skip to main content
10.1145/1133058acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies
ACM2006 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SACMAT06: 11th ACM Symposium on Access Control Models and Technologies 2006 Lake Tahoe California USA June 7 - 9, 2006
ISBN:
978-1-59593-353-9
Published:
07 June 2006
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 11th ACM Symposium on Access Control Models and Technologies -- SACMAT '06. This year's symposium continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions that fulfill the needs of heterogeneous applications and environments and identify new directions for future research and development. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control.The call for papers attracted 82 submissions from Asia, Australia, Europe, and North America. The program committee accepted 25 papers that cover a variety of topics, including next generation access control models, engineering and analysis techniques for access control policies and models, and security administration. In addition, the program includes a panel on security in enterprise resource planning and service-oriented architectures. We hope that this proceeding will serve as a valuable reference for security researchers and developers.

Skip Table Of Content Section
SESSION: Access control technology
Article
Access control, confidentiality and privacy for video surveillance databases

In this paper we have addressed confidentiality and privacy for video surveillance databases. First we discussed our overall approach for suspicious event detection. Next we discussed an access control model and accedes control algorithms for ...

Article
Key management for non-tree access hierarchies

Access hierarchies are useful in many applications and are modeled as a set of access classes organized by a partial order. A user who obtains access to a class in such a hierarchy is entitled to access objects stored at that class, as well as objects ...

Article
PRIMA: policy-reduced integrity measurement architecture

We propose an integrity measurement approach based on information flow integrity,which we call the Policy-Reduced Integrity Measurement Architecture (PRIMA).The recent availability of secure hardware has made it practical for a system to measure its own ...

Article
On classifying access control implementations for distributed systems

This paper presents a classification of implementations of access control systems based on a lattice taxonomy where the axes are properties of the implementation. The current taxonomy has six axes representing:partitioning of control over sharing of ...

SESSION: Trust-based authorization
Article
Traust: a trust negotiation-based authorization service for open systems

In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizational boundaries. Researchers have shown that TN is indeed a viable solution ...

Article
TrustBAC: integrating trust relationships into the RBAC model for access control in open systems

Conventional access control are suitable for regulating access to resources by known users.However,these models have often found to be inadequate for open and decentralized multi-centric systems where the user population is dynamic and the identity of ...

Article
Integrating presence inference into trust management for ubiquitous systems

We propose a new architecture for trust management in ubiquitous environments that deals with RBAC policy, digital signatures, and user presence in a uniform framework. The proposed architecture includes inferences about user presence from incomplete ...

SESSION: Delegation
Article
Trust management with delegation in grouped peer-to-peer communities

Trust Management is increasingly playing a major role especially with the growing need for security in decentralized, unsecured networks like peer-to-peer networks. Effective trust management solutions especially one geared towards handling trust in ...

Article
Fine-grained role-based delegation in presence of the hybrid role hierarchy

Delegation of authority is an important process that needs to be captured by any access control model. In role-based access control models, delegation of authority involves delegating roles that a user can assume or the set of permissions that he can ...

Article
Delegation in the role graph model

We present a model for delegation that is based on our decentralized administrative role graph model. We use a combination of user/group assignment and user-role assignment to support user to user,permission to user and role to role delegation. A ...

SESSION: Access control model
Article
Systematic control and management of data integrity

Integrity has long been considered a fundamental requirement for secure computerized systems, and especially today's demand for data integrity is stronger than ever as many organizations are in-creasing their reliance on data and information systems. A ...

Article
The secondary and approximate authorization model and its application to Bell-LaPadula policies

We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (SAAM) defines the notions of primary vs. secondary and precise vs. ...

Article
Secure resource description framework: an access control model

In this paper we propose an access control model for the Resource Description Framework (RDF). We argue that existing access control models, like the ones developed for securing eXtensible Markup Language (XML) documents, do not provide sufficient ...

Article
Constraint generation for separation of duty

Separation of Duty (SoD) is widely recognized to be a fundamental principle in computer security. A Static SoD (SSoD) policy states that in order to have all permissions necessary to complete a sensitive task, the cooperation of at least a certain ...

SESSION: Access control analysis
Article
A model-checking approach to analysing organisational controls in a loan origination process

Demonstrating the safety of a system (ie. avoiding the undesired propagation of access rights or indirect access through some other granted resource) is one of the goals of access control research, e.g. [1-4]. However, the flexibility required from ...

Article
Information flow property preserving transformation of UML interaction diagrams

We present an approach for secure information flow property preserving refinement and transformation of UML inspired interaction diagrams.The approach is formally underpinned by trace-semantics.The semantics is sufficiently expressive to distinguish ...

Article
Towards reasonability properties for access-control policy languages

The growing importance of access control has led to the definition of numerous languages for specifying policies. Since these languages are based on different foundations, language users and designers would benefit from formal means to compare them. We ...

Article
Data-centric security: role analysis and role typestates

In J2EE and .NET roles are assigned to methods using external configuration files, called the deployment descriptors. Assigning roles to methods, although conceptually simple, in practice it is quite complicated. For instance, in order for a deployer to ...

SESSION: Secure collaboration
Article
A usage-based authorization framework for collaborative computing systems

Collaborative systems such as Grids provide efficient and scalable access to distributed computing capabilities and enable seamless resource sharing between users and platforms. This heterogeneous distribution of resources and the various modes of ...

Article
Inter-instance authorization constraints for secure workflow management

Work flows model and control the execution of business process in an organization. They are typically comprised of tasks or logical steps in the business process. To mitigate the ability of insiders to commit fraud, care should be taken that people ...

Article
Role-based access management for ad-hoc collaborative sharing

Under scientific collaborations, resource sharing tends to be highly dynamic and often ad hoc. The dynamic characteristics and sharing patterns of ad-hoc collaborative sharing impose a need for comprehensive and flexible approaches to reflect and cope ...

SESSION: Information sharing
Article
Redirection policies for mission-based information sharing

When an access decision function denies a data access request by a mission participant in a mission-critical situation, the mission often suffers. In this paper, we propose a sharing control mechanism that computes and executes requests that are mission-...

Article
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms!

XACML is the OASIS standard language for the specification of authorization and entitlement policies. However, while XACML well addresses security requirements of a single enterprise (even if large and composed by multiple departments), it does not ...

Article
Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy

The role hierarchy is one of the most distinguished features of an RBAC approach to securing large systems as it facilitates efficient administration of permissions. However, the role hierarchy as defined in the currently standardized RBAC model has ...

Article
Semantic access control for information interoperation

Sharing information across different organizations is a critical problem. Using security enforcement mechanisms, accessing databases is limited to authorized users only. However, if databases and access control policies are syntactically and ...

Contributors
  • National Institute of Standards and Technology
  • Colorado State University

Recommendations

Acceptance Rates

Overall Acceptance Rate177of597submissions,30%
YearSubmittedAcceptedRate
SACMAT '19521223%
SACMAT '18501428%
SACMAT '17 Abstracts501428%
SACMAT '16551833%
SACMAT '15591729%
SACMAT '14581729%
SACMAT '13621931%
SACMAT '12731926%
SACMAT '09752432%
SACMAT '03632337%
Overall59717730%