


default search action
SACMAT 2025: Stony Brook, NY, USA
- Scott D. Stoller, Omar Chowdhury, Adam J. Lee
, Amir Masoumzadeh:
Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, SACMAT 2025, Stony Brook, NY, USA, 10 July 2025. ACM 2025, ISBN 979-8-4007-1503-7 - Vijayalakshmi Atluri
:
Policy Mining: Putting LLMs to Work [Keynote Abstract]. 1-2 - John Kastner
:
Cedar: An Expressive, Fast, Safe, and Analyzable Authorization Language for Modern Distributed Systems [Keynote Abstract]. 3 - Mahesh Tripunitara
:
Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration. 4-15 - Shmuel Amour
, Ehud Gudes
:
Predictive Enhancement of ABAC Policies Using Access Log Analytics [Work In Progress Paper]. 16-21 - Puneet Gill
, Mahesh Tripunitara
:
New Algorithms for Minimizing the Number of Edges in Bottom-Up Role Mining. 22-32 - Jason Zhijingcheng Yu
, Mingkai Li
, Aditya Badole
, Trevor E. Carlson
, Michael Swift
, Prateek Saxena
:
Caplification: Bridging Capability-Aware and Capability-Oblivious Software. 33-44 - Simone Brunello
, Stefano Berlato
, Roberto Carbone
, Adam J. Lee
, Silvio Ranise
:
Relying on Trust to Balance Protection and Performance in Cryptographic Access Control. 45-56 - Hussein Joumaa
, Ali Hariri
, Theo Dimitrakos
, Bruno Crispo
:
Coordinated Enforcement of Obligations in Distributed Usage Control Systems [Work In Progress Paper]. 57-61 - Rakesh Podder, Turgay Caglar, Shadaab Kawnain Bashir
, Sarath Sreedharan
, Indrajit Ray, Indrakshi Ray:
SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs. 62-73 - Harsh Sanjay Pacherkar
, Guanhua Yan
:
ACGuard5GC: Privacy-Preserving Prevention of Access Control Attacks within 5G Core Networks. 74-84 - Charles Marion Ueltschey
, Joshua Moore
, Aly Sabri Abdalla
, Vuk Marojevic
:
RAN Tester UE: An Automated Declarative UE Centric Security Testing Platform [Dataset/Tool Paper]. 85-90 - Brian Tan
, Ewan S. D. Davies
, Indrakshi Ray
, Mahmoud Abdelgawad
:
Safety Analysis in the NGAC Model. 91-98 - Ben Weintraub
, Chanyuan Liu
, William Enck
, Cristina Nita-Rotaru
:
ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations. 99-110 - Thang Bui
, Anthony Matricia
, Emily Contreras
, Ryan Mauvais
, Luis Medina
, Israel Serrano
:
ABAC Lab: An Interactive Platform for Attribute-based Access Control Policy Analysis, Tools, and Datasets [Dataset/Tool Paper]. 111-116 - Gelareh Hasel Mehri
, Charles Morisset
, Nicola Zannone
:
Towards Explainable Access Control [BlueSky Paper]. 117-126 - Patrick Spiesberger
, Jan Droll
, Hannes Hartenstein
:
A Policy-Based Mitigation of Transaction Exclusion in Ethereum [Work in Progress Paper]. 127-132 - Jiaming Yuan
, Yingjiu Li
, Jun Li
, Daoyuan Wu
, Jianting Ning
, Yangguang Tian
, Robert H. Deng
:
Leakage-Resilient Easily Deployable and Efficiently Searchable Encryption (EDESE). 133-144 - Mohammad Nur Nobi
, Maanak Gupta
, Ram Krishnan
, Md. Shohel Rana
, Lopamudra Praharaj
, Mahmoud Abdelsalam
:
Machine Learning in Access Control: A Taxonomy [Systematization of Knowledge Paper]. 145-156 - Mian Yang
, Vijayalakshmi Atluri
, Shamik Sural
, Ashish Kundu
:
Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation. 157-168 - Aditya Nangia
, Sriya Ayachitula
, Chinmay Kundu
:
In-Context Vulnerability Propagation in LLMs [Work In Progress Paper]. 169-174 - Xiang Li
, Wenqi Wei
, Bhavani Thuraisingham
:
MUBox: A Critical Evaluation Framework of Deep Machine Unlearning [Systematization of Knowledge Paper]. 175-188 - Nikola Antonijevic
, Sayon Duttagupta
, Dave Singelée
, Enrique Argones-Rúa
, Bart Preneel
:
ZeroTouch: Reinforcing RSS for Secure Geofencing. 189-200 - Maxwel Bar-on, Katherine Patterson, Bruhadeshwar Bezawada
, Indrakshi Ray, Indrajit Ray:
"Bring your own device!": Adaptive IoT Device-type Fingerprinting using Automatic Behavior Extraction [Work In Progress Paper]. 201-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.