{"title":"Session details: Role based access control","authors":"Gail-Joon Ahn","doi":"10.1145/3258188","DOIUrl":"https://doi.org/10.1145/3258188","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114904251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Access control in distributed environments","authors":"Jaideep Vaidya","doi":"10.1145/3258191","DOIUrl":"https://doi.org/10.1145/3258191","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116354124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Panel I","authors":"Mahesh V. Tripunitara","doi":"10.1145/3258187","DOIUrl":"https://doi.org/10.1145/3258187","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"2010 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117053712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Panel II","authors":"Lujo Bauer","doi":"10.1145/3258190","DOIUrl":"https://doi.org/10.1145/3258190","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124224375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Role engineering","authors":"A. Kern","doi":"10.1145/3258186","DOIUrl":"https://doi.org/10.1145/3258186","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115705576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Policy analysis","authors":"Mahesh V. Tripunitara","doi":"10.1145/3258185","DOIUrl":"https://doi.org/10.1145/3258185","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132652109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Privacy preserving access control","authors":"Adam J. Lee","doi":"10.1145/3258189","DOIUrl":"https://doi.org/10.1145/3258189","url":null,"abstract":"","PeriodicalId":112334,"journal":{"name":"Proceedings of the 15th ACM symposium on Access control models and technologies","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132280198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}