default search action
SACMAT 2020: Barcelona, Spain
- Jorge Lobo, Scott D. Stoller, Peng Liu:
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 - Qiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. 1-12 - Tao Feng, Chuan Yue:
Visualizing and Interpreting RNN Models in URL-based Phishing Detection. 13-24 - Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin:
Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. 25-32 - Tal Rabin:
Cryptography for #MeToo. 33 - Onuralp Ulusoy, Pinar Yolum:
Norm-based Access Control. 35-46 - Khalid Alkhattabi, Ahmed Alshehri, Chuan Yue:
Security and Privacy Analysis of Android Family Locator Apps. 47-58 - Marco Rosa, Francesco Di Cerbo, Rocío Cabrera Lozoya:
Declarative Access Control for Aggregations of Multiple Ownership Data. 59-70 - Nurul Momen, Sven Bock, Lothar Fritsch:
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android. 71-80 - Florian Jacob, Luca Becker, Jan Grashöfer, Hannes Hartenstein:
Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. 81-92 - Gregory Z. Gutin, Daniel Karapetyan:
Constraint Branching in Workflow Satisfiability Problem. 93-103 - Dianxiang Xu, Roshan Shrestha, Ning Shen:
Automated Strong Mutation Testing of XACML Policies. 105-116 - William Enck:
Analysis of Access Control Enforcement in Android. 117-118 - Jon Currey, Robbie McKinstry, Armon Dadgar, Mark Gritter:
Informed Privilege-Complexity Trade-Offs in RBAC Configuration. 119-130 - Carlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. 131-144 - Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen:
Benchmarking UAQ Solvers. 145-152 - Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen:
AQUA: An Efficient Solver for the User Authorization Query Problem. 153-154 - Padmavathi Iyer, Amirreza Masoumzadeh:
Active Learning of Relationship-Based Access Control Policies. 155-166 - Thang Bui, Scott D. Stoller:
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. 167-178 - Jorge Lobo, Elisa Bertino, Alessandra Russo:
On Security Policy Migrations. 179-188 - Anna Cinzia Squicciarini:
Multi-party Access Control - 10 Years of Successes and Lessons Learned. 189-190 - Maribel Fernández, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro, Bhavani Thuraisingham:
A Data Access Model for Privacy-Preserving Cloud-IoT Architectures. 191-202 - Smriti Bhatt, Ravi S. Sandhu:
ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. 203-212 - Tahir Ahmad, Umberto Morelli, Silvio Ranise:
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem. 213-220 - Pietro Colombo, Elena Ferrari, Samuele Salvia:
Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems. 221-222 - Paras Bhatt, Smriti Bhatt, Myung Ko:
Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In Organizations. 223-225
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.