SACMAT '15- Proceedings of the 20th ACM Symposium on Access Control Models and Technologies

Full Citation in the ACM Digital Library

SESSION: Keynote I

Post-Snowden Threat Models

SESSION: Formalism and Analysis

Valued Workflow Satisfiability Problem

Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies

Automated Inference of Access Control Policies for Web Applications

SESSION: Cloud

Commune: Shared Ownership in an Agnostic Cloud

SecLoc: Securing Location-Sensitive Storage in the Cloud

Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling

SESSION: Logic and Inference

A Logical Approach to Restricting Access in Online Social Networks

Preventing Information Inference in Access Control

On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval

SESSION: Keynote II

Challenges in Making Access Control Sensitive to the "Right" Contexts

SESSION: Access Management

Relationship-Based Access Control for an Open-Source Medical Records System

Federated Access Management for Collaborative Network Environments: Framework and Case Study

Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking

DEMONSTRATION SESSION: Demonstrations

A Prototype to Reduce the Amount of Accessible Information

A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies

Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques

Hard Instances for Verification Problems in Access Control

Initial Encryption of large Searchable Data Sets using Hadoop

Generating Secure Images for CAPTCHAs through Noise Addition

SESSION: Trust and Applications

A Logic of Trust for Reasoning about Delegation and Revocation

Towards Attribute-Based Authorisation for Bidirectional Programming

PANEL SESSION: Panel

Privacy and Access Control: How are These Two concepts Related?

SESSION: Permission Management

Mitigating Access Control Vulnerabilities through Interactive Static Analysis

Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach

SPA: Inviting Your Friends to Help Set Android Apps