Cited By
View all- Ameer SPraharaj LSandhu RBhatt SGupta M(2024)ZTA-IoT: A Novel Architecture for Zero-Trust in IoT Systems and an Ensuing Usage Control ModelACM Transactions on Privacy and Security10.1145/367114727:3(1-36)Online publication date: 17-Jun-2024
- Wan LWang KMahadewa KWang HBai GChua TNgo CKa-Wei Lee RKumar RLauw H(2024)Don't Bite Off More than You Can Chew: Investigating Excessive Permission Requests in Trigger-Action IntegrationsProceedings of the ACM Web Conference 202410.1145/3589334.3645721(3106-3116)Online publication date: 13-May-2024
- Polinsky IDatta PBates AEnck WChua TNgo CKa-Wei Lee RKumar RLauw H(2024)GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security PoliciesProceedings of the ACM Web Conference 202410.1145/3589334.3645436(1644-1655)Online publication date: 13-May-2024
- Show More Cited By