default search action
SACMAT 2022: New York, NY, USA
- Sven Dietrich, Omar Chowdhury, Daniel Takabi:
SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022. ACM 2022, ISBN 978-1-4503-9357-7
Keynote Talks
- Roberto Di Pietro:
Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead. 1-2 - Nathalie Baracaldo:
Keynote Talk - Federated Learning: The Hype, State-of-the-Art and Open Challenges. 3-4 - Md. Endadul Hoque:
Network (In)security: Leniency in Protocols' Design, Code and Configuration. 5-6
Session 1: Policies and their Efficient Enforcement
- Clara Bertolissi, Maribel Fernández:
Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations. 7-18 - Trevor Dunlap, William Enck, Bradley Reaves:
A Study of Application Sandbox Policies in Linux. 19-30 - Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya:
Contemporaneous Update and Enforcement of ABAC Policies. 31-42 - Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo:
WiP: Metamodel for Continuous Authorisation and Usage Control. 43-48
Session 2: Protocols and Defenses for Emerging and Traditional Networks
- Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou:
LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. 49-60 - Georgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa, Giuseppe Durisi:
WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks. 61-66 - Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian:
A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception. 67-78 - Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis:
Harpocrates: Anonymous Data Publication in Named Data Networking. 79-90
Session 3: Policy Mining and Testing
- Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Generalized Noise Role Mining. 91-102 - Dianxiang Xu, Roshan Shrestha, Ning Shen, Yunpeng Zhang:
Towards a Theory on Testing XACML Policies. 103-114 - Qiang Guo, Mahesh Tripunitara:
The Secrecy Resilience of Access Control Policies and Its Application to Role Mining. 115-126 - Padmavathi Iyer, Amirreza Masoumzadeh:
Effective Evaluation of Relationship-Based Access Control Policy Mining. 127-138
Session 4: Enhancing System Resiliency with Defense in Depth
- Elham Al Qahtani, Lipsarani Sahoo, Yousra Javed, Mohamed Shehab:
"Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA. 139-150 - Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves:
Removing the Reliance on Perimeters for Security using Network Views. 151-162 - Amirreza Masoumzadeh, Hans van der Laan, Albert Dercksen:
BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities. 163-172 - Minghong Fang, Jia Liu, Michinari Momma, Yi Sun:
FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote Data. 173-184
Session 5: Applications of Access Control
- Saskia Bayreuther, Florian Jacob, Markus Grotz, Rainer Kartmann, Fabian Peller-Konrad, Fabian Paus, Hannes Hartenstein, Tamim Asfour:
BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. 185-194 - Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong:
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. 195-206 - Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu:
BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. 207-216 - David Reddick, Justin Presley, Frank Alex Feltus, Susmit Shannigrahi:
WiP: AABAC - Automated Attribute Based Access Control for Genomics Data. 217-222
Session 6: Defending IoT Systems and Networks
- Chahal Arora, Syed Zain R. Rizvi, Philip W. L. Fong:
Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. 223-234 - Safwa Ameer, Maanak Gupta, Smriti Bhatt, Ravi S. Sandhu:
BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. 235-244 - Matt Gorbett, Hossein Shirazi, Indrakshi Ray:
WiP: The Intrinsic Dimensionality of IoT Networks. 245-250
Session 7: Posters and Demo
- Liang Zhang, Haibin Kan, Yuan Li, Jinrong Huang:
Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption. 251-253 - Jaime C. Acosta:
Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. 255-257 - Proteet Paul, Tushar Gupta, Shamik Sural:
Poster: ASQL - Attribute Based Access Control Extension for SQL. 259-261 - Stanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone:
Poster: A Flexible Relationship-Based Access Control Policy Generator. 263-265 - Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom:
Poster: Toward Zero-Trust Path-Aware Access Control. 267-269 - Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise:
Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS. 271-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.