skip to main content
10.1145/775412acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
SACMAT '03: Proceedings of the eighth ACM symposium on Access control models and technologies
ACM2003 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SACMAT03: 8th ACM Symposium on Access Control Models and Technologies 2003 Como Italy June 2 - 3, 2003
ISBN:
978-1-58113-681-4
Published:
02 June 2003
Sponsors:

Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the 8th ACM Symposium on Access Control Models and Technologies - SACMAT 2003. SACMAT continues with the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions and identify new directions for future research and development work. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control.A total of 63 papers were submitted this year from Asia, Canada, Europe, and the United States. The papers in these proceedings were evaluated for their technical contribution, originality and impact to the field of access control and authorization management. By limiting the program to a single panel, and extending the conference a half day, the program committee was able to increase the number of accepted papers from 17 to 23. These papers cover a variety of topics to include, access control and administrative models, access control systems and applications, policy context and specification, and range from the highly theoretical to real world commercial implementations.

Skip Table Of Content Section
SESSION: Enterprise Role Administration
Article
An administration concept for the enterprise role-based access control model

Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context of SAM Jupiter, a commercial ...

Article
The role control center: features and case studies

Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS products ...

Article
Cooperative role-based administration

In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be ...

Article
A methodology for managing roles in legacy systems

Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. Much of the research on RBAC has been done in an environment isolated from real systems which ...

SESSION: Constraints
Article
Specifying and enforcing constraints in role-based access control

Constraints in access control in general and separation of duty constraints in particular are an important area of research. There are two important issues relating to constraints: their specification and their enforcement. We believe that existing ...

Article
Dependencies and separation of duty constraints in GTRBAC

A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC's language constructs allow one to specify various temporal constraints on ...

Article
An approach to engineer and enforce context constraints in an RBAC environment

This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one ...

Article
On context in authorization policy

Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well understood. Often implemented as condition functions or predefined ...

SESSION: RBAC for Collaborative Environments
Article
Role-based access control for collaborative enterprise in peer-to-peer computing environments

In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to other users from a user's machine. ...

Article
Model driven security for process-oriented systems

Model Driven Architecture is an approach to increasing the quality of complex software systems based on creating high-level system models and automatically generating system architectures from the models. We show how this paradigm can be specialized to ...

Article
An infrastructure for managing secure update operations on XML data

Secure exchange of data over the web is becoming more and more important today. By secure data exchange we mean that privacy and integrity are ensured when documents flow among different parties. A key issue in this scenario is how to ensure that web ...

SESSION: Access Control Models and Mechanisms
Article
The tees confidentiality model: an authorisation model for identities and roles

We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web applications in addition to computer systems administration. It achieves its functionality by combining Identity Based ...

Article
Partial outsourcing: a new paradigm for access control

Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a system administrator is faced with. ...

Article
Induced role hierarchies with attribute-based RBAC

The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, assigning users to roles ought to be automated. RB-RBAC (Rule-Based RBAC) ...

Article
PBDM: a flexible delegation model in RBAC

Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control policy. Delegation of authority is among these rules. RBDM0 and RDM2000 ...

Article
Cryptographic access control in a distributed file system

Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to distribute the functionality of the reference monitor suffer from problems ...

SESSION: Role Engineering
Article
On modeling system-centric information for role engineering

In this paper we present an approach to modeling system-centric information in order to facilitate role engineering (RE). In particular, we first discuss the general characteristics of the information required in RE. Afterwards, we discuss two ...

Article
Role mining - revealing business roles for security administration using data mining technology

In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) ...

SESSION: Verification
Article
A stratification-based approach for handling conflicts in access control

In the health care sector, access to medical information is more and more electronically achieved. Therefore, it is very important to define security policies which restrict access to pieces of information in order to guarantee security properties like ...

Article
Static verification of security requirements in role based CSCW systems

In this paper, we present static verification of security requirements for CSCW systems using finite-state techniques, i.e., model checking. The coordination and security constraints of CSCW systems are specified using a role based collaboration model. ...

SESSION: Dynamic Access Control
Article
An access control model for dynamic client-side content

The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually static, and an access control policy ...

Article
Dynamic and risk-aware network access management

Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to network security can be achieved if we use quantified levels of risk as an ...

Article
Dynamic access control: preserving safety and trust for network defense operations

We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capability lists in this regard, and develop a quantitative feel for the ...

Contributors
  • University of Insubria
  • National Institute of Standards and Technology

Recommendations

Acceptance Rates

SACMAT '03 Paper Acceptance Rate23of63submissions,37%Overall Acceptance Rate177of597submissions,30%
YearSubmittedAcceptedRate
SACMAT '19521223%
SACMAT '18501428%
SACMAT '17 Abstracts501428%
SACMAT '16551833%
SACMAT '15591729%
SACMAT '14581729%
SACMAT '13621931%
SACMAT '12731926%
SACMAT '09752432%
SACMAT '03632337%
Overall59717730%