Jason Crampton
Affiliations:- Royal Holloway, University of London, UK
According to our database1,
Jason Crampton
authored at least 112 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
2022
ACM Trans. Priv. Secur., 2022
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
2021
Towards Better Understanding of User Authorization Query Problem via Multi-variable Complexity Analysis.
ACM Trans. Priv. Secur., 2021
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
2017
J. Comput. Secur., 2017
Cryptographic enforcement of information flow policies without public information via tree partitions.
J. Comput. Secur., 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
Proceedings of the Computer Security - ESORICS 2017, 2017
Canonical Completeness in Lattice-Based Languages for Attribute-Based Access Control.
Proceedings of the Seventh ACM Conference on Data and Application Security and Privacy, 2017
Proceedings of the Algorithms and Complexity - 10th International Conference, 2017
2016
On the Workflow Satisfiability Problem with Class-Independent Constraints for Hierarchical Organizations.
ACM Trans. Priv. Secur., 2016
Algorithms for the workflow satisfiability problem engineered for counting constraints.
J. Comb. Optim., 2016
CoRR, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Data and Applications Security and Privacy XXX, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the Algorithmic Aspects in Information and Management, 2016
2015
CoRR, 2015
Proceedings of the Security and Trust Management - 11th International Workshop, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
Proceedings of the 10th International Symposium on Parameterized and Exact Computation, 2015
Optimal Constructions for Chain-Based Cryptographic Enforcement of Information Flow Policies.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Authorized workflow schemas: deciding realizability through $$\mathsf{LTL }(\mathsf{F })$$ model checking.
Int. J. Softw. Tools Technol. Transf., 2014
J. Artif. Intell. Res., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
CoRR, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the Security and Trust Management - 10th International Workshop, 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Engineering Algorithms for Workflow Satisfiability Problem with User-Independent Constraints.
Proceedings of the Frontiers in Algorithmics - 8th International Workshop, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014
2013
On the Parameterized Complexity and Kernelization of the Workflow Satisfiability Problem.
ACM Trans. Inf. Syst. Secur., 2013
Dagstuhl Reports, 2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the Eleventh Annual International Conference on Privacy, Security and Trust, 2013
Proceedings of the Network and System Security - 7th International Conference, 2013
Proceedings of the SPSM'13, 2013
Fixed-Parameter Tractability of Workflow Satisfiability in the Presence of Seniority Constraints.
Proceedings of the Frontiers in Algorithmics <i>and</i> Algorithmic Aspects in Information and Management, 2013
2012
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012
Proceedings of the Principles of Security and Trust - First International Conference, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Authorization Enforcement in Workflows: Maintaining Realizability Via Automated Reasoning.
Proceedings of the Third Workshop on Practical Aspects of Automated Reasoning, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Practical and efficient cryptographic enforcement of interval-based access control policies.
ACM Trans. Inf. Syst. Secur., 2011
Int. J. Inf. Sec., 2011
Proceedings of the Security and Trust Management - 7th International Workshop, 2011
Proceedings of the Computer Security - ESORICS 2011, 2011
On the Modeling and Verification of Security-Aware and Process-Aware Information Systems.
Proceedings of the Business Process Management Workshops, 2011
2010
Proceedings of the Insider Threats in Cyber Security, 2010
Practical Constructions for the Efficient Cryptographic Enforcement of Interval-Based Access Control Policies
CoRR, 2010
Proceedings of the Security and Trust Management - 6th International Workshop, 2010
A Framework for the Modular Specification and Orchestration of Authorization Policies.
Proceedings of the Information Security Technology for Applications, 2010
Proceedings of the Formal Aspects of Security and Trust - 7th International Workshop, 2010
Proceedings of the Computer Security, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
2009
J. Log. Algebraic Methods Program., 2009
Proceedings of the Identity and Privacy in the Internet Age, 2009
Proceedings of the Computer Security, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
2008
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Data and Applications Security XXII, 2008
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
2007
Proceedings of the 6th International Workshop on Software and Performance, 2007
Proceedings of the 4th ACM Workshop On Secure Web Services, 2007
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
An improved restricted growth function genetic algorithm for the consensus clustering of retinal nerve fibre data.
Proceedings of the Genetic and Evolutionary Computation Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
ACM Trans. Softw. Eng. Methodol., 2006
Applying hierarchical and role-based access control to XML documents.
Comput. Syst. Sci. Eng., 2006
The secondary and approximate authorization model and its application to Bell-LaPadula policies.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006
Proceedings of the 2006 IEEE International Conference on Web Services (ICWS 2006), 2006
Proceedings of the Data and Applications Security XX, 2006
Proceedings of the 19th IEEE Computer Security Foundations Workshop, 2006
2005
Evol. Comput., 2005
Proceedings of the 10th ACM Symposium on Access Control Models and Technologies, 2005
Proceedings of the IEEE Congress on Evolutionary Computation, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the 17th IEEE Computer Security Foundations Workshop, 2004
2003
ACM Trans. Inf. Syst. Secur., 2003
South Afr. Comput. J., 2003
Proceedings of the 8th ACM Symposium on Access Control Models and Technologies, 2003
Proceedings of the 10th ACM Conference on Computer and Communications Security, 2003
2002
Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, 2002
2001