Paper 1 |
Title |
Towards Fine Grained RDF Access Control |
Authors |
yothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas) |
Paper 2 |
Title |
User-Centric Identity as a Service-Architecture for eIDs with Selective Attribute Disclosure |
Authors |
Daniel Slamanig (Graz University of Technology - IAIK), Klaus Stranacher and Bernd Zwattendorfer (EGIZ) |
Paper 3 |
Title |
Path Conditions and Principal Matching: A New Approach to Access Control |
Authors |
Jason Crampton and James Sellwood (Royal Holloway, University of London) |
Paper 4 |
Title |
Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control |
Authors |
Gedare Bloom and Rahul Simha (Computer Science Department, The George Washington University) |
Paper 5 |
Title |
Game Theoretic Analysis of Multiparty Access Control in Online Social Networks |
Authors |
Hongxin Hu (Delaware State University), Gail-Joon Ahn, Ziming Zhao (Arizona State University) and Dejun Yang (Colorado School of Mines) |
Paper 6 |
Title |
Access Control Models for Geo-Social Computing Systems |
Authors |
Ebrahim Tarameshloo and Philip W. L. Fong (University of Calgary) |
Paper 7 |
Title |
An Actor-Based, Application-Aware Access Control Evaluation Framework |
Authors |
William C. Garrison Iii, Adam J. Lee (University of Pittsburgh) and Timothy Hinrichs (VMware, Inc.) |
Paper 8 |
Title |
Optimized and Controlled Provisioning of Encrypted Outsourced Data |
Authors |
Anis Bkakria (Telecom Bretagne Rennes), Andreas Schaad, Florian Kerschbaum (SAP AG), Frederic Cuppens, Nora Cuppens-Boulahia (Telecom Bretagne Rennes) and David Gross-Amblard (Universite de Rennes 1 - IRISA) |
Paper 9 |
Title |
Sorting Out Role Based Access Control |
Authors |
Wouter Kuijper and Victor Ermolaev (Nedap N.V., Netherlands) |
Paper 10 |
Title |
Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control |
Authors |
Silvio Ranise (Security & Trust, FBK-Irst, Trento, Italia), Anh Truong (University of Trento and Security & Trust, FBK-Irst, Trento, Italia) and Alessandro Armando (Security &Trust, FBK-Irst, Trento, Italia and DIBRIS, University of Genova, Italia) |
Paper 11 |
Title |
Limiting Access to Unintentionally Leaked Sensitive Documents Using Malware Signatures |
Authors |
Mordechai Guri, Gabi Kedma, Buky Carmeli and Yuval Elovici (Ben-Gurion University) |
Paper 12 |
Title |
An Access Control Concept for Novel Automotive HMI Systems |
Authors |
Simon Gansel (Daimler AG), Stephan Schnitzer (University of Stuttgart), Ahmad Gilbeau-Hammoud, Viktor Friesen (Daimler AG), Frank Dürr, Kurt Rothermel (University of Stuttgart) and Christian Maihöfer (Daimler AG) |
Paper 13 |
Title |
Anomaly detection and visualization in generative RBAC models |
Authors |
Maria Leitner and Stefanie Rinderle-Ma (University of Vienna) |
Paper 14 |
Title |
Reduction of Access Control Decisions |
Authors |
Charles Morisset (Newcastle University) and Nicola Zannone (Eindhoven University of Technology) |
Paper 15 |
Title |
Automating Network Monitor Placement in Large-Scale Networks |
Authors |
Nirupama Talele, Jason Teutsch (Penn State University), Robert Erbacher (Utah State University) and Trent Jaeger (Penn State University) |
Paper 16 |
Title |
Towards More Usable Information Flow Policies for Contemporary Operating Systems |
Authors |
Wai Kit Sze, Bhuvan Mital and R. Sekar (Stony Brook University) |
Paper 17 |
Title |
Policy Models to Protect Resource Retrieval |
Authors |
Hayawardh Vijayakumar, Xinyang Ge and Trent Jaeger (Penn State University) |