Sylvia L. Osborn

Affiliations:
  • University of Western Ontario, Canada


According to our database1, Sylvia L. Osborn authored at least 59 papers between 1978 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2017
Current Research and Open Problems in Attribute-Based Access Control.
ACM Comput. Surv., 2017

2016
Strategies for Incorporating Delegation into Attribute-Based Access Control (ABAC).
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

2014
A system for risk awareness during role mining.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

HGABAC: Towards a Formal Model of Hierarchical Attribute-Based Access Control.
Proceedings of the Foundations and Practice of Security - 7th International Symposium, 2014

2013
A Survey of Delegation from an RBAC Perspective.
J. Softw., 2013

Delay-sensitive approaches for anonymizing numerical streaming data.
Int. J. Inf. Sec., 2013

A new approach for delegation in usage control.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

2012
Tradeoff Analysis of Relational Database Storage of Privacy Preferences.
Proceedings of the Secure Data Management - 9th VLDB Workshop, 2012

2011
Static and Dynamic Delegation in the Role Graph Model.
IEEE Trans. Knowl. Data Eng., 2011

Mixing privacy with role-based access control.
Proceedings of the Fourth International C* Conference on Computer Science & Software Engineering, 2011

2010
FAANST: Fast Anonymizing Algorithm for Numerical Streaming DaTa.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2010

2009
Database Intrusion Detection Using Role Profiling with Role Hierarchy.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

A Safe RSS Approach for Securely Sharing Mobile SVG Biomedical Images for Web 2.0.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
A Methodology for Bridging between RBAC and an Arbitrary Application Program.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

2007
Architecture for Data Collection in Database Intrusion Detection Systems.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Discretionary access control with the administrative role graph model.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Role-Based Access Control.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2006
Conflict of Interest in the Administrative Role Graph Model.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Delegation in the role graph model.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Role-based access control: past, present and future.
Proceedings of the 2006 International Conference on Privacy, 2006

2005
Specifying an Access Control Model for Ontologies for the Semantic Web.
Proceedings of the Secure Data Management, 2005

2004
A Classifier-Based Approach to User-Role Assignment for Web Applications.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

A role-based approach to access control for XML databases.
Proceedings of the 9th ACM Symposium on Access Control Models and Technologies, 2004

A Design for Parameterized Roles.
Proceedings of the Research Directions in Data and Applications Security XVIII, 2004

2003
A methodology for managing roles in legacy systems.
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003

An Administrative Model for Role Graphs.
Proceedings of the Data and Applications Security XVII: Status and Prospects, 2003

2002
Integrating role graphs: a tool for security integration.
Data Knowl. Eng., 2002

Information flow analysis of an RBAC system.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Making access control more usable.
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002

Privilege Administration for the Role Graph Model.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Panel on XML and Security.
Proceedings of the Database and Application Security XV, 2001

2000
Configuring role-based access control to enforce mandatory and discretionary access control policies.
ACM Trans. Inf. Syst. Secur., 2000

Modeling users in role-based access control.
Proceedings of the Fifth ACM Workshop on Role-Based Access Control, 2000


Database Security Integration using Role-Based Access Control.
Proceedings of the Data and Application Security, 2000

1999
The Role Graph Model and Conflict of Interest.
ACM Trans. Inf. Syst. Secur., 1999

1998
Using the vista 350 telephone to communicate the results of home monitoring of diabetes mellitus to a central database and to provide feedback.
Int. J. Medical Informatics, 1998

1997
Mandatory access control and role-based access control revisited.
Proceedings of the Second Workshop on Role-Based Access Control, 1997

1996
Unifying Data, Behaviours, and Messages in Object-Oriented Databases.
Data Knowl. Eng., 1996

On the Interaction Between Role-Based Access Control and Relational Databases.
Proceedings of the Database Security Volume X, 1996

1995
The role graph model.
Proceedings of the First ACM Workshop on Role-Based Access Control, 1995

Modeling Mandatory Access Control in Role-Based Security Systems.
Proceedings of the Database Security IX: Status and Prospects, 1995

1994
Access Rights Administration in Role-Based Security Systems.
Proceedings of the Database Security, 1994

1993
Two Fully Distributed Concurrency Control Algorithms.
IEEE Trans. Knowl. Data Eng., 1993

Role-Based Security, Object Oriented Databases & Separation of Duty.
SIGMOD Rec., 1993

1992
Database Security Issues in Distributed Object-Oriented Databases.
Proceedings of the Distributed Object Management, 1992

1991
An Evaluation Framework for Algebraic Object-Oriented Query Models.
Proceedings of the Seventh International Conference on Data Engineering, 1991

Context Inheritance and Content Inheritance in an Object-Oriented Data Model.
Proceedings of the Advances in Computing and Information, 1991

Design Issues for Object-Oriented Database Systems.
Proceedings of the On Object-Oriented Database Systems, 1991

1989
The Role of Polymorphism in Schema Evolution in an Object-Oriented Database.
IEEE Trans. Knowl. Data Eng., 1989

1988
Identity, Equality and Query Optimization.
Proceedings of the Advances in Object-Oriented Database Systems, 1988

1986
The Design of a Relational Database System with Abstract Data Types for Domains.
ACM Trans. Database Syst., 1986

Object Modelling.
Proceedings of the 1986 International Workshop on Object-Oriented Database Systems, 1986

1985
A framework for the generation of microcomputer-based application.
Proceedings of the 1985 ACM SIGSMALL symposium on Small systems, 1985

1982
Teaching relational database concepts in a university environment.
Proceedings of the13th SIGCSE Technical Symposium on Computer Science Education, 1982

A graphical model of procedures for an automated manager's assistant.
Proceedings of the ACM 1982 Annual Conference, Dallas, TX, USA, October 25-27, 1982, 1982

1979
Testing for Existence of a Covering Boyce-Codd normal Form.
Inf. Process. Lett., 1979

Towards a Universal Relation Interface.
Proceedings of the Fifth International Conference on Very Large Data Bases, 1979

1978
Candidate Keys for Relations.
J. Comput. Syst. Sci., 1978


  Loading...