About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

Accepted Full Papers:

Title [matrix] Decomposition: Analysis of an Access ControlApproach on Transaction-based DAGs without Finality
Authors Florian Jacob, Luca Becker, Grashöfer Jan and Hannes Hartenstein
Title A Data Access Model for Privacy-Preserving Cloud-IoT Architectures
Authors Maribel Fernandez, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro and Bhavani Thuraisingham
Title A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies
Authors Thang Bui and Scott D. stoller
Title Active Learning of Relationship-Based Access Control Policies
Authors Padmavathi Iyer and Amirreza Masoumzadeh
Title Automated Strong Mutation Testing of XACML Policies
Authors Dianxiang Xu, Roshan Shrestha and Ning Shen
Title Constraint Branching in Workflow Satisfiability Problem
Authors Gregory Gutin and Daniel Karapetyan
Title Declarative Access Control for Aggregations of Multiple Ownership Data
Authors Marco Rosa, Francesco Di Cerbo and Rocio Cabrera Lozoya
Title Informed Privilege-Complexity Trade-Offs in RBAC Configuration
Authors Jon Currey, Robbie McKinstry, Armon Dadgar and Mark Gritter
Title Metering Graphical Data Leakage with Snowman
Authors Qiuyu Xiao, Brittany Subialdea, Lujo Bauer and Michael Reiter
Title Norm-based Access Control
Authors Onuralp Ulusoy and Pinar Yolum
Title Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies
Authors Carlos Rubio Medrano, Luis Claramunt, Shaishavkumar Jogani and Gail-Joon Ahn
Title Security and Privacy Analysis of Android Family Locator Apps
Authors Khalid Alkhattabi, Ahmed Alshehri and Chuan Yue
Title Visualizing and Interpreting RNN Models in URL-based Phishing Detection
Authors Tao Feng and Chuan Yue

 

Accepted Short Papers:

Title Benchmarking UAQ Solvers
Authors Alessandro Armando, Giorgia Gazzarata and Fatih Turkmen
Title Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem
Authors Tahir Ahmad, Silvio Ranise and Umberto Morelli
Title Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android
Authors Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian and Heng Yin

 

Accepted Blue Sky/Vision Track Papers:

Title ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things
Authors Smriti Bhatt and Ravi Sandhu
Title Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android
Authors Nurul Momen, Sven Bock and Lothar Fritsch
Title On Policy Migrations
Authors Jorge Lobo, Elisa Bertino and Alessandra Russo

 

Accepted Demos:

Title AQUA: An Efficient Solver for the User Authorization Query Problem
Authors Alessandro Armando, Giorgia A. Gazzarata, and Fatih Turkmen
Title Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems
Authors Pietro Colombo, Elena Ferrari, and Samuele Salvia

 

Accepted Posters:

Title Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare in Organizations
Authors Paras Bhatt, Smriti Bhatt, and Myung Ko

 

 

Copyright (c) ACM SACMAT All rights reserved.