It is our great pleasure to welcome you to the 8th ACM Symposium on Access Control Models and Technologies - SACMAT 2003. SACMAT continues with the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The mission of the symposium is to share novel access control solutions and identify new directions for future research and development work. SACMAT gives researchers and practitioners a unique opportunity to share their perspectives with others interested in the various aspects of access control.A total of 63 papers were submitted this year from Asia, Canada, Europe, and the United States. The papers in these proceedings were evaluated for their technical contribution, originality and impact to the field of access control and authorization management. By limiting the program to a single panel, and extending the conference a half day, the program committee was able to increase the number of accepted papers from 17 to 23. These papers cover a variety of topics to include, access control and administrative models, access control systems and applications, policy context and specification, and range from the highly theoretical to real world commercial implementations.
An administration concept for the enterprise role-based access control model
Using an underlying role-based model for the administration of roles has proved itself to be a successful approach. This paper sets out to describe the enterprise role-based access control model (ERBAC) in the context of SAM Jupiter, a commercial ...
The role control center: features and case studies
Role-based Access Control (RBAC) models have been implemented not only in self-contained resource management products such as DBMSs and Operating Systems but also in a class of products called Enterprise Security Management Systems (ESMS). ESMS products ...
Cooperative role-based administration
In large organizations the administration of access privileges (such as the assignment of an access right to a user in a particular role) is handled cooperatively through distributed administrators in various different capacities. A quorum may be ...
A methodology for managing roles in legacy systems
Role-based access control (RBAC) is well accepted as a good technology for managing and designing access control in systems with many users and many objects. Much of the research on RBAC has been done in an environment isolated from real systems which ...
Specifying and enforcing constraints in role-based access control
Constraints in access control in general and separation of duty constraints in particular are an important area of research. There are two important issues relating to constraints: their specification and their enforcement. We believe that existing ...
Dependencies and separation of duty constraints in GTRBAC
A Generalized Temporal Role Based Access Control (GTRBAC) model that captures an exhaustive set of temporal constraint needs for access control has recently been proposed. GTRBAC's language constructs allow one to specify various temporal constraints on ...
An approach to engineer and enforce context constraints in an RBAC environment
This paper presents an approach that uses special purpose RBAC constraints to base certain access control decisions on context information. In our approach a context constraint is defined as a dynamic RBAC constraint that checks the actual values of one ...
On context in authorization policy
Authorization policy infrastructures are evolving with the complex environments that they support. However, the requirements and technologies supporting context are not yet well understood. Often implemented as condition functions or predefined ...
Role-based access control for collaborative enterprise in peer-to-peer computing environments
In Peer-to-Peer (P2P) computing environments, each participant (peer) acts as both client and content provider. This satisfies the requirement that resources should be increasingly made available by being published to other users from a user's machine. ...
Model driven security for process-oriented systems
Model Driven Architecture is an approach to increasing the quality of complex software systems based on creating high-level system models and automatically generating system architectures from the models. We show how this paradigm can be specialized to ...
An infrastructure for managing secure update operations on XML data
Secure exchange of data over the web is becoming more and more important today. By secure data exchange we mean that privacy and integrity are ensured when documents flow among different parties. A key issue in this scenario is how to ensure that web ...
The tees confidentiality model: an authorisation model for identities and roles
We present a model of authorisation that is more powerful than Role Based Access Control (RBAC), and is suitable for complex web applications in addition to computer systems administration. It achieves its functionality by combining Identity Based ...
Partial outsourcing: a new paradigm for access control
Various security models have been proposed in recent years for different purposes. Each of these aims to ease administration by introducing new types of security policies and models. This increases the complexity a system administrator is faced with. ...
Induced role hierarchies with attribute-based RBAC
The Role-Based Access Control (RBAC) model is traditionally used to manually assign users to appropriate roles. When the service-providing enterprise has a massive customer base, assigning users to roles ought to be automated. RB-RBAC (Rule-Based RBAC) ...
PBDM: a flexible delegation model in RBAC
Role-based access control (RBAC) is recognized as an efficient access control model for large organizations. Most organizations have some business rules related to access control policy. Delegation of authority is among these rules. RBDM0 and RDM2000 ...
Cryptographic access control in a distributed file system
Traditional access control mechanisms rely on a reference monitor to mediate access to protected resources. Reference monitors are inherently centralized and existing attempts to distribute the functionality of the reference monitor suffer from problems ...
On modeling system-centric information for role engineering
In this paper we present an approach to modeling system-centric information in order to facilitate role engineering (RE). In particular, we first discuss the general characteristics of the information required in RE. Afterwards, we discuss two ...
Role mining - revealing business roles for security administration using data mining technology
In this paper we describe the work devising a new technique for role-finding to implement Role-Based Security Administration. Our results stem from industrial projects, where large-scale customers wanted to migrate to Role-Based Access Control (RBAC) ...
A stratification-based approach for handling conflicts in access control
In the health care sector, access to medical information is more and more electronically achieved. Therefore, it is very important to define security policies which restrict access to pieces of information in order to guarantee security properties like ...
Static verification of security requirements in role based CSCW systems
In this paper, we present static verification of security requirements for CSCW systems using finite-state techniques, i.e., model checking. The coordination and security constraints of CSCW systems are specified using a role based collaboration model. ...
An access control model for dynamic client-side content
The focus of access control in client/server environments is on protecting sensitive server resources by determining whether or not a client is authorized to access those resources. The set of resources are usually static, and an access control policy ...
Dynamic and risk-aware network access management
Traditional network security technologies such as firewalls and intrusion detection systems usually work according to a static ruleset only. We believe that a better approach to network security can be achieved if we use quantified levels of risk as an ...
Dynamic access control: preserving safety and trust for network defense operations
We investigate the cost of changing access control policies dynamically as a response action in computer network defense. We compare and contrast the use of access lists and capability lists in this regard, and develop a quantitative feel for the ...
Recommendations
Acceptance Rates
Year | Submitted | Accepted | Rate |
---|---|---|---|
SACMAT '19 | 52 | 12 | 23% |
SACMAT '18 | 50 | 14 | 28% |
SACMAT '17 Abstracts | 50 | 14 | 28% |
SACMAT '16 | 55 | 18 | 33% |
SACMAT '15 | 59 | 17 | 29% |
SACMAT '14 | 58 | 17 | 29% |
SACMAT '13 | 62 | 19 | 31% |
SACMAT '12 | 73 | 19 | 26% |
SACMAT '09 | 75 | 24 | 32% |
SACMAT '03 | 63 | 23 | 37% |
Overall | 597 | 177 | 30% |