About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Location
Registration
Hotel Reservation
Since 1995

 

Maintained and
Sponsored by

 

Paper 1
Title Valued Workflow Satisfiability Problem
Authors Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Daniel Karapetyan (University of Nottingham)
Paper 2
Title Relationship-Based Access Control for an Open-Source Medical Records System
Authors Syed Zain Rizvi (University of Calgary); Philip W. L. Fong (University of Calgary); Jason Crampton (Royal Holloway, University of London); James Sellwood (Royal Holloway, University of London)
Paper 3
Title Towards Attribute-Based Authorisation for Bidirectional Programming
Authors Lionel Montrieux (NII); Zhenjiang Hu (NII)
Paper 4
Title Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling
Authors Khalid Bijon (University of Texas at San Antonio); Ram Krishnan (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio)
Paper 5
Title SecLoc: Securing Location-Sensitive Storage in the Cloud
Authors Jingwei Li (The Chinese University of Hong Kong); Anna Squicciarini (The Pennsylvania State University); Dan Lin (Missouri University of Science and Technology); Shuang Liang (Nankai University); Chunfu Jia (Nankai University)
Paper 6
Title Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies
Authors Jonathan Shahen (University of Waterloo); Jianwei Niu (University of Texas at San Antonio); Mahesh Tripunitara (University of Waterloo)
Paper 7
Title A Logical Approach to Restricting Access in Online Social Networks
Authors Marcos Cramer (University of Luxembourg); Jun Pang (University of Luxembourg); Yang Zhang (University of Luxembourg)
Paper 8
Title A Logic of Trust for Reasoning About Delegation And Revocation
Authors Marcos Cramer (University of Luxembourg); Agustin Ambrossio (Université du Luxembourg)
Paper 9
Title Automated Inference of Access Control Policies for Web Applications
Authors Ha Thanh Le (University of Luxembourg); Cu Duy Nguyen (University of Luxembourg); Lionel Briand (University of Luxembourg); Benjamin Hourte (HITEC Luxembourg S.A.)
Paper 10
Title On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval
Authors Jason Crampton (Royal Holloway, University of London); Charles Morisset (Newcastle University); Nicola Zannone (Eindhoven University of Technology)
Paper 11
Title Preventing Information Inference in Access Control
Authors Federica Paci (University of Trento); Nicola Zannone (Eindhoven University of Technology)
Paper 12
Title Commune: Shared Ownership in an Agnostic Cloud
Authors Claudio Soriente (ETH Zurich); Ghassan Karame (NEC Laboratories Europe); Hubert Ritzdorf (ETH Zurich); Srdjan Marinovic (ETH Zurich); Srdjan Capkun (ETH Zurich)
Paper 13
Title Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking
Authors Weili Han (Fudan University); Yin Zhang (Fudan University); Zeqing Guo (Fudan University); Elisa Bertino (Purdue University)
Paper 14
Title SPA: Inviting Your Friends to Help Set Android Apps
Authors Zeqing Guo (Fudan University); Weili Han (Fudan University); Liangxing Liu (Fudan University); Wenyuan Xu (Zhejiang University); Ruiqi Bu (Fudan University); Minyue Ni (Fudan University)
Paper 15
Title Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach
Authors Jafar Haadi Jafarian (University of North Carolina at Charlotte); Hassan Takabi (University of North Texas); Ehsan Hesamifard (University of North Texas); Hakim Touati (University of North Carolina at Charlotte)
Paper 16
Title Mitigating Access Control Vulnerabilities through Interactive Static Analysis
Authors Jun Zhu (University of North Carolina at Charlotte); Bill Chu (University of North Carolina at Charlotte); Heather Lipford (University of North Carolina at Charlotte); Tyler Thomas (University of North Carolina at Charlotte)
Paper 17
Title Federated Access Management for Collaborative Network Environments: Framework and Case Study
Authors Carlos E. Rubio-Medrano (Arizona State University); Ziming Zhao (Arizona State University); Adam Doupe (Arizona State University); Gail-Joon Ahn (Arizona State University)

 

 

Copyright (c) ACM SACMAT All rights reserved.