


default search action
SACMAT 2014: London, ON, Canada
- Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy:

19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014. ACM 2014, ISBN 978-1-4503-2939-2
Keynote I
- Ari Juels:

A bodyguard of lies: the use of honey objects in information security. 1-4
Enforcement and applications
- Gedare Bloom, Rahul Simha:

Hardware-enhanced distributed access enforcement for role-based access control. 5-16 - Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr

, Kurt Rothermel, Christian Maihöfer:
An access control concept for novel automotive HMI systems. 17-28 - Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger:

Monitor placement for large-scale systems. 29-40
Policy analytics
- Maria Leitner

, Stefanie Rinderle-Ma
:
Anomaly detection and visualization in generative RBAC models. 41-52 - Charles Morisset, Nicola Zannone

:
Reduction of access control decisions. 53-62 - Wouter Kuijper, Victor Ermolaev

:
Sorting out role based access control. 63-74
Systems
- Wai-Kit Sze, Bhuvan Mital, R. Sekar:

Towards more usable information flow policies for contemporary operating systems. 75-84 - Alessandro Armando

, Roberto Carbone
, Eyasu Getahun Chekole
, Silvio Ranise
:
Attribute based access control for APIs in spring security. 85-88 - Wai-Kit Sze, R. Sekar:

Comprehensive integrity protection for desktop linux. 89-92
Models and analysis
- Hongxin Hu, Gail-Joon Ahn

, Ziming Zhao, Dejun Yang
:
Game theoretic analysis of multiparty access control in online social networks. 93-102 - Silvio Ranise

, Anh Tuan Truong, Alessandro Armando
:
Scalable and precise automated analysis of administrative temporal role-based access control. 103-114 - Ebrahim Tarameshloo, Philip W. L. Fong:

Access control models for geo-social computing systems. 115-126
Panel
- Lujo Bauer, Florian Kerschbaum:

What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? 127-128
Privacy and confidentiality
- Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici:

Limiting access to unintentionally leaked sensitive documents using malware signatures. 129-140 - Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard:

Optimized and controlled provisioning of encrypted outsourced data. 141-152 - Daniel Slamanig

, Klaus Stranacher, Bernd Zwattendorfer:
User-centric identity as a service-architecture for eIDs with selective attribute disclosure. 153-164
Risk, redaction and RDF
- Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:

Towards fine grained RDF access control. 165-176 - Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham:

Redaction based RDF access control language. 177-180 - Sharmin Ahmed, Sylvia L. Osborn:

A system for risk awareness during role mining. 181-184
Keynote II
- Andrew Clement:

Re-thinking networked privacy, security, identity and access control in our surveillance states. 185-186
New approaches
- Jason Crampton, James Sellwood:

Path conditions and principal matching: a new approach to access control. 187-198 - William C. Garrison III, Adam J. Lee

, Timothy L. Hinrichs:
An actor-based, application-aware access control evaluation framework. 199-210 - Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger:

Policy models to protect resource retrieval. 211-222

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














