default search action
SACMAT 2024: San Antonio, TX, USA
- Jianwei Niu, Jaideep Vaidya:
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, SACMAT 2024, San Antonio, TX, USA, May 15-17, 2024. ACM 2024 - Ashish Kundu:
AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management. - Barbara Masucci:
Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions. - Bhavani Thuraisingham:
Trustworthy Artificial Intelligence for Securing Transportation Systems. - Jay Barot, Ali A. Allami, Ming Yin, Dan Lin:
ToneCheck: Unveiling the Impact of Dialects in Privacy Policy. - Tanveer Khan, Mindaugas Budzys, Antonis Michalas:
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. - Kunlong Liu, Trinabh Gupta:
Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries). - Gelareh Hasel Mehri, Tien-Dung Le, Bram C. M. Cappers, Jerry den Hartog, Nicola Zannone:
WiP: Enhancing the Comprehension of XACML Policies. - Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson:
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. - Jacob Hopkins, Carlos E. Rubio-Medrano:
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data. - Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos:
Static and Dynamic Analysis of a Usage Control System. - Hanyu Wang, Aimin Yu, Lifang Xiao, Jin Li, Xu Cao:
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation. - Brian Ricks, Patrick Tague, Bhavani Thuraisingham, Sriraam Natarajan:
Utilizing Threat Partitioning for More Practical Network Anomaly Detection. - Mohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer:
Prompting LLM to Enforce and Validate CIS Critical Security Control. - Carlos E. Rubio-Medrano, Akash Kotak, Wenlu Wang, Karsten Sohr:
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. - Niklas Hemken, Florian Jacob, Fabian Tërnava, Rainer Kartmann, Tamim Asfour, Hannes Hartenstein:
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots. - Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone:
A Bargaining-Game Framework for Multi-Party Access Control. - Pieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. - Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo:
Obligation Management Framework for Usage Control. - Josué A. Ruiz, Paliath Narendran, Amir Masoumzadeh, Padmavathi Iyer:
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules. - Roberta Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci:
Hierarchical Key Assignment Schemes with Key Rotation. - Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. - Jennifer Mondragon, Gael Cruz, Dvijesh Shastri, Carlos E. Rubio-Medrano:
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.