default search action
SACMAT 2018: Indianapolis, IN, USA
- Elisa Bertino, Dan Lin, Jorge Lobo:
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018
Keynote Address
- Danfeng (Daphne) Yao:
Data Breach and Multiple Points to Stop It. 1
Access Control and Authentication
- Dianxiang Xu, Roshan Shrestha, Ning Shen:
Automated Coverage-Based Testing of XACML Policies. 3-14 - Marco Benedetti, Marco Mori:
Parametric RBAC Maintenance via Max-SAT. 15-25 - Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li:
Independent Key Distribution Protocols for Broadcast Authentication. 27-38
Blue sky session: Next generation security services for emerging networks
- Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione:
Self-Generation of Access Control Policies. 39-47 - Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone:
Multi-Party Access Control: Requirements, State of the Art and Open Challenges. 49 - Elisa Bertino, Mohamed Nabeel:
Securing Named Data Networks: Challenges and the Way Forward. 51-59
Short Papers
- Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv:
Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models. 61-67 - Hossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray:
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features. 69-75 - Roberto Di Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard:
A blockchain-based Trust System for the Internet of Things. 77-83 - Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer:
Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves. 85-91
Research Track - Privacy
- Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo:
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. 93-104 - Adam J. Lee, Jacob T. Biehl, Conor Curry:
Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms. 105-116 - Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise:
Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. 117-128
Keynote Address II
- Dan Thomsen, Elisa Bertino:
Network Policy Enforcement Using Transactions: The NEUTRON Approach. 129-136
Research Track - ABAC
- Manar Alohaly, Hassan Takabi, Eduardo Blanco:
A Deep Learning Approach for Extracting Attributes of ABAC Policies. 137-148 - Charles Morisset, Tim A. C. Willemse, Nicola Zannone:
Efficient Extended ABAC Evaluation. 149-160 - Padmavathi Iyer, Amirreza Masoumzadeh:
Mining Positive and Negative Attribute-Based Access Control Policy Rules. 161-172
Blue sky session: Innovation in access control and privacy-aware data management for Big Data and IoT
- Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández:
Towards a Privacy-Aware Qunatified Self Data Management Framework. 173-184 - Pietro Colombo, Elena Ferrari:
Access Control in the Era of Big Data: State of the Art and Research Directions. 185-192 - Maanak Gupta, Ravi S. Sandhu:
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. 193-204
Demo/Posters
- Maryam Davari, Elisa Bertino:
Reactive Access Control Systems. 205-207 - John Heaps, Rocky Slavin, Xiaoyin Wang:
Toward A Code Pattern Based Vulnerability Measurement Model. 209-211 - Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. 213-215 - Jiaming Jiang, Rada Chirkova, Jon Doyle, Arnon Rosenthal:
Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control. 217-219
10 years best paper award Invited Talk
- Omar Chowdhury:
How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security. 221
Research Track- IoT
- Pietro Colombo, Elena Ferrari:
Access Control Enforcement within MQTT-based Internet of Things Ecosystems. 223-234 - Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone:
A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. 235-246 - Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini:
HCAP: A History-Based Capability System for IoT Devices. 247-258
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.