SACMAT '17 Abstracts- Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies

Full Citation in the ACM Digital Library

SESSION: Keynote Address I

Distributed Intelligence: Trends in the Management of Complex Systems

SESSION: Authorization and Authentication

A Flexible Authorization Architecture for Systems of Interoperable Medical Devices

Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication

On Risk in Access Control Enforcement

SESSION: Applications

FACT: Functionality-centric Access Control System for IoT Programming Frameworks

An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone

SESSION: Policy Models and Frameworks

Attribute Expressions, Policy Tables and Attribute-Based Access Control

A Datalog Framework for Modeling Relationship-based Access Control Policies

Towards a Top-down Policy Engineering Framework for Attribute-based Access Control

POSTER SESSION: Posters

Poster: A Location-Privacy Approach for Continuous Queries

Poster: Design of an Anomaly-based Threat Detection & Explication System

Poster: Constrained Policy Mining in Attribute Based Access Control

POSTER: Access Control Model for the Hadoop Ecosystem

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control

SESSION: Keynote Address II

Leveraging Hardware Isolation for Process Level Access Control & Authentication

SESSION: Formal Techniques I

A Framework for the Cryptographic Enforcement of Information Flow Policies

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures

DEMONSTRATION SESSION: Demonstrations

Authorization Enforcement Detection

Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment

Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language

NTApps: A Network Traffic Analyzer of Android Applications

SESSION: Formal Techniques II

On the Satisfiability of Workflows with Release Points

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics

SESSION: Short Papers

Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis

Mining Relationship-Based Access Control Policies

Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records