It is our great pleasure to welcome you to the 9th ACM symposium on Access Control Models and Technologies - SACMAT 2004. This year's symposium continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and identify new directions for future research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control.The call for papers attracted 65 submissions from Asia, Canada, Europe, Africa, and the United States. The program committee accepted 18 papers that cover a variety of topics, including next generation access control models, engineering and analysis techniques for access control policies and models, and security administration. In addition, the program includes a panel on Security for Grid-based computing systems and a keynote speech by Bhavani Thuraisingham on Developments and Directions in Database Access Control. We hope that these proceedings will serve as a valuable reference for security researchers and developers.Putting together SACMAT 2004 was a team effort. First of all, we would like to thank the authors and panelists for providing the content of the program. We would like to express our gratitude to the program committee and external reviewers, who worked very hard in reviewing papers and providing suggestions for their improvements. We would also like to thank Elisa Bertino, this year's Panels Chair, Gail-Joon Ahn, our Proceedings Chair, and Charles Youman, our Registration Chair and Treasurer. Special thanks go to Konstantin Beznosov for maintaining the SACMAT 2004 web site and for his effort in advertising the symposium, to Barbara Carminati for her help in managing the review process, and to Reiner Sailer and Catherine Zhang of the Local Arrangements Committee for their work on the local arrangements. Finally, we would like to thank our sponsor, ACM SIGSAC, for their continued support of these successful meetings.
Proceeding Downloads
A logical specification for usage control
Recently presented usage control (UCON) has been considered as the next generation access control model with distinguishing properties of decision continuity and attribute mutability. Ausage control decision is determined by combining authorizations, ...
Implementing access control to people location information
Ubiquitous computing uses a variety of information for which access needs to be controlled. For instance, a person's current location is asensitive piece of information, which only authorized entities should be able to learn. Several challenges arise in ...
Role-based access control in ambient and remote space
In the era of Ubiquitous Computing and world-wide data transfer mobility, as an innovative aspect of professional activities, imposes new andcomplex problems of mobile and distributed access to information,services, and on--line negotiations for this ...
Towards a credential-based implementation of compound access control policies
We describe a layered approach to access control for distributed and interoperable computing systems. Firstly, compound access control policies are conceptually specified, using the policy algebra proposed by Bonatti, Capitani di Vimercati and Samarati. ...
Succinct specifications of portable document access policies
When customers need to each be given portable access rights to subset of documents from large universe of n vailable documents, it is often the case that the space vailable for representing each customer's access rights is limited to much less than n, ...
On the role of roles: from role-based to role-sensitive access control
This paper maintains that for an access-control (AC) mechanism tosupport a wide range of policies, it is best to dispense with any built-insemantics for roles in the mechanism itself---be it the semantics of RBAC, orany other---leaving such semantics to ...
Specifying access control policies for XML documents with XPath
Access control for XML documents is a non-trivial topic, as can be witnessed from the number of approaches presented in the literature. Trying to compare these, we discovered the need for a simple, clearand unambiguous language to state the declarative ...
A role-based approach to access control for XML databases
In order to provide a general access control methodology for parts of XML documents, we propose combining role-based access control as found in the Role Graph Model, with a methodology originally designed for object-oriented databases. We give a ...
X-GTRBAC admin: a decentralized administration model for enterprise wide access control
Access control in enterprises is a key research area in the realm of Computer Security because of the unique needs of the target enterprise. As the enterprise typically has large user and resource pools, administering the access control based on any ...
A meta model for authorisations in application security systems and their integration into RBAC administration
This paper presents a new concept for efficient access rights administration and access control. It focuses on the special requirements of application security and reflects experiences from the implementation of security for large industry application ...
Administrative scope in the graph-based framework
The use of the graph-based framework to specify the administration of RBAC systems has several advantages, from the intuition provided by the visual aspect to the precise semantics and the systematic verification of constraints. Here the benefits of ...
Resolving constraint conflicts
In this paper, we define constraint conflicts and examine properties that may aid in guiding their resolution. A constraint conflict is an inconsistency between the access control policy and the constraints specified to limit that policy. For example, a ...
Using uml to visualize role-based access control constraints
Organizations use Role-Based Access Control (RBAC) to protect information resources from unauthorized access. We propose an approach, based on the Unified Modeling Language (UML), that shows how RBAC policies can be systematically incorporated into an ...
Security for grid-based computing systems issues and challenges
Grid systems were initially developed for supporting scientific computations. Today, companies, users and researchers are looking at ways to use the Grid approach to commercial uses and for applications in many different areas. Security in grid systems ...
Security analysis in role-based access control
Delegation is often used in administrative models for Role-Based Access Control (RBAC) systems to decentralize administration tasks. While the use of delegation greatly enhances flexibility and scalability, it may reduce the control that an organization ...
Towards a formal model for security policies specification and validation in the selinux system
This paper presents a formal model, called SELAC, for analyzing an arbitrary security policy configuration for the SELinux system. A security policy for SELinux is complex and large: it is made by many configuration rules that refer to the access ...
Role-based cascaded delegation
We propose role-based cascaded delegation, a model for delegation of authority in decentralized trust management systems. We show that role-based cascaded delegation combines the advantages ofrole-based trust management with those of cascaded ...
Using trust and risk in role-based access control policies
Emerging trust and risk management systems provide a framework for principals to determine whether they will exchange resources, without requiring a complete definition of their credentials and intentions. Most distributed access control architectures ...
A composite rbac approach for large, complex organizations
Secure and effective access control is critical to sensitive organizations, especially when multiple organizations are working together using diverse systems. To alleviate the confusion and challenges of redundancy in such a large, complex organization, ...
- Proceedings of the ninth ACM symposium on Access control models and technologies
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SACMAT '19 | 52 | 12 | 23% |
SACMAT '18 | 50 | 14 | 28% |
SACMAT '17 Abstracts | 50 | 14 | 28% |
SACMAT '16 | 55 | 18 | 33% |
SACMAT '15 | 59 | 17 | 29% |
SACMAT '14 | 58 | 17 | 29% |
SACMAT '13 | 62 | 19 | 31% |
SACMAT '12 | 73 | 19 | 26% |
SACMAT '09 | 75 | 24 | 32% |
SACMAT '03 | 63 | 23 | 37% |
Overall | 597 | 177 | 30% |