


default search action
SACMAT 2023: Trento, Italy
- Silvio Ranise, Roberto Carbone, Daniel Takabi:

Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, SACMAT 2023, Trento, Italy, June 7-9, 2023. ACM 2023 - Maribel Fernández

:
The Category-Based Approach to Access Control, Obligations and Privacy. 1-2 - Scott D. Stoller

:
WebSheets: A New Privacy-Centric Framework for Web Applications. 3-4 - Daniel Ricardo dos Santos

:
Access Control Vulnerabilities in Network Protocol Implementations: How Attackers Exploit Them and What To Do About It. 5-6 - Cristoffer Leite

, Jerry den Hartog
, Paul Koster
:
A Framework for Privacy-Preserving White-Box Anomaly Detection using a Lattice-Based Access Control. 7-18 - Dominik Roy George

, Savio Sciancalepore
, Nicola Zannone
:
Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services. 19-30 - Ali Reza Ghavamipour

, Fatih Turkmen
, Rui Wang
, Kaitai Liang
:
Federated Synthetic Data Generation with Stronger Security Guarantees. 31-42 - Attaullah Buriro

, Samuele Ceol
:
Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS). 43-45 - Pritkumar Godhani

, Rahul Bharadhwaj
, Shamik Sural
:
Poster: APETEEt - Secure Enforcement of ABAC Policies using Trusted Execution Environment. 47-49 - Sascha Kaven

, Volker Skwarek
:
Poster: Attribute Based Access Control for IoT Devices in 5G Networks. 51-53 - Niklas Hemken

, Florian Jacob
, Fabian Peller-Konrad
, Rainer Kartmann
, Tamim Asfour
, Hannes Hartenstein
:
Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots. 55-57 - Marshal Moncivais

, Mustafa Al-Lail
:
Poster: Integrating Spatio-temporal Authorization with Generic Cloud-based Software Architecture for Internet of Things Devices. 59-61 - Kosei Akama

, Seki Makino
, Masaaki Sato
, Keisuke Uehara
:
Poster: Non-repudiable Secure Logging System for the Web. 63-65 - Hamed Rasifard

, Rahul Gopinath
, Michael Backes
, Hamed Nemati
:
SEAL: Capability-Based Access Control for Data-Analytic Scenarios. 67-78 - Luis Claramunt

, Carlos E. Rubio-Medrano
, Jaejong Baek
, Gail-Joon Ahn
:
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality. 79-90 - Mahmoud Abdelgawad

, Indrakshi Ray
, Saja Alqurashi
, Videep Venkatesha
, Hossein Shirazi
:
Synthesizing and Analyzing Attribute-Based Access Control Model Generated from Natural Language Policy Statements. 91-98 - Roberta Cimorelli Belfiore

, Anna Lisa Ferrara
:
Security Analysis of Access Control Policies for Smart Homes. 99-106 - Anitha Gollamudi

, Stephen Chong
:
Expressive Authorization Policies using Computation Principals. 107-119 - Iffat Anjum

, Jessica Sokal
, Hafiza Ramzah Rehman
, Ben Weintraub
, Ethan Leba
, William Enck
, Cristina Nita-Rotaru
, Bradley Reaves
:
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy. 121-132 - Xiaomeng Lei

, Mahesh Tripunitara
:
The Hardness of Learning Access Control Policies. 133-144 - Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra

, Vijayalakshmi Atluri
, Indrakshi Ray, Murat Kantarcioglu
, Ramesh Raskar, Babak Salimi, Steve Simske
, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. 145-155 - Catherine Meadows

, Sena Hounsinou
, Timothy Wood
, Gedare Bloom
:
Sidecar-based Path-aware Security for Microservices. 157-162 - Padmavathi Iyer

, Amir Masoumzadeh
:
Towards Automated Learning of Access Control Policies Enforced by Web Applications. 163-168 - Erzhuo Chen

, Vladislav Dubrovenski
, Dianxiang Xu
:
Coverage-Based Testing of Obligations in NGAC Systems. 169-179 - Clara Bertolissi

, Alba Martinez Anton
, Nicola Zannone
:
Data Sharing in Social Networks. 181-192 - Ulrich Schöpp

, Chuangjie Xu
, Amjad Ibrahim
, Fathiyeh Faghih
, Theo Dimitrakos
:
Specifying a Usage Control System. 193-200 - Shohei Mitani

, Jonghoon Kwon
, Nakul Ghate
, Taniya Singh
, Hirofumi Ueda
, Adrian Perrig
:
Qualitative Intention-aware Attribute-based Access Control Policy Refinement. 201-208

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














