About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

-- ACM OpenTOC to download SACMAT'19 papers --

:: June 4, 2019 ::

08:00 - 08:40 Breakfast

08:45 - 08:55 Opening remarks by general chair

08:55 - 09:05 Program introduction by PC co-chairs

09:05 - 10:00 Keynote

- Chair: Jianwei Niu

- Murat Kantarcioglu: Securing Big Data: New Access Control Challenges and Approaches

10:00 - 10:30 Coffee Break

10:30 - 12:00 Session 1: Mechanisms and Structures

- Access Control for Binary Integrity Protection using Ethereum

Oliver Stengele (Karlsruhe Institute of Technology); Andreas Baumeister (Fraunhofer); Pascal Birnstill (Karlsruhe Institute of Technology); Hannes Hartenstein (Karlsruhe Institute of Technology)


- CAOS: Concurrent-Access Obfuscated Store

Mihai Ordean (University of Birmingham); Mark Ryan (University of Birmingham); David Galindo (University of Birmingham)


- PolTree: A Data Structure for Making Efficient Access Decisions in ABAC

Ronit Nath (Indian Institute of Technology Kharagpur); Saptarshi Das(Indian Institute of Technology Kharagpur); Shamik Sural(Indian Institute of Technology Kharagpur); Jaideep Vaidya(Rutgers University); Vijay Atluri (Rutgers University)

12:00 - 13:30 Lunch

13:30 - 15:00 Session 2: IoT and Social

- FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree

Joshua Morris (University of Missouri Columbia); Dan Lin (University of Missouri Columbia; Anna Squicciarini (The Pennsylvania State University)


- Brokering Policies and Execution Monitors for IoT Middleware

Juan Carlos Fuentes Carranza (University of Calgary); Philip W. L. Fong (University of Calgary)


- Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms

Moosa Yahyazadeh (The University of Iowa); Proyash Podder (Florida International University); Endadul Hoque (Florida International University); Omar Chowdhury (The University of Iowa)

15:00 - 15:30 Coffee Break

15:30 - 17:30 Session 3: Blue Sky/Vision Track

- Owner-centric Sharing of Physical Resources, Data, and Data-driven Insights in Digital Ecosystems

Kwok Cheung (Extropy, United Kingdom); Michael Huth (XAIN AG, Germany); Laurence Krik (Extropy, United Kingdom); Leif-Nissen Lundbæk (XAIN AG, Germany); Rodolphe Marques (XAIN AG, Germany); Jan Petsche (XAIN AG, Germany)


- A Blockchain-Based Trust Framework for Collaborative Internet-of-Things

Bo Tang (Sichuan Changhong Electric Co., Ltd., China); Hongjuan Kang (Sichuan Changhong Electric Co., Ltd., China); Jingwen Fan (Sichuan Changhong Electric Co., Ltd., China); Qi Li (Tsinghua University, China); Ravi Sandhu (University of Texas at San Antonio)


- An OpenRBAC Semantic Model for Access Control in Vehicular Networks

I-Ling Yen (The University of Texas at Dallas); Sultan Alsarra (The University of Texas at Dallas); Yongtao Huang (The University of Texas at Dallas); Bhavani Thuraisingham (The University of Texas at Dallas); Farokh Bastani (The University of Texas at Dallas)


- Toward Detection of Access Control Models from Source Code via Word Embedding

John Heaps (University of Texas at San Antonio); Xiaoyin Wang (University of Texas at San Antonio); Travis Breaux (Carnegie Mellon University); Jianwei Niu (University of Texas at San Antonio)


18:00 Reception and Posters



:: June 5, 2019 ::

08:00 - 09:00 Breakfast

09:00 - 10:00 Keynote 2

- Kory Fong: Trading SLAs for PhDs: Moving towards streamlined innovation with academia

10:00 - 10:30 Coffee Break

10:30 - 12:00 Session 4: Applications and Protocols

- On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols

Eduard Marin Fabregas (University of Birmingham); Enrique Argones Rúa (imec-COSIC KU Leuven); Dave Singelée (imec-COSIC KU Leuven); Bart Preneel (imec-COSIC KU Leuven)


- HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control

Ahmed Khalil Abdulla (Hamad bin Khalifa University); Spiridon Bakiras (Hamad bin Khalifa University)


- (Short) Generalized Mining of Relationship Based Access Control Policies in Evolving Systems

Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY)


- (Short) Enhancing Biometric-Capsule-based Authentication and Facial Recognition Via Deep Learning

Tyler Phillips (Indiana University-Purdue University Indianapolis); Xukai Zou (Indiana University-Purdue University Indianapolis); Feng Li (Indiana University-Purdue University Indianapolis); Ninghui Li (Purdue University)

12:00 - 13:30 Lunch

13:30 - 14:30 Junior Keynote

- Chair: Adam J. Lee

- Adam Doupe': History and Future of Automated Vulnerability Analysis

14:30 - 16:00 Session 5: Mining and Analysis

- Towards Effective Verification of Multi-Model Access Control Properties

Bernhard J. Berger (Universität Bremen); Christian Maeder (Universität Bremen); Rodrigue Wete Nguempnang (Universität Bremen); Karsten Sohr and Carlos Rubio-Medrano (Universität Bremen)


- Efficient and Extensible Policy Mining for Relationship-Based Access Control

Thang Bui (Stony Brook University); Scott Stoller (Stony Brook University); Hieu Le (Stony Brook University)


- (Short) A Rule-based Approach to the Decidability of Safety of ABAC_alpha

Mircea Marin (West University of Timisoara); Temur Kutsia (RISC, Johannes Kepler University Linz); Besik Dundua (Ilia Vekua Institute of Applied Mathematics, Tbilisi State University)


- (Short) Bounded and Approximate Strong Satisfiability in Workflows

Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Diptapriyo Majumdar (Royal Holloway, University of London)

16:00 - 16:30 Coffee Break

16:30 - 17:15 Test of time award Invited Talk

- A Sematic Web based Framework for Social network Access Control

Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani M. Thuraisingham

18:30 Conference Banquet & Best Paper Award



:: June 6, 2019 ::

08:00 - 09:00 Breakfast

09:00 - 10:45 Session 7: Models and Emerging Applications

- Using provenance for secure data fusion in cooperative systems

Clara Bertolissi (LIF-Universite Aix-Marseille 1 and King's College London); Jerry Den Hartog (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology)


- Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies

Carlos Rubio Medrano (Arizona State University); Shaishavkumar Jogani (Arizona State University); Maria Leitner (Austrian Institute of Technology); Ziming Zhao (Rochester Institute of Technology); Gail-Joon Ahn (Arizona State University)


- (Short) CMCAP: Ephemeral sandboxes for adaptive access control

Theogene Hakiza Bucuti (University of North Texas); Ram Dantu (University of North Texas); Kirill Morozov (University of North Texas)


- (Short) Mutual Authorizations:Semantics, Integration Issues, and Performance

Gabriela Lorena Suntaxi Ona (Karlsruhe Institute of Technology); Aboubakr Achraf El Ghazi (Karlsruhe Institute of Technology); Klemens Böhm (Karlsruhe Institute of Technology)


- (Demo) CloudProtect – A cloud-based software protection service

Andreas Schaad (University of Appl. Sciences Offenburg, Germany); Björn Grohmann (Wibu-Systems AG, Germany); Oliver Winzenried (Wibu-Systems AG, Germany)

10:45 - 11:15 Coffee Break

11:15 - 12:15 Session 8: Panel Discussions

- Topic (TBD)


12:15 Concluding remarks

Copyright (c) ACM SACMAT All rights reserved.