Paper 1 |
Title |
A Trust-and-Risk Aware RBAC Framework: Tackling Insider Threat |
Authors |
Nathalie Baracaldo and James Joshi |
Paper 2 |
Title |
Ensuring Authorization Requirements for Cascading User Obligations |
Authors |
Omar Chowdhury, Murillo Pontual, William Winsborough, Ting Yu, Keith Irwin and Jianwei Niu |
Paper 3 |
Title |
A Framework for Verification and Optimal Reconfiguration of Event-driven Role Based Access Control Policies |
Authors |
Basit Shafiq, Jaideep Vaidya, Arif Ghafoor and Elisa Bertino |
Paper 4 |
Title |
SCUTA: A Server-Side Access Control System for Web Applications |
Authors |
Xi Tan, Wenliang Du, Tongbo Luo and Karthick Soundararaj |
Paper 5 |
Title |
Graph-Based XACML Evaluation |
Authors |
Santiago Pina Ros, Mario Lischka and Felix Gomez Marmol |
Paper 6 |
Title |
Optimal Workflow-aware Authorizations |
Authors |
David Basin, Samuel Burri and Guenter Karjoth |
Paper 7 |
Title |
Access Control for RDF Graphs using Abstract Models |
Authors |
Vassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris and Grigoris Antoniou |
Paper 8 |
Title |
MOSES: Supporting Operation Modes on Smartphones |
Authors |
Giovanni Russello, Mauro Conti, Bruno Crispo and Earlence Fernandes |
Paper 9 |
Title |
Efficient Privacy Preserving Content Based Publish Subscribe Systems |
Authors |
Mohamed Nabeel and Elisa Bertino |
Paper 10 |
Title |
Android Permissions: A Perspective Combining Risks and Benefits |
Authors |
Bhaskar Sarma, Ninghui Li, Chris Gates, Rahul Potharaju, Cristina Nita-Rotaru and Ian Molloy |
Paper 11 |
Title |
A Model-Based Approach to Automated Testing of Access Control Policies |
Authors |
Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi and Yves Le Traon |
Paper 12 |
Title |
Generative Models for Access Control Policies: Applications to Role Mining Over Logs with Attribution |
Authors |
Ian Molloy, Youngja Park and Suresh Chari |
Paper 13 |
Title |
Policy-by-Example for Online Social Networks |
Authors |
Gorrell Cheek and Mohamed Shehab |
Paper 14 |
Title |
Analyzing Temporal Role Based Access Control Models |
Authors |
Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Madhusudan Parthasarathy, Gennaro Parlato and Anna Lisa Ferrara |
Paper 15 |
Title |
PLexC: A Policy Language for Exposure Control |
Authors |
Yann Le Gall, Adam Lee and Apu Kapadia |
Paper 16 |
Title |
Algorithms for Mining Meaningful Roles |
Authors |
Zhongyuan Xu and Scott Stoller |
Paper 17 |
Title |
Fine Grained Access Control of Personal Data |
Authors |
Ting Wang and Mudhakar Srivatsa |
Paper 18 |
Title |
A Calculus for Privacy-friendly Authentication |
Authors |
Patrik Bichsel, Jan Camenisch and Dieter Sommer |
Paper 19 |
Title |
A Framework Integrating Attribute-based Policies into RBAC |
Authors |
Jingwei Huang, David Nicol, Rakesh Bobba and Jun Ho Huh |