{"title":"Session details: Demo session II","authors":"Mahesh V. Tripunitara","doi":"10.1145/3254924","DOIUrl":"https://doi.org/10.1145/3254924","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114640052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Privacy & compliance","authors":"V. Atluri","doi":"10.1145/3254916","DOIUrl":"https://doi.org/10.1145/3254916","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"34 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131894284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Policy management & enforcement","authors":"Adam J. Lee","doi":"10.1145/3254917","DOIUrl":"https://doi.org/10.1145/3254917","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124602678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Keynote address","authors":"Jaideep Vaidya","doi":"10.1145/3254915","DOIUrl":"https://doi.org/10.1145/3254915","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123368017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Policy analysis","authors":"Gail-Joon Ahn","doi":"10.1145/3254921","DOIUrl":"https://doi.org/10.1145/3254921","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116216824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Session details: Systems & information flow","authors":"J. Crampton","doi":"10.1145/3254920","DOIUrl":"https://doi.org/10.1145/3254920","url":null,"abstract":"","PeriodicalId":117879,"journal":{"name":"Proceedings of the 18th ACM symposium on Access control models and technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133473719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}