About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

Accepted Full Papers:

Title HCAP: A History-Based Capability System for IoT Devices
Authors Lakshya Tandon (University of Calgary); Philip W. L. Fong (University of Calgary); Reihaneh Safavi-Naini (University of Calgary)
Title Automated Coverage-Based Testing of XACML Policies
Authors Dianxiang Xu (Boise State University); Roshan Shrestha (Boise State University); Ning Shen (Boise State University)
Title Efficient Extended ABAC Evaluation
Authors Charles Morisset (Newcastle University); Tim Willemse (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology)
Title My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks
Authors JLingjing Yu (Chinese Academy of Sciences); Sri Mounica Motipalli (The University of Kansas); Dongwon Lee (The Pennsylvania State University); Peng Liu (The Pennsylvania State University); Heng Xu (The Pennsylvania State University); Qingyun Liu (Chinese Academy of Sciences); Jianlong Tan (Chinese Academy of Sciences); Bo Luo (The University of Kansas)
Title Sensing or Watching? Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms
Authors Adam J. Lee (University of Pittsburgh); Jacob T. Biehl (FXPAL); Conor Curry (University of Pittsburgh)
Title A Deep Learning Approach for Extracting Attributes of ABAC Policies
Authors Manar Alohaly (University of North Texas); Hassan Takabi (University of North Texas); Eduardo Blanco (University of North Texas)
Title Solving Quantitative Workflow Satisfiability Problems with Optimization Modulo Theories Techniques
Authors Clara Bertolissi (Aix-Marseille University); Daniel Ricardo Dos Santos (Eindhoven University of Technology); Silvio Ranise (Fondazione Bruno Kessler)
Title Independent Key Distribution Protocols for Broadcast Authentication
Authors Bruhadeshwar Bezawada (Colorado State University); Sandeep Kulkarni (Michigan State University); Indrajit Ray (Colorado State University); Indrakshi Ray (Colorado State University); Rui Li (Dongguan University of Technology)
Title Access Control Enforcement within MQTT-based Internet of Things Ecosystems
Authors Pietro Colombo (Università dell'Insubria); Elena Ferrari (University of Insubria)
Title Parametric RBAC Maintenance via Max-SAT
Authors Marco Benedetti (Bank of Italy); Marco Mori (Bank of Italy)
Title Mining Positive and Negative Attribute-Based Access Control Policy Rules
Authors Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY)
Title A Lazy Approach to Access Control as a Service (ACaaS) for IoT
Authors Tahir Ahmad (Foundation Bruno Kessler); Umberto Morelli (Foundation Bruno Kessler); Nicola Zannone (Eindhoven University of Technology); Silvio Ranise (Foundation Bruno Kessler)

 

Accepted Short Papers:

Title Distributed Usage Control Enforcement Through Trusted Platform Modules And SGX Enclaves
Authors Paul Georg Wagner (Karlsruhe Institute of Technology); Pascal Birnstill (Fraunhofer); Jürgen Beyerer (Fraunhofer)
Title Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models
Authors Wenxi Zhang (Institute of Software Chinese Academy of Science); Hao Li (Institute of Software Chinese Academy of Science); Min Zhang (Institute of Software Chinese Academy of Science); Zhiquan Lv (National Computer Network Emergency Response Technical Team/Coordination Center of China)
Title "Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features
Authors Hossein Shirazi (Colorado State University); Bruhadeshwar Bezawada (Colorado State University); Indrakshi Ray (Colorado State University)
Title A Blockchain-based Distributed Access Control for the Internet of Things
Authors Roberto Di Pietro (Hamad Bin Khalifa University); Xavier Salleras (Pompeu Fabra University); Matteo Signorini (Nokia Bell Labs); Erez Waisbard (Nokia Bell Labs)

 

Accepted Blue Sky/Vision Track Papers:

Title Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things
Authors Maanak Gupta (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio)
Title Self-Generation of Access Control Policies
Authors Elisa Bertino (Purdue University); Seraphin Calo (IBM); Dinesh Verma (IBM); Gregory Cirincione (ARL); Supriyo Chakraborty (IBM)
Title Securing Named Data Networks: Challenges and the Way Forward
Authors Elisa Bertino (Purdue University); Mohamed Nabeel (Qatar Computing Research Institute)
Title Towards A Privacy-Aware Quantified Self Data Management Framework
Authors Bhavani Thuraisingham and Murat Kantarcioglu (The University of Texas at Dallas); Elisa Bertino (Purdue University); Jonathan Z. Bakdash (U.S. Army Research Laboratory Field Element at The University of Texas Dallas and Department of Psychology, Counseling, and Special Education, Texas A&M Commerce); Maribel Fernandez (Kings College, University of London)
Title Access Control in the Era of Big Data: State of the Art and Research Directions
Authors Pietro Colombo (Università dell'Insubria); Elena Ferrari (University of Insubria)
Title Multi-Party Access Control: Requirements, State of the Art and Open Challenges
Authors Anna Squicciarini (The Pennsylvania State University); Sarah Rajtmajer (Quantitative Scientific Solutions); Nicola Zannone (Eindhoven University of Technology)

 

 

 

Copyright (c) ACM SACMAT All rights reserved.