


default search action
SACMAT 2022: New York, NY, USA
- Sven Dietrich, Omar Chowdhury, Daniel Takabi:

SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022. ACM 2022, ISBN 978-1-4503-9357-7
Keynote Talks
- Roberto Di Pietro:

Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead. 1-2 - Nathalie Baracaldo:

Keynote Talk - Federated Learning: The Hype, State-of-the-Art and Open Challenges. 3-4 - Md. Endadul Hoque:

Network (In)security: Leniency in Protocols' Design, Code and Configuration. 5-6
Session 1: Policies and their Efficient Enforcement
- Clara Bertolissi, Maribel Fernández:

Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations. 7-18 - Trevor Dunlap, William Enck, Bradley Reaves:

A Study of Application Sandbox Policies in Linux. 19-30 - Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural

, Jaideep Vaidya:
Contemporaneous Update and Enforcement of ABAC Policies. 31-42 - Ali Hariri

, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo
:
WiP: Metamodel for Continuous Authorisation and Usage Control. 43-48
Session 2: Protocols and Defenses for Emerging and Traditional Networks
- Zheng Yang, Tien Tuan Anh Dinh, Chao Yin

, Yingying Yao, Dianshi Yang
, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. 49-60 - Georgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa

, Giuseppe Durisi
:
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks. 61-66 - Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian:

A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception. 67-78 - Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis:

Harpocrates: Anonymous Data Publication in Named Data Networking. 79-90
Session 3: Policy Mining and Testing
- Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:

Generalized Noise Role Mining. 91-102 - Dianxiang Xu, Roshan Shrestha, Ning Shen, Yunpeng Zhang:

Towards a Theory on Testing XACML Policies. 103-114 - Qiang Guo, Mahesh Tripunitara:

The Secrecy Resilience of Access Control Policies and Its Application to Role Mining. 115-126 - Padmavathi Iyer, Amirreza Masoumzadeh:

Effective Evaluation of Relationship-Based Access Control Policy Mining. 127-138
Session 4: Enhancing System Resiliency with Defense in Depth
- Elham Al Qahtani, Lipsarani Sahoo

, Yousra Javed, Mohamed Shehab
:
"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA. 139-150 - Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:

Removing the Reliance on Perimeters for Security using Network Views. 151-162 - Amirreza Masoumzadeh, Hans van der Laan, Albert Dercksen:

BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities. 163-172 - Minghong Fang, Jia Liu, Michinari Momma, Yi Sun:

FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote Data. 173-184
Session 5: Applications of Access Control
- Saskia Bayreuther, Florian Jacob

, Markus Grotz, Rainer Kartmann, Fabian Peller-Konrad, Fabian Paus, Hannes Hartenstein, Tamim Asfour:
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. 185-194 - Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:

A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. 195-206 - Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu:

BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. 207-216 - David Reddick, Justin Presley, Frank Alex Feltus, Susmit Shannigrahi:

WiP: AABAC - Automated Attribute Based Access Control for Genomics Data. 217-222
Session 6: Defending IoT Systems and Networks
- Chahal Arora, Syed Zain R. Rizvi, Philip W. L. Fong:

Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. 223-234 - Safwa Ameer, Maanak Gupta, Smriti Bhatt, Ravi S. Sandhu:

BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. 235-244 - Matt Gorbett, Hossein Shirazi, Indrakshi Ray:

WiP: The Intrinsic Dimensionality of IoT Networks. 245-250
Session 7: Posters and Demo
- Liang Zhang

, Haibin Kan, Yuan Li, Jinrong Huang:
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption. 251-253 - Jaime C. Acosta:

Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. 255-257 - Proteet Paul, Tushar Gupta, Shamik Sural

:
Poster: ASQL - Attribute Based Access Control Extension for SQL. 259-261 - Stanley Clark, Nikolay Yakovets

, George H. L. Fletcher
, Nicola Zannone
:
Poster: A Flexible Relationship-Based Access Control Policy Generator. 263-265 - Joshua H. Seaton, Sena Hounsinou, Timothy Wood

, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. 267-269 - Matteo Rizzi

, Salvatore Manfredi
, Giada Sciarretta, Silvio Ranise:
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS. 271-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














