About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

Accepted Full Papers:

Title Access Control for Binary Integrity Protection using Ethereum
Authors Oliver Stengele (Karlsruhe Institute of Technology); Andreas Baumeister (Fraunhofer); Pascal Birnstill (Karlsruhe Institute of Technology); Hannes Hartenstein (Karlsruhe Institute of Technology)
Title CAOS: Concurrent-Access Obfuscated Store
Authors Mihai Ordean (University of Birmingham); Mark Ryan (University of Birmingham); David Galindo (University of Birmingham)
Title PolTree: A Data Structure for Making Efficient Access Decisions in ABAC
Authors Ronit Nath (Indian Institute of Technology Kharagpur); Saptarshi Das(Indian Institute of Technology Kharagpur); Shamik Sural(Indian Institute of Technology Kharagpur); Jaideep Vaidya(Rutgers University); Vijay Atluri (Rutgers University)
Title FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree
Authors Joshua Morris (University of Missouri Columbia); Dan Lin (University of Missouri Columbia; Anna Squicciarini (The Pennsylvania State University)
Title Brokering Policies and Execution Monitors for IoT Middleware
Authors Juan Carlos Fuentes Carranza (University of Calgary); Philip W. L. Fong (University of Calgary)
Title Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms
Authors Moosa Yahyazadeh (The University of Iowa); Proyash Podder (Florida International University); Endadul Hoque (Florida International University); Omar Chowdhury (The University of Iowa)
Title On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols
Authors Eduard Marin Fabregas (University of Birmingham); Enrique Argones Rúa (imec-COSIC KU Leuven); Dave Singelée (imec-COSIC KU Leuven); Bart Preneel (imec-COSIC KU Leuven)
Title HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control
Authors Ahmed Khalil Abdulla (Hamad bin Khalifa University); Spiridon Bakiras (Hamad bin Khalifa University)
Title Towards Effective Verification of Multi-Model Access Control Properties
Authors Bernhard J. Berger (Universitat Bremen); Christian Maeder (Universitat Bremen); Rodrigue Wete Nguempnang (Universitat Bremen); Karsten Sohr and Carlos Rubio-Medrano (Universitat Bremen)
Title Efficient and Extensible Policy Mining for Relationship-Based Access Control
Authors Thang Bui (Stony Brook University); Scott Stoller (Stony Brook University); Hieu Le (Stony Brook University)
Title Using provenance for secure data fusion in cooperative systems
Authors Clara Bertolissi (LIF-Universite Aix-Marseille 1 and King's College London); Jerry Den Hartog (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology)
Title Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies
Authors Carlos Rubio Medrano (Arizona State University); Shaishavkumar Jogani (Arizona State University); Maria Leitner (Austrian Institute of Technology); Ziming Zhao (Rochester Institute of Technology); Gail-Joon Ahn (Arizona State University)

 

Accepted Short Papers:

Title Generalized Mining of Relationship Based Access Control Policies in Evolving Systems
Authors Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY)
Title Enhancing Biometric-Capsule-based Authentication and Facial Recognition Via Deep Learning
Authors Tyler Phillips (Indiana University-Purdue University Indianapolis); Xukai Zou (Indiana University-Purdue University Indianapolis); Feng Li (Indiana University-Purdue University Indianapolis); Ninghui Li (Purdue University)
Title A Rule-based Approach to the Decidability of Safety of ABAC_alpha
Authors Mircea Marin (West University of Timisoara); Temur Kutsia (RISC, Johannes Kepler University Linz); Besik Dundua (Ilia Vekua Institute of Applied Mathematics, Tbilisi State University)
Title Bounded and Approximate Strong Satisfiability in Workflows
Authors Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Diptapriyo Majumdar (Royal Holloway, University of London)
Title CMCAP: Ephemeral sandboxes for adaptive access control
Authors Theogene Hakiza Bucuti (University of North Texas); Ram Dantu (University of North Texas); Kirill Morozov (University of North Texas)
Title Mutual Authorizations:Semantics, Integration Issues, and Performance
Authors Gabriela Lorena Suntaxi Ona (Karlsruhe Institute of Technology); Aboubakr Achraf El Ghazi (Karlsruhe Institute of Technology); Klemens Böhm (Karlsruhe Institute of Technology)

 

Accepted Blue Sky/Vision Track Papers:

Title Owner-centric Sharing of Physical Resources, Data, and Data-driven Insights in Digital Ecosystems
Authors Kwok Cheung (Extropy, United Kingdom); Michael Huth (XAIN AG, Germany); Laurence Krik (Extropy, United Kingdom); Leif-Nissen Lundbæk (XAIN AG, Germany); Rodolphe Marques (XAIN AG, Germany); Jan Petsche (XAIN AG, Germany)
Title A Blockchain-Based Trust Framework for Collaborative Internet-of-Things
Authors Bo Tang (Sichuan Changhong Electric Co., Ltd., China); Hongjuan Kang (Sichuan Changhong Electric Co., Ltd., China); Jingwen Fan (Sichuan Changhong Electric Co., Ltd., China); Qi Li (Tsinghua University, China); Ravi Sandhu (University of Texas at San Antonio)
Title An OpenRBAC Semantic Model for Access Control in Vehicular Networks
Authors I-Ling Yen (The University of Texas at Dallas); Sultan Alsarra (The University of Texas at Dallas); Yongtao Huang (The University of Texas at Dallas); Bhavani Thuraisingham (The University of Texas at Dallas); Farokh Bastani (The University of Texas at Dallas)
Title Toward Detection of Access Control Models from Source Code via Word Embedding
Authors John Heaps (University of Texas at San Antonio); Xiaoyin Wang (University of Texas at San Antonio); Travis Breaux (Carnegie Mellon University); Jianwei Niu (University of Texas at San Antonio)

 

Accepted Demos:

Title CloudProtect – A cloud-based software protection service
Authors Andreas Schaad (University of Appl. Sciences Offenburg, Germany); Björn Grohmann (Wibu-Systems AG, Germany); Oliver Winzenried (Wibu-Systems AG, Germany)

 

 

Copyright (c) ACM SACMAT All rights reserved.