default search action
SACMAT 2017: Indianapolis, IN, USA
- Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0
Keynote Address I
- Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino:
Distributed Intelligence: Trends in the Management of Complex Systems. 1-7
Authorization and Authentication
- Qais Tasali, Chandan Chowdhury, Eugene Y. Vasserman:
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. 9-20 - Aysajan Abidin, Enrique Argones-Rúa, Roel Peeters:
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. 21-29 - Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:
On Risk in Access Control Enforcement. 31-42
Applications
- Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. 43-54 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:
An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. 55-66 - Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee:
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. 67-78
Policy Models and Frameworks
- Jason Crampton, Conrad Williams:
Attribute Expressions, Policy Tables and Attribute-Based Access Control. 79-90 - Edelmira Pasarella, Jorge Lobo:
A Datalog Framework for Modeling Relationship-based Access Control Policies. 91-102 - Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, Rodney D. Nielsen:
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. 103-114
Posters
- Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang:
Poster: A Location-Privacy Approach for Continuous Queries. 115-117 - Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. 119-120 - Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Poster: Constrained Policy Mining in Attribute Based Access Control. 121-123 - Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:
POSTER: Access Control Model for the Hadoop Ecosystem. 125-127 - Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. 129-131
Keynote Address II
- Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk:
Leveraging Hardware Isolation for Process Level Access Control & Authentication. 133-141
Formal Techniques I
- James Alderman, Jason Crampton, Naomi Farley:
A Framework for the Cryptographic Enforcement of Information Flow Policies. 143-154 - Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. 155-166 - Claiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu:
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. 167-178
Demonstrations
- Ehood Porat, Shmuel Tikochinski, Ariel Stulman:
Authorization Enforcement Detection. 179-182 - Maanak Gupta, Farhan Patwa, James O. Benson, Ravi S. Sandhu:
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. 183-190 - Thomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu:
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language. 191-198 - Rodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang:
NTApps: A Network Traffic Analyzer of Android Applications. 199-206
Formal Techniques II
- Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:
On the Satisfiability of Workflows with Release Points. 207-217 - Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino:
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. 219-230
Short Papers
- Erisa Karafili, Emil C. Lupu:
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. 231-238 - Thang Bui, Scott D. Stoller, Jiajie Li:
Mining Relationship-Based Access Control Policies. 239-246 - Paolo Guarda, Silvio Ranise, Hari Siswantoro:
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems. 247-254 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. 255-262
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.