and policy combination","authors":"E. Ferrari","doi":"10.1145/3257033","DOIUrl":"https://doi.org/10.1145/3257033","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134244503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Model/meta-model and extensions","authors":"J. Crampton","doi":"10.1145/3257035","DOIUrl":"https://doi.org/10.1145/3257035","url":null,"abstract":"","PeriodicalId":325325,"journal":{"name":"Proceedings of the 14th ACM symposium on Access control models and technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130790868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}