


default search action
SACMAT 2021: Virtual Event, Spain
- Jorge Lobo, Roberto Di Pietro, Omar Chowdhury, Hongxin Hu:

SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021. ACM 2021, ISBN 978-1-4503-8365-3 - Alina Oprea:

Machine Learning Integrity and Privacy in Adversarial Environments. 1-2 - Simon Anderer

, Bernd Scheuermann
, Sanaz Mostaghim
, Patrick Bauerle, Matthias Beil:
RMPlib: A Library of Benchmarks for the Role Mining Problem. 3-13 - Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:

Backdoor Attacks to Graph Neural Networks. 15-26 - Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin:

Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research. 27-32 - Amirreza Masoumzadeh, Paliath Narendran, Padmavathi Iyer:

Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. 33-43 - B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:

Towards Unifying RBAC with Information Flow Control. 45-54 - Mustafa Al-Lail:

Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. 55-57 - Dominic Heutelbeck

, Marc Lucas Baur
, Martin Kluba:
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. 59-70 - Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu:

Mutation Analysis of NGAC Policies. 71-82 - Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar

:
Valued Authorization Policy Existence Problem. 83-94 - Dominic Heutelbeck

:
Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). 95-97 - Marius Schlegel

:
Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. 99-101 - Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra:

ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems. 103-114 - Ferhat Karakoç, Melek Önen, Zeki Bilgin:

Secure Aggregation Against Malicious Users. 115-124 - Jonas Schiffl

, Matthias Grundmann
, Marc Leinweber
, Oliver Stengele
, Sebastian Friebe, Bernhard Beckert
:
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control. 125-130 - Frederik Armknecht

, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li
:
Regulating Storage Overhead in Existing PoW-based Blockchains. 131-142 - Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang

, Robert H. Deng
:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. 143-154 - Maanak Gupta, Ravi S. Sandhu:

Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. 155-164 - Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo

, Elisa Bertino:
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. 165-174 - Isaac Polinsky

, Pubali Datta, Adam Bates
, William Enck:
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing. 175-186

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














