


default search action
SACMAT 2017: Indianapolis, IN, USA
- Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl:

Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017. ACM 2017, ISBN 978-1-4503-4702-0
Keynote Address I
- Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino:

Distributed Intelligence: Trends in the Management of Complex Systems. 1-7
Authorization and Authentication
- Qais Tasali, Chandan Chowdhury, Eugene Y. Vasserman

:
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. 9-20 - Aysajan Abidin

, Enrique Argones-Rúa, Roel Peeters
:
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. 21-29 - Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger:

On Risk in Access Control Enforcement. 31-42
Applications
- Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim

, Jong Kim:
FACT: Functionality-centric Access Control System for IoT Programming Frameworks. 43-54 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:

An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. 55-66 - Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee:

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. 67-78
Policy Models and Frameworks
- Jason Crampton, Conrad Williams:

Attribute Expressions, Policy Tables and Attribute-Based Access Control. 79-90 - Edelmira Pasarella, Jorge Lobo

:
A Datalog Framework for Modeling Relationship-based Access Control Policies. 91-102 - Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde

, Rodney D. Nielsen:
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. 103-114
Posters
- Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang:

Poster: A Location-Privacy Approach for Continuous Queries. 115-117 - Robert Luh, Sebastian Schrittwieser

, Stefan Marschalek, Helge Janicke
, Edgar R. Weippl:
Poster: Design of an Anomaly-based Threat Detection & Explication System. 119-120 - Mayank Gautam, Sadhana Jha, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
Poster: Constrained Policy Mining in Attribute Based Access Control. 121-123 - Maanak Gupta, Farhan Patwa, Ravi S. Sandhu:

POSTER: Access Control Model for the Hadoop Ecosystem. 125-127 - Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang

, Gail-Joon Ahn
, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. 129-131
Keynote Address II
- Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk

:
Leveraging Hardware Isolation for Process Level Access Control & Authentication. 133-141
Formal Techniques I
- James Alderman, Jason Crampton, Naomi Farley:

A Framework for the Cryptographic Enforcement of Information Flow Policies. 143-154 - Nishant Vishwamitra

, Yifang Li
, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn
:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. 155-166 - Claiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu:

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. 167-178
Demonstrations
- Ehood Porat, Shmuel Tikochinski, Ariel Stulman

:
Authorization Enforcement Detection. 179-182 - Maanak Gupta, Farhan Patwa, James O. Benson

, Ravi S. Sandhu:
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. 183-190 - Thomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu:

Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language. 191-198 - Rodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang:

NTApps: A Network Traffic Analyzer of Android Applications. 199-206
Formal Techniques II
- Jason Crampton, Gregory Z. Gutin, Rémi Watrigant:

On the Satisfiability of Workflows with Release Points. 207-217 - Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino:

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. 219-230
Short Papers
- Erisa Karafili

, Emil C. Lupu:
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. 231-238 - Thang Bui, Scott D. Stoller, Jiajie Li:

Mining Relationship-Based Access Control Policies. 239-246 - Paolo Guarda

, Silvio Ranise
, Hari Siswantoro
:
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems. 247-254 - Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk:

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. 255-262

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














