About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Location
Registration
Hotel Reservation
Since 1995

 

Maintained and
Sponsored by

 

Paper 1
Title Towards Fine Grained RDF Access Control
Authors yothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas)
Paper 2
Title User-Centric Identity as a Service-Architecture for eIDs with Selective Attribute Disclosure
Authors Daniel Slamanig (Graz University of Technology - IAIK), Klaus Stranacher and Bernd Zwattendorfer (EGIZ)
Paper 3
Title Path Conditions and Principal Matching: A New Approach to Access Control
Authors Jason Crampton and James Sellwood (Royal Holloway, University of London)
Paper 4
Title Hardware-Enhanced Distributed Access Enforcement for Role-Based Access Control
Authors Gedare Bloom and Rahul Simha (Computer Science Department, The George Washington University)
Paper 5
Title Game Theoretic Analysis of Multiparty Access Control in Online Social Networks
Authors Hongxin Hu (Delaware State University), Gail-Joon Ahn, Ziming Zhao (Arizona State University) and Dejun Yang (Colorado School of Mines)
Paper 6
Title Access Control Models for Geo-Social Computing Systems
Authors Ebrahim Tarameshloo and Philip W. L. Fong (University of Calgary)
Paper 7
Title An Actor-Based, Application-Aware Access Control Evaluation Framework
Authors William C. Garrison Iii, Adam J. Lee (University of Pittsburgh) and Timothy Hinrichs (VMware, Inc.)
Paper 8
Title Optimized and Controlled Provisioning of Encrypted Outsourced Data
Authors Anis Bkakria (Telecom Bretagne Rennes), Andreas Schaad, Florian Kerschbaum (SAP AG), Frederic Cuppens, Nora Cuppens-Boulahia (Telecom Bretagne Rennes) and David Gross-Amblard (Universite de Rennes 1 - IRISA)
Paper 9
Title Sorting Out Role Based Access Control
Authors Wouter Kuijper and Victor Ermolaev (Nedap N.V., Netherlands)
Paper 10
Title Scalable and Precise Automated Analysis of Administrative Temporal Role-Based Access Control
Authors Silvio Ranise (Security & Trust, FBK-Irst, Trento, Italia), Anh Truong (University of Trento and Security & Trust, FBK-Irst, Trento, Italia) and Alessandro Armando (Security &Trust, FBK-Irst, Trento, Italia and DIBRIS, University of Genova, Italia)
Paper 11
Title Limiting Access to Unintentionally Leaked Sensitive Documents Using Malware Signatures
Authors Mordechai Guri, Gabi Kedma, Buky Carmeli and Yuval Elovici (Ben-Gurion University)
Paper 12
Title An Access Control Concept for Novel Automotive HMI Systems
Authors Simon Gansel (Daimler AG), Stephan Schnitzer (University of Stuttgart), Ahmad Gilbeau-Hammoud, Viktor Friesen (Daimler AG), Frank Dürr, Kurt Rothermel (University of Stuttgart) and Christian Maihöfer (Daimler AG)
Paper 13
Title Anomaly detection and visualization in generative RBAC models
Authors Maria Leitner and Stefanie Rinderle-Ma (University of Vienna)
Paper 14
Title Reduction of Access Control Decisions
Authors Charles Morisset (Newcastle University) and Nicola Zannone (Eindhoven University of Technology)
Paper 15
Title Automating Network Monitor Placement in Large-Scale Networks
Authors Nirupama Talele, Jason Teutsch (Penn State University), Robert Erbacher (Utah State University) and Trent Jaeger (Penn State University)
Paper 16
Title Towards More Usable Information Flow Policies for Contemporary Operating Systems
Authors Wai Kit Sze, Bhuvan Mital and R. Sekar (Stony Brook University)
Paper 17
Title Policy Models to Protect Resource Retrieval
Authors Hayawardh Vijayakumar, Xinyang Ge and Trent Jaeger (Penn State University)

 

Demo 1
Title A System for Risk Awareness During Role Mining
Authors Sharmin Ahmed and Sylvia Osborn (University of Western Ontario)
Demo 2
Title Redaction based RDF Access Control Language
Authors Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu and Bhavani Thuraisingham (The University Of Texas Dallas)
Demo 3
Title Attribute Based Access Control for APIs in Spring Security
Authors Alessandro Armando (DIBRIS - University of Genova), Roberto Carbone, Eyasu Getahun Chekole (Security & Trust Unit, FBK) and Silvio Ranise (FBK-Irst)
Demo 4
Title Comprehensive Integrity Protection for Desktop Linux
Authors Wai Kit Sze and R. Sekar (Stony Brook University)

 

Copyright (c) ACM SACMAT All rights reserved.