skip to main content
10.1145/990036acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
SACMAT '04: Proceedings of the ninth ACM symposium on Access control models and technologies
ACM2004 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SACMAT04: 9th ACM Symposium on Access Control Models and Technologies 2004 Yorktown Heights New York USA June 2 - 4, 2004
ISBN:
978-1-58113-872-6
Published:
02 June 2004
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 9th ACM symposium on Access Control Models and Technologies - SACMAT 2004. This year's symposium continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and identify new directions for future research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control.The call for papers attracted 65 submissions from Asia, Canada, Europe, Africa, and the United States. The program committee accepted 18 papers that cover a variety of topics, including next generation access control models, engineering and analysis techniques for access control policies and models, and security administration. In addition, the program includes a panel on Security for Grid-based computing systems and a keynote speech by Bhavani Thuraisingham on Developments and Directions in Database Access Control. We hope that these proceedings will serve as a valuable reference for security researchers and developers.Putting together SACMAT 2004 was a team effort. First of all, we would like to thank the authors and panelists for providing the content of the program. We would like to express our gratitude to the program committee and external reviewers, who worked very hard in reviewing papers and providing suggestions for their improvements. We would also like to thank Elisa Bertino, this year's Panels Chair, Gail-Joon Ahn, our Proceedings Chair, and Charles Youman, our Registration Chair and Treasurer. Special thanks go to Konstantin Beznosov for maintaining the SACMAT 2004 web site and for his effort in advertising the symposium, to Barbara Carminati for her help in managing the review process, and to Reiner Sailer and Catherine Zhang of the Local Arrangements Committee for their work on the local arrangements. Finally, we would like to thank our sponsor, ACM SIGSAC, for their continued support of these successful meetings.

Skip Table Of Content Section
SESSION: Next generation access control models
Article
A logical specification for usage control

Recently presented usage control (UCON) has been considered as the next generation access control model with distinguishing properties of decision continuity and attribute mutability. Ausage control decision is determined by combining authorizations, ...

Article
Implementing access control to people location information

Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is asensitive piece of information, which only authorized entities should be able to learn. Several challenges arise in ...

Article
Role-based access control in ambient and remote space

In the era of Ubiquitous Computing and world-wide data transfer mobility, as an innovative aspect of professional activities, imposes new andcomplex problems of mobile and distributed access to information,services, and on--line negotiations for this ...

SESSION: Access control policy implementation
Article
Towards a credential-based implementation of compound access control policies

We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using the policy algebra proposed by Bonatti, Capitani di Vimercati and Samarati. ...

Article
Succinct specifications of portable document access policies

When customers need to each be given portable access rights to subset of documents from large universe of n vailable documents, it is often the case that the space vailable for representing each customer's access rights is limited to much less than n, ...

Article
On the role of roles: from role-based to role-sensitive access control

This paper maintains that for an access-control (AC) mechanism tosupport a wide range of policies, it is best to dispense with any built-insemantics for roles in the mechanism itself---be it the semantics of RBAC, orany other---leaving such semantics to ...

SESSION: Access control for XML data
Article
Specifying access control policies for XML documents with XPath

Access control for XML documents is a non-trivial topic, as can be witnessed from the number of approaches presented in the literature. Trying to compare these, we discovered the need for a simple, clearand unambiguous language to state the declarative ...

Article
A role-based approach to access control for XML databases

In order to provide a general access control methodology for parts of XML documents, we propose combining role-based access control as found in the Role Graph Model, with a methodology originally designed for object-oriented databases. We give a ...

SESSION: Role administration
Article
X-GTRBAC admin: a decentralized administration model for enterprise wide access control

Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering the access control based on any ...

Article
A meta model for authorisations in application security systems and their integration into RBAC administration

This paper presents a new concept for efficient access rights administration and access control. It focuses on the special requirements of application security and reflects experiences from the implementation of security for large industry application ...

Article
Administrative scope in the graph-based framework

The use of the graph-based framework to specify the administration of RBAC systems has several advantages, from the intuition provided by the visual aspect to the precise semantics and the systematic verification of constraints. Here the benefits of ...

SESSION: Constraints
Article
Resolving constraint conflicts

In this paper, we define constraint conflicts and examine properties that may aid in guiding their resolution. A constraint conflict is an inconsistency between the access control policy and the constraints specified to limit that policy. For example, a ...

Article
Using uml to visualize role-based access control constraints

Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorized access. We propose an approach, based on the Unified Modeling Language (UML), that shows how RBAC policies can be systematically incorporated into an ...

PANEL SESSION: Panel
Article
Security for grid-based computing systems issues and challenges

Grid systems were initially developed for supporting scientific computations. Today, companies, users and researchers are looking at ways to use the Grid approach to commercial uses and for applications in many different areas. Security in grid systems ...

    SESSION: Security analysis
    Article
    Security analysis in role-based access control

    Delegation is often used in administrative models for Role-Based Access Control (RBAC) systems to decentralize administration tasks. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an organization ...

    Article
    Towards a formal model for security policies specification and validation in the selinux system

    This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configuration for the SELinux system. A security policy for SELinux is complex and large: it is made by many configuration rules that refer to the access ...

    SESSION: Access management for distributed systems
    Article
    Role-based cascaded delegation

    We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the advantages ofrole-based trust management with those of cascaded ...

    Article
    Using trust and risk in role-based access control policies

    Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their credentials and intentions. Most distributed access control architectures ...

    Article
    A composite rbac approach for large, complex organizations

    Secure and effective access control is critical to sensitive organizations, especially when multiple organizations are working together using diverse systems. To alleviate the confusion and challenges of redundancy in such a large, complex organization, ...

    Contributors
    • University of California, Riverside
    • University of Insubria
    1. Proceedings of the ninth ACM symposium on Access control models and technologies

          Recommendations

          Acceptance Rates

          Overall Acceptance Rate 177 of 597 submissions, 30%
          YearSubmittedAcceptedRate
          SACMAT '19521223%
          SACMAT '18501428%
          SACMAT '17 Abstracts501428%
          SACMAT '16551833%
          SACMAT '15591729%
          SACMAT '14581729%
          SACMAT '13621931%
          SACMAT '12731926%
          SACMAT '09752432%
          SACMAT '03632337%
          Overall59717730%