


default search action
SACMAT 2018: Indianapolis, IN, USA
- Elisa Bertino, Dan Lin, Jorge Lobo:

Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018
Keynote Address
- Danfeng (Daphne) Yao:

Data Breach and Multiple Points to Stop It. 1
Access Control and Authentication
- Dianxiang Xu, Roshan Shrestha, Ning Shen:

Automated Coverage-Based Testing of XACML Policies. 3-14 - Marco Benedetti, Marco Mori:

Parametric RBAC Maintenance via Max-SAT. 15-25 - Bruhadeshwar Bezawada

, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. 27-38
Blue sky session: Next generation security services for emerging networks
- Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:

Self-Generation of Access Control Policies. 39-47 - Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone

:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. 49 - Elisa Bertino, Mohamed Nabeel:

Securing Named Data Networks: Challenges and the Way Forward. 51-59
Short Papers
- Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv:

Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models. 61-67 - Hossein Shirazi

, Bruhadeshwar Bezawada
, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. 69-75 - Roberto Di Pietro

, Xavier Salleras
, Matteo Signorini, Erez Waisbard:
A blockchain-based Trust System for the Internet of Things. 77-83 - Paul Georg Wagner

, Pascal Birnstill
, Jürgen Beyerer:
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves. 85-91
Research Track - Privacy
- Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee

, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo
:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. 93-104 - Adam J. Lee

, Jacob T. Biehl
, Conor Curry:
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms. 105-116 - Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise

:
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. 117-128
Keynote Address II
- Dan Thomsen, Elisa Bertino:

Network Policy Enforcement Using Transactions: The NEUTRON Approach. 129-136
Research Track - ABAC
- Manar Alohaly, Hassan Takabi, Eduardo Blanco:

A Deep Learning Approach for Extracting Attributes of ABAC Policies. 137-148 - Charles Morisset, Tim A. C. Willemse, Nicola Zannone

:
Efficient Extended ABAC Evaluation. 149-160 - Padmavathi Iyer, Amirreza Masoumzadeh:

Mining Positive and Negative Attribute-Based Access Control Policy Rules. 161-172
Blue sky session: Innovation in access control and privacy-aware data management for Big Data and IoT
- Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash

, Maribel Fernández
:
Towards a Privacy-Aware Qunatified Self Data Management Framework. 173-184 - Pietro Colombo

, Elena Ferrari:
Access Control in the Era of Big Data: State of the Art and Research Directions. 185-192 - Maanak Gupta, Ravi S. Sandhu:

Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. 193-204
Demo/Posters
- Maryam Davari, Elisa Bertino:

Reactive Access Control Systems. 205-207 - John Heaps, Rocky Slavin

, Xiaoyin Wang:
Toward A Code Pattern Based Vulnerability Measurement Model. 209-211 - Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijayalakshmi Atluri
:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. 213-215 - Jiaming Jiang, Rada Chirkova, Jon Doyle

, Arnon Rosenthal:
Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control. 217-219
10 years best paper award Invited Talk
- Omar Chowdhury:

How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security. 221
Research Track- IoT
- Pietro Colombo

, Elena Ferrari:
Access Control Enforcement within MQTT-based Internet of Things Ecosystems. 223-234 - Tahir Ahmad

, Umberto Morelli
, Silvio Ranise
, Nicola Zannone
:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. 235-246 - Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:

HCAP: A History-Based Capability System for IoT Devices. 247-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














