Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Conference Location
Hotel Reservation
Since 1995


Maintained and
Sponsored by

-- ACM OpenTOC to download SACMAT'16 papers --

Date Start End Event  
6-Jun 9:00 9:10 Openning Remarks  
  9:10 10:10 Keynote Talk: Dr. Virgil Gligor Title: Establishing and Maintaining Root of Trust on Commodity Computer Systems
  10:10 10:40 Coffee Break  
  10:40 12:20 Session 1:Network and Mobile Access Control

Chair: Axel Kern
Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam DoupÈ, Gail-Joon Ahn, Kuang-Ching Wang and Juan Deng. State-aware Network Access Management for Software-Defined Networks

Minyue Ni, Yang Zhang, Weili Han and Jun Pang. An Empirical Study on User Access Control in Online Social Networks

Oyindamola Oluwatimi and Elisa Bertino. An Application Restriction System for Bring-Your-Own-Device Scenarios

Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-Am-Nuai, Suresh Chari, Ian Molloy and Youngja Park. Tri-Modularization of Firewall Policies
  12:20 1:30 Lunch (provided by conference)  
  1:30 3:00 Panel: Security and Privacy in the Age of Internet of Things: Opportunities and Challenges Panel moderator: Jianwei Niu
Panelists: Yier Jin, Adam J. Lee, Ravi Sandhu, Wenyuan Xu, Xiaoguang Zhang
  3:00 3:30 Coffee Break  
  3:30 5:10 Session 2: Access Control in Applications

Chair: XiaoFeng Wang
Hitesh Padekar, Younghee Park, Hongxin Hu and Sang-Yoon Chang. Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks

Oyindamola Oluwatimi, Daniele Midi and Elisa Bertino. A Context-Aware System to Secure Enterprise Content

(Short) Jun Zhu, Bill Chu and Heather Lipford. Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code

(Short) Thomas Pasquier, Jean Bacon, David Eyers and Jatinder Singh. Data-Centric Access Control for Cloud Computing

Daniel Ricardo Dos Santos, Serena Elisa Ponta and Silvio Ranise. Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability
  6:00 8:00 Reception & Posters  
7-Jun 9:00 10:00 Keynote Talk: Dr. Bhavani Thuraisingham Title: Cloud-centric Assured Information Sharing
  10:00 10:30 Coffee Break  
  10:00 11:30 Poster Session Chairs: Adam Lee and Bill Garrison

Can Wang, Gang Liu, Runnan Zhang, Jinhui Liu, Huimin Song, Shaomin Ji. BTG-BIBA: BIBA Model with a Break the Glass Strategies

Huimin Song, Gang Liu, Runnan Zhang, Quan Wang, Can Wang, Guofang Zhang. Hierarchical-System-Based Access Control(HSAC) Model

Luca Compagna, Daniel R. dos Santos, Serena E. Ponta, Silvio Ranise. Cerberus - Automated Synthesis of Enforcement Mechanisms for Security-sensitive Business Processes

Ameni Ben Fadhel. Model-driven Specification and Run-time Verification for Role-based Access Control Policies

Claiborne Johnson, Tom MacGahan, John Heaps, Armando L. Rodriguez, Jeffery von Ronne, Jianwei Niu. Assume-Guarantee Specification of an Actor-Component Architecture

Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino. Application-Level Anonymity with IdentiDroid

Jason Crampton, Gregory Gutin, Daniel Karapetyan, Remi Watrigant. The Bi-objective Workflow Satisfiability Problem

Jing Chen, Christopher Gates, Ninghui Li, Robert W. Proctor. Effective Risk Communication for Android Apps: Influence of Risk/Safety Information Framing

Wonkyu Han, Hongxin Hu, Gail-Joon Ahn, and Ziming Zhao. Building Robust Firewalls for Software-Defined Networks

  11:30 13:30 Lunch (provided by conference)  
  13:30 15:10 Session 3: Policy Engineering

Chair: Weili Han
Jason Crampton, Gregory Gutin and RÈmi Watrigant. Resiliency Policies in Access Control Revisited

Aaron Elliott and Scott Knight. Start Here: Engineering Scalable Access Control Systems

Pooya Mehregan and Philip W. L. Fong. Policy Negotiation for Co-owned Resources in Relationship-Based Access Control

Dianxiang Xu, Zhenyu Wang, Shuai Peng and Ning Shen. Automated Fault Localization of XACML Policies
  15:10 15:40 Coffee Break  
  15:40 17:20 Session 4: Access Control Specification

Chair: Sherman Chow
Jason Crampton and Conrad Williams. On Completeness in Languages for Attribute-based Access Control

Yuan Cheng, Khalid Bijon and Ravi Sandhu. Extended ReBAC Administrative Models to Express Multi-Tenant RBAC Policies

(Short) Marc Hüffmeyer and Ulf Schreier. Formal Comparison of an Attribute Based Access Control Language for RESTful Services with XACML

Ameni Ben Fadhel, Domenico Bianculli and Lionel Briand. GemRBAC-DSL: a High-level Specification Language for Role-based Access Control Policies
  18:00 20:00 Banquet (off-site venue, TBA)  
8-Jun 9:00 10:00 Keynote Talk: Dr. Robert Deng Title: Achieving End-to-End Security in Mobile Computing
  10:00 10:30 Coffee Break  
  10:30 12:05 Session 5: Access Control Enforcement

Chair: Philip Fong
Zhiping Wu and Frank Tompa. A Space-Efficient Data Structure for Fast Access Control in ECM Systems

Julien Bringer, HervÈ Chabanne, Othmane El Omri and Constance Morel. Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting

Sherman S. M. Chow. A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation

Cory Thoma, Adam J. Lee and Alexandros Labrinidis. PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing
  12:05 12:10 End Remarks by the Organizers  

Copyright (c) ACM SACMAT All rights reserved.