About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Location
Registration
Hotel Reservation
Since 1995

 

Maintained and
Sponsored by

 

Paper 1
Title Beyond Accountability: Using Obligations to Reduce Risk Exposure and Deter Insider Attacks
Authors Nathalie Baracaldo and James Joshi
Paper 2
Title User-Centric Management of Distributed Credential Repositories: Balancing Availability and Vulnerability
Authors Jens Köhler, Jens Mittag and Hannes Hartenstein
Paper 3
Title Heuristic Safety Analysis of Access Control Models
Authors Peter Amthor, Winfried Kühnhauser and Anja Pölck
Paper 4
Title An Information Flow Control Meta-model
Authors Dennis Kafura and Denis Gracanin
Paper 5
Title ERBAC: Event-Driven RBAC
Authors Piero Bonatti, Clemente Galdi and Davide Torres
Paper 6
Title A White-Box Policy Analysis and its Efficient Implementation
Authors Jayalakshmi Balasubramaniam and Philip Fong
Paper 7
Title Ensuring continuous compliance through reconciling policy with usage
Authors Suresh Chari, Ian Molloy, Youngja Park and Wilfried Teiken
Paper 8
Title Private Data Warehouse Queries
Authors Xun Yi, Russell Paulet, Elisa Bertino and Guandong Xu
Paper 9
Title Constraint Expressions and Workflow Satisfiability
Authors Jason Crampton and Gregory Gutin
Paper 10
Title A Storage-Efficient Cryptography-Based Access Control Solution for Subversion
Authors Dominik Leibenger and Christoph Sorge
Paper 11
Title Combining Social Authentication and Untrusted Clouds for Private Location Sharing
Authors Andrew K Adams and Adam J. Lee
Paper 12
Title Evolving Role Definitions Through Permission Invocation Patterns
Authors Wen Zhang, You Chen, Carl Gunter, David Liebovitz and Bradley Malin
Paper 13
Title Towards Static Privacy Policy Analysis With Application to HIPAA
Authors Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia and William Winsborough
Paper 14
Title HyXAC: a hybrid approach for XML access control
Authors Manogna Thimma, Tsam Kai Tsui and Bo Luo
Paper 15
Title Information Flow Control for Stream Processing in Clouds
Authors Xing Xie, Indrakshi Ray, Raman Adaikkalavan and Rose Gamble
Paper 16
Title Specification and Analysis of Access Control Policies for Mobile Applications
Authors Ramadan Abdunabi and Indrakshi Ray
Paper 17
Title Least-Restrictive Enforcement of the Chinese Wall Security Policy
Authors Alireza Sharifi and Mahesh Tripunitara
Paper 18
Title Property-Testing Real-World Authorization Systems
Authors Alireza Sharifi, Paul Bottinelli and Mahesh Tripunitara
Paper 19
Title Minimization of Access Control Policies
Authors Marco Guarnieri, Mario Arrigoni Neri, Eros Magri and Simone Mutti

 

 


Copyright (c) ACM SACMAT All rights reserved.