SACMAT '14- Proceedings of the 19th ACM symposium on Access control models and technologies

Full Citation in the ACM Digital Library

SESSION: Keynote I

A bodyguard of lies: the use of honey objects in information security

SESSION: Enforcement and applications

Hardware-enhanced distributed access enforcement for role-based access control

An access control concept for novel automotive HMI systems

Monitor placement for large-scale systems

SESSION: Policy analytics

Anomaly detection and visualization in generative RBAC models

Reduction of access control decisions

Sorting out role based access control

SESSION: Systems

Towards more usable information flow policies for contemporary operating systems

Attribute based access control for APIs in spring security

Comprehensive integrity protection for desktop linux

SESSION: Models and analysis

Game theoretic analysis of multiparty access control in online social networks

Scalable and precise automated analysis of administrative temporal role-based access control

Access control models for geo-social computing systems

PANEL SESSION: Panel

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?

SESSION: Privacy and confidentiality

Limiting access to unintentionally leaked sensitive documents using malware signatures

Optimized and controlled provisioning of encrypted outsourced data

User-centric identity as a service-architecture for eIDs with selective attribute disclosure

SESSION: Risk, redaction and RDF

Towards fine grained RDF access control

Redaction based RDF access control language

A system for risk awareness during role mining

SESSION: Keynote II

Re-thinking networked privacy, security, identity and access control in our surveillance states

SESSION: New approaches

Path conditions and principal matching: a new approach to access control

An actor-based, application-aware access control evaluation framework

Policy models to protect resource retrieval