About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

-- ACM OpenTOC to download SACMAT'17 papers --

Date Start End Event  
21-Jun 7:30 8:30 Breakfast  
  9:00 9:30 Conference Opening Elisa Bertino (General Chair)
      Program Introduction Sandhu and Weippl (Program co-Chairs)
  9:30 10:30 Keynote Talk I (Ravi Sandhu): Distributed Intelligence - Trends in the Management of Complex Systems Dr. Seraphin Calo (IBM Research)
  10:30 0:00 Coffee Break  
  11:00 12:30 Session I (Elena Ferrari): Authorization and Authentication A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. Qais Tasali, Chandan Chowdhury and Eugene Vasserman.

Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. Aysajan Abidin, Enrique Argones Rúa and Roel Peeters

On Risk in Access Control Enforcement. Giuseppe Petracca, Frank Capobianco, Christian Skalka and Trent Jaeger
  12:30 1:30 Lunch  
  1:30 3:00 Session II (Axel Kern): Applications FACT: Functionality-centric Access Control System for IoT Programming Frameworks. Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim and Jong Kim

An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. Seyed Hossein Ahmadinejad and Philip W. L. Fong

Secure Pick Up Implicit Authentication When You Start Using the Smartphone. Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin and Ruby Lee
  3:00 3:30 Coffee Break  
  3:30 5:00 Session III (Hongxin Hu): Privacy Models and Frameworks Attribute Expressions Policy Tables and Attribute-Based Access Control. Jason Crampton and Conrad Williams

A Datalog framework for modeling Relationship-based Access Control Policies. Edelmira Pasarella and Jorge Lobo

Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. Masoud Narouei, Hamed Khanpour, Hassan Takabi, Rodney Nielsen and Natalie Parde
  7:00 9:00 Reception & Poster Papers Poster: A Location-Privacy Approach for Continuous Queries. Douglas Steiert, Dan Lin, Quincy Conduff, and Wei Jiang

Poster: Design of an Anomaly-based Threat Detection & Explication System. Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, and Edgar Weippl

Poster: Constrained Policy Mining in Attribute Based Access Control. Mayank Gauta, Sadhana Jha, Shamik Sural, Jaideep Vaidya, and Vijayalakshmi Atluri

Poster:Access Control Model for the Hadoop Ecosystem. Maanak Gupta, Farhan Patwa, and Ravi Sandhu

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, and Wonkyu Han
         
22-Jun 7:30 8:30 Breakfast  
  9:30 10:30 Keynote Talk II (Edgar Weippl): Leveraging Hardware Isolation for Process Level Access Control & Authentication Dr. Marten van Dijk (University of Connecticut)
  10:30 11:00 Coffee Break  
  11:00 12:30 Session IV (Edgar Weippl): Formal Techniques I A Framework for the Cryptographic Enforcement of Information Flow Policies. James Alderman, Jason Crampton and Naomi Farley

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine and Gail-Joon Ahn

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. Claiborne Johnson, Tom MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne and Jianwei Niu
  12:30 1:30 Lunch  
  1:30 3:00 Session V (Ninghui Li): Panel Session - Access Control in Mobile Operating Systems  
  3:00 3:30 Coffee Break  
  3:30 5:00 Session VI (Jianwei Niu): Demo Demo: Authorization Enforcement Detection. Ehood Porat, Shmuel Tikochinski, and Ariel Stulman

Demo: Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. Maanak Gupta, Farhan Patwa, James Benson, and Ravi Sandhu

Demo: Provable Enforcement of HIPAA-Compliant Release of Medical Records Using History Aware Programming Language. Thomas MacGahan Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, and Jianwei Niu

Demo: NTApps: A Network Traffic Analyzer of Android Applications. Rodney Rodriguez, Shaikh Mostafa, and Xiaoyin Wang
  6:00 9:00 Social Event at Indiana State Museum Meet at hotel lobby at 5:15pm to walk to the Museum
        The social event includes: (a) visit to second level of the museum 6:00pm-7:30pm; (b) dinner in the museum bridge 7:30pm-9:00pm
23-Jun 7:30 8:30 Breakfast  
  8:30 9:30 Session VII (Xukai Zou): Formal Techniques II On the Satisfiability of Workflows with Release Points. Jason Crampton, Gregory Gutin and Rémi Watrigant

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. Shagufta Mehnaz, Gowtham Bellala and Elisa Bertino
  9:30 10:50 Session VIII (Elisa Bertino): Short Papers Short Paper: A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. Harsha Sandaruwan Gardiyawasam Pussewalage and Vladimir Oleshchuk

Short Paper: Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. Erisa Karafili and Emil C. Lupu

Short Paper: Mining Relationship-Based Access Control Policies. Thang Bui, Scott Stoller and Jiajie Li

Short Paper: Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems. Paolo Guarda, Silvio Ranise and Hari Siswantoro
  10:50 11:10 Coffee Break  
  11:10 12:00 Closing Panel Elisa Bertino
  12:00 1:30 Boxed Lunch  

Copyright (c) ACM SACMAT All rights reserved.