


default search action
SACMAT 2019: Toronto, ON, Canada
- Florian Kerschbaum, Atefeh Mashatan, Jianwei Niu, Adam J. Lee:

Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, SACMAT 2019, Toronto, ON, Canada, June 03-06, 2019. ACM 2019, ISBN 978-1-4503-6753-0
Keynote Address I
- Murat Kantarcioglu:

Securing Big Data: New Access Control Challenges and Approaches. 1-2
Mechanisms and Structures
- Oliver Stengele

, Andreas Baumeister, Pascal Birnstill, Hannes Hartenstein:
Access Control for Binary Integrity Protection using Ethereum. 3-12 - Mihai Ordean

, Mark Ryan
, David Galindo
:
CAOS: Concurrent-Access Obfuscated Store. 13-24 - Ronit Nath, Saptarshi Das

, Shamik Sural
, Jaideep Vaidya, Vijay Atluri
:
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC. 25-35
IoT and Social
- Joshua Morris

, Dan Lin, Anna Cinzia Squicciarini:
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree. 37-48 - Juan Carlos Fuentes Carranza, Philip W. L. Fong:

Brokering Policies and Execution Monitors for IoT Middleware. 49-60 - Moosa Yahyazadeh, Proyash Podder, Md. Endadul Hoque

, Omar Chowdhury:
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms. 61-72
Blue Sky/Vision Track
- Kwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche:

Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems. 73-81 - Bo Tang, Hongjuan Kang, Jingwen Fan, Qi Li

, Ravi S. Sandhu:
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things. 83-92 - Sultan Alsarra

, I-Ling Yen, Yongtao Huang, Farokh B. Bastani, Bhavani Thuraisingham:
An OpenRBAC Semantic Model for Access Control in Vehicular Networks. 93-102 - John Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu:

Toward Detection of Access Control Models from Source Code via Word Embedding. 103-112
Applications and Protocols
- Eduard Marin

, Enrique Argones-Rúa, Dave Singelée
, Bart Preneel
:
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols. 113-122 - Ahmed Khalil Abdulla, Spiridon Bakiras

:
HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control. 123-134 - Padmavathi Iyer, Amirreza Masoumzadeh:

Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems. 135-140 - Tyler Phillips, Xukai Zou, Feng Li, Ninghui Li:

Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning. 141-146
Junior Keynote
- Adam Doupé:

History and Future of Automated Vulnerability Analysis. 147
Mining and Analysis
- Bernhard J. Berger

, Christian Maeder, Rodrigue Wete Nguempnang, Karsten Sohr
, Carlos E. Rubio-Medrano
:
Towards Effective Verification of Multi-Model Access Control Properties. 149-160 - Thang Bui, Scott D. Stoller, Hieu Le:

Efficient and Extensible Policy Mining for Relationship-Based Access Control. 161-172 - Mircea Marin

, Temur Kutsia, Besik Dundua:
A Rule-based Approach to the Decidability of Safety of ABACα. 173-178 - Jason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar

:
Bounded and Approximate Strong Satisfiability in Workflows. 179-184
Models and Emerging Applications
- Clara Bertolissi, Jerry den Hartog, Nicola Zannone

:
Using Provenance for Secure Data Fusion in Cooperative Systems. 185-194 - Carlos E. Rubio-Medrano

, Shaishavkumar Jogani, Maria Leitner
, Ziming Zhao, Gail-Joon Ahn
:
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies. 195-206 - Theogene Hakiza Bucuti, Ram Dantu, Kirill Morozov:

CMCAP: Ephemeral Sandboxes for Adaptive Access Control. 207-212 - Gabriela Suntaxi

, Aboubakr Achraf El Ghazi
, Klemens Böhm:
Mutual Authorizations: Semantics and Integration Issues. 213-218 - Andreas Schaad, Björn Grohmann, Oliver Winzenried:

CloudProtect - A Cloud-based Software Protection Service. 219-221
Posters
- Feras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena

, Mamoun Alazab
:
Poster: A Pluggable Authentication Module for Big Data Federation Architecture. 223-225 - Josh Talkington, Ram Dantu, Kirill Morozov:

Verifying OAuth Implementations Through Encrypted Network Analysis. 227-229 - Ryan Shah

, Shishir Nagaraja:
Poster: Unified Access Control for Surgical Robotics. 231-233

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














