Crampton, Jason
146  Ergebnisse:
Personensuche X
?
1

Generalized Noise Role Mining:

, In: Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies,
Crampton, Jason ; Eiben, Eduard ; Gutin, Gregory.. - p. 91-102 , 2022
 
?
2

Valued Authorization Policy Existence Problem: Theory and E..:

Crampton, Jason ; Eiben, Eduard ; Gutin, Gregory..
ACM Transactions on Privacy and Security.  25 (2022)  4 - p. 1-32 , 2022
 
?
3

Valued Authorization Policy Existence Problem:

, In: Proceedings of the 26th ACM Symposium on Access Control Models and Technologies,
Crampton, Jason ; Eiben, Eduard ; Gutin, Gregory.. - p. 83-94 , 2021
 
?
4

Towards Better Understanding of User Authorization Query Pr..:

Crampton, Jason ; Gutin, Gregory Z. ; Majumdar, Diptapriyo
ACM Transactions on Privacy and Security (TOPS).  24 (2021)  3 - p. 1-22 , 2021
 
?
 
?
6

The Authorization Policy Existence Problem:

Berge, Pierre ; Crampton, Jason ; Gutin, Gregory.
IEEE Transactions on Dependable and Secure Computing.  17 (2020)  6 - p. 1333-1344 , 2020
 
?
7

Bounded and Approximate Strong Satisfiability in Workflows:

, In: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies,
 
?
8

Parameterized resiliency problems:

Crampton, Jason ; Gutin, Gregory ; Koutecký, Martin.
Theoretical Computer Science.  795 (2019)  - p. 478-491 , 2019
 
?
9

The Authorization Policy Existence Problem:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Berge, Pierre ; Crampton, Jason ; Gutin, Gregory. - p. 163-165 , 2017
 
?
10

Attribute Expressions, Policy Tables and Attribute-Based Ac..:

, In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies,
Crampton, Jason ; Williams, Conrad - p. 79-90 , 2017
 
?
11

On the Satisfiability of Workflows with Release Points:

, In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies,
 
?
12

Canonical Completeness in Lattice-Based Languages for Attri..:

, In: Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy,
Crampton, Jason ; Williams, Conrad - p. 47-58 , 2017
 
?
13

A Framework for the Cryptographic Enforcement of Informatio..:

, In: Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies,
 
?
14

Resiliency Policies in Access Control Revisited:

, In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies,
 
?
15

On Completeness in Languages for Attribute-Based Access Con..:

, In: Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies,
Crampton, Jason ; Williams, Conrad - p. 149-160 , 2016
 
1-15