Jason Crampton

According to our database1, Jason Crampton authored at least 101 papers between 2001 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2017
The bi-objective workflow satisfiability problem and workflow resiliency.
Journal of Computer Security, 2017

Cryptographic enforcement of information flow policies without public information via tree partitions.
Journal of Computer Security, 2017

Attribute Expressions, Policy Tables and Attribute-Based Access Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

On the Satisfiability of Workflows with Release Points.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

A Framework for the Cryptographic Enforcement of Information Flow Policies.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Tree-Based Cryptographic Access Control.
Proceedings of the Computer Security - ESORICS 2017, 2017

Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

The Authorization Policy Existence Problem.
Proceedings of the Seventh ACM on Conference on Data and Application Security and Privacy, 2017

Parameterized Resiliency Problems via Integer Linear Programming.
Proceedings of the Algorithms and Complexity - 10th International Conference, 2017

2016
On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations.
ACM Trans. Priv. Secur., 2016

Algorithms for the workflow satisfiability problem engineered for counting constraints.
J. Comb. Optim., 2016

On Completeness in Languages for Attribute-Based Access Control.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Resiliency Policies in Access Control Revisited.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Inter-ReBAC: Inter-operation of Relationship-Based Access Control Model Instances.
Proceedings of the Data and Applications Security and Privacy XXX, 2016

Hybrid Publicly Verifiable Computation.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

ARPPM: Administration in the RPPM Model.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

A Multivariate Approach for Checking Resiliency in Access Control.
Proceedings of the Algorithmic Aspects in Information and Management, 2016

2015
Obligations in PTaCL.
Proceedings of the Security and Trust Management - 11th International Workshop, 2015

Relationship-Based Access Control for an Open-Source Medical Records System.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

Valued Workflow Satisfiability Problem.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

On the Workflow Satisfiability Problem with Class-independent Constraints.
Proceedings of the 10th International Symposium on Parameterized and Exact Computation, 2015

Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Access Control in Publicly Verifiable Outsourced Computation.
Proceedings of the 10th ACM Symposium on Information, 2015

Cryptographic Enforcement of Information Flow Policies Without Public Information.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking.
STTT, 2014

Iterative Plan Construction for the Workflow Satisfiability Problem.
J. Artif. Intell. Res., 2014

Access Control in Publicly Verifiable Outsourced Computation.
IACR Cryptology ePrint Archive, 2014

Revocation in Publicly Verifiable Outsourced Computation.
IACR Cryptology ePrint Archive, 2014

Caching and Auditing in the RPPM Model.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Monotonicity and Completeness in Attribute-Based Access Control.
Proceedings of the Security and Trust Management - 10th International Workshop, 2014

Path conditions and principal matching: a new approach to access control.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints.
Proceedings of the Frontiers in Algorithmics - 8th International Workshop, 2014

Attribute-Based Encryption for Access Control Using Elementary Operations.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Revocation in Publicly Verifiable Outsourced Computation.
Proceedings of the Information Security and Cryptology - 10th International Conference, 2014

2013
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem.
ACM Trans. Inf. Syst. Secur., 2013

A personal tribute to Steve Barker.
Sci. Comput. Program., 2013

Verifiably Secure Process-Aware Information Systems (Dagstuhl Seminar 13341).
Dagstuhl Reports, 2013

Constraint expressions and workflow satisfiability.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Policy templates for relationship-based access control.
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013

On the Use of Key Assignment Schemes in Authentication Protocols.
Proceedings of the Network and System Security - 7th International Conference, 2013

Sleeping android: the danger of dormant permissions.
Proceedings of the SPSM'13, 2013

Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints.
Proceedings of the Frontiers in Algorithmics <i>and</i> Algorithmic Aspects in Information and Management, 2013

2012
Obligations in risk-aware access control.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

PTaCL: A Language for Attribute-Based Access Control in Open Systems.
Proceedings of the Principles of Security and Trust - First International Conference, 2012

On the parameterized complexity of the workflow satisfiability problem.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning.
Proceedings of the Third Workshop on Practical Aspects of Automated Reasoning, 2012

2011
Authorization recycling in hierarchical RBAC systems.
ACM Trans. Inf. Syst. Secur., 2011

Practical and efficient cryptographic enforcement of interval-based access control policies.
ACM Trans. Inf. Syst. Secur., 2011

User-friendly and certificate-free grid security infrastructure.
Int. J. Inf. Sec., 2011

Risk-Aware Role-Based Access Control.
Proceedings of the Security and Trust Management - 7th International Workshop, 2011

Time-Storage Trade-Offs for Cryptographically-Enforced Access Control.
Proceedings of the Computer Security - ESORICS 2011, 2011

On the Modeling and Verification of Security-Aware and Process-Aware Information Systems.
Proceedings of the Business Process Management Workshops, 2011

2010
Towards an Access-Control Framework for Countering Insider Threats.
Proceedings of the Insider Threats in Cyber Security, 2010

An Auto-delegation Mechanism for Access Control Systems.
Proceedings of the Security and Trust Management - 6th International Workshop, 2010

A Framework for the Modular Specification and Orchestration of Authorization Policies.
Proceedings of the Information Security Technology for Applications, 2010

Cryptographic Enforcement of Role-Based Access Control.
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010

An Authorization Framework Resilient to Policy Evaluation Failures.
Proceedings of the Computer Security, 2010

Constructing Key Assignment Schemes from Chain Partitions.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

2009
Cryptographically-enforced hierarchical access control with multiple keys.
J. Log. Algebr. Program., 2009

Trade-Offs in Cryptographic Implementations of Temporal Access Control.
Proceedings of the Identity and Privacy in the Internet Age, 2009

Set Covering Problems in Role-Based Access Control.
Proceedings of the Computer Security, 2009

A Framework for Enforcing Constrained RBAC Policies.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
An Access-Control Framework for WS-BPEL.
Int. J. Web Service Res., 2008

Role Signatures for Access Control in Open Distributed Systems.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Authorization recycling in RBAC systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

RBAC administration in distributed systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Delegation and satisfiability in workflow systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

On delegation and workflow execution models.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Panel Session: What Are the Key Challenges in Distributed Security?.
Proceedings of the Data and Applications Security XXII, 2008

On spatio-temporal constraints and inheritance in role-based access control.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
The monitorability of service-level agreements for application-service provision.
Proceedings of the 6th International Workshop on Software and Performance, 2007

What can identity-based cryptography offer to web services?
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007

Inter-domain role mapping and least privilege.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Applications of the Oriented Permission Role-Based Access Control Model.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Efficiency updates for the restricted growth function GA for grouping problems.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007

Extended privilege inheritance in RBAC.
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007

2006
The interpretation and utility of three cohesion metrics for object-oriented design.
ACM Trans. Softw. Eng. Methodol., 2006

The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Access Control and Authorization Constraints for WS-BPEL.
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006

Delegation in Role-Based Access Control.
Proceedings of the Computer Security, 2006

Discretionary and Mandatory Controls for Role-Based Administration.
Proceedings of the Data and Applications Security XX, 2006

On Key Assignment for Hierarchical Access Control.
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006

2005
Introduction to February 2005 issue of ISTR.
Inf. Sec. Techn. Report, 2005

RGFGA: An Efficient Representation and Crossover for Grouping Genetic Algorithms.
Evolutionary Computation, 2005

A reference monitor for workflow systems with constrained task execution.
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005

ICARUS: intelligent coupon allocation for retailers using search.
Proceedings of the IEEE Congress on Evolutionary Computation, 2005

Understanding and developing role-based administrative models.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Introduction.
Inf. Sec. Techn. Report, 2004

Applying hierarchical and role-based access control to XML documents.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

The Consistency of Task-Based Authorization Constraints in Workflow Systems.
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004

2003
Administrative scope: A foundation for role-based administrative models.
ACM Trans. Inf. Syst. Secur., 2003

Access control in a distributed object environment using XML and roles.
South African Computer Journal, 2003

Specifying and enforcing constraints in role-based access control.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

On permissions, inheritance and role hierarchies.
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003

2002
Authorization and antichains.
PhD thesis, 2002

Administrative scope and role hierarchy operations.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

2001
Authorisation and antichains.
Operating Systems Review, 2001

A Logic of Access Control.
Comput. J., 2001

A Logic of Access Control.
Comput. J., 2001


  Loading...