Stop the war!
Остановите войну!
for scientists:
default search action
SACMAT 2019: Toronto, ON, Canada
- Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0
Keynote Address I
- Murat Kantarcioglu:
Securing Big Data: New Access Control Challenges and Approaches. 1-2
Mechanisms and Structures
- Oliver Stengele, Andreas Baumeister, Pascal Birnstill, Hannes Hartenstein:
Access Control for Binary Integrity Protection using Ethereum. 3-12 - Mihai Ordean, Mark Ryan, David Galindo:
CAOS: Concurrent-Access Obfuscated Store. 13-24 - Ronit Nath, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijay Atluri:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. 25-35
IoT and Social
- Joshua Morris, Dan Lin, Anna Cinzia Squicciarini:
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree. 37-48 - Juan Carlos Fuentes Carranza, Philip W. L. Fong:
Brokering Policies and Execution Monitors for IoT Middleware. 49-60 - Moosa Yahyazadeh, Proyash Podder, Md. Endadul Hoque, Omar Chowdhury:
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. 61-72
Blue Sky/Vision Track
- Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche:
Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems. 73-81 - Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi S. Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. 83-92 - Sultan Alsarra, I-Ling Yen, Yongtao Huang, Farokh B. Bastani, Bhavani Thuraisingham:
An OpenRBAC Semantic Model for Access Control in Vehicular Networks. 93-102 - John Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:
Toward Detection of Access Control Models from Source Code via Word Embedding. 103-112
Applications and Protocols
- Eduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel:
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols. 113-122 - Ahmed Khalil Abdulla, Spiridon Bakiras:
HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control. 123-134 - Padmavathi Iyer, Amirreza Masoumzadeh:
Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems. 135-140 - Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. 141-146
Junior Keynote
- Adam Doupé:
History and Future of Automated Vulnerability Analysis. 147
Mining and Analysis
- Bernhard J. Berger, Christian Maeder, Rodrigue Wete Nguempnang, Karsten Sohr, Carlos E. Rubio-Medrano:
Towards Effective Verification of Multi-Model Access Control Properties. 149-160 - Thang Bui, Scott D. Stoller, Hieu Le:
Efficient and Extensible Policy Mining for Relationship-Based Access Control. 161-172 - Mircea Marin, Temur Kutsia, Besik Dundua:
A Rule-based Approach to the Decidability of Safety of ABACα. 173-178 - Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar:
Bounded and Approximate Strong Satisfiability in Workflows. 179-184
Models and Emerging Applications
- Clara Bertolissi, Jerry den Hartog, Nicola Zannone:
Using Provenance for Secure Data Fusion in Cooperative Systems. 185-194 - Carlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao, Gail-Joon Ahn:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. 195-206 - Theogene Hakiza Bucuti, Ram Dantu, Kirill Morozov:
CMCAP: Ephemeral Sandboxes for Adaptive Access Control. 207-212 - Gabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm:
Mutual Authorizations: Semantics and Integration Issues. 213-218 - Andreas Schaad, Björn Grohmann, Oliver Winzenried:
CloudProtect - A Cloud-based Software Protection Service. 219-221
Posters
- Feras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena, Mamoun Alazab:
Poster: A Pluggable Authentication Module for Big Data Federation Architecture. 223-225 - Josh Talkington, Ram Dantu, Kirill Morozov:
Verifying OAuth Implementations Through Encrypted Network Analysis. 227-229 - Ryan Shah, Shishir Nagaraja:
Poster: Unified Access Control for Surgical Robotics. 231-233
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.