Paper 1 |
Title |
Valued Workflow Satisfiability Problem |
Authors |
Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Daniel Karapetyan (University of Nottingham) |
Paper 2 |
Title |
Relationship-Based Access Control for an Open-Source Medical Records System |
Authors |
Syed Zain Rizvi (University of Calgary); Philip W. L. Fong (University of Calgary); Jason Crampton (Royal Holloway, University of London); James Sellwood (Royal Holloway, University of London) |
Paper 3 |
Title |
Towards Attribute-Based Authorisation for Bidirectional Programming |
Authors |
Lionel Montrieux (NII); Zhenjiang Hu (NII) |
Paper 4 |
Title |
Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling |
Authors |
Khalid Bijon (University of Texas at San Antonio); Ram Krishnan (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio) |
Paper 5 |
Title |
SecLoc: Securing Location-Sensitive Storage in the Cloud |
Authors |
Jingwei Li (The Chinese University of Hong Kong); Anna Squicciarini (The Pennsylvania State University); Dan Lin (Missouri University of Science and Technology); Shuang Liang (Nankai University); Chunfu Jia (Nankai University) |
Paper 6 |
Title |
Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies |
Authors |
Jonathan Shahen (University of Waterloo); Jianwei Niu (University of Texas at San Antonio); Mahesh Tripunitara (University of Waterloo) |
Paper 7 |
Title |
A Logical Approach to Restricting Access in Online Social Networks |
Authors |
Marcos Cramer (University of Luxembourg); Jun Pang (University of Luxembourg); Yang Zhang (University of Luxembourg) |
Paper 8 |
Title |
A Logic of Trust for Reasoning About Delegation And Revocation |
Authors |
Marcos Cramer (University of Luxembourg); Agustin Ambrossio (Université du Luxembourg) |
Paper 9 |
Title |
Automated Inference of Access Control Policies for Web Applications |
Authors |
Ha Thanh Le (University of Luxembourg); Cu Duy Nguyen (University of Luxembourg); Lionel Briand (University of Luxembourg); Benjamin Hourte (HITEC Luxembourg S.A.) |
Paper 10 |
Title |
On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval |
Authors |
Jason Crampton (Royal Holloway, University of London); Charles Morisset (Newcastle University); Nicola Zannone (Eindhoven University of Technology) |
Paper 11 |
Title |
Preventing Information Inference in Access Control |
Authors |
Federica Paci (University of Trento); Nicola Zannone (Eindhoven University of Technology) |
Paper 12 |
Title |
Commune: Shared Ownership in an Agnostic Cloud |
Authors |
Claudio Soriente (ETH Zurich); Ghassan Karame (NEC Laboratories Europe); Hubert Ritzdorf (ETH Zurich); Srdjan Marinovic (ETH Zurich); Srdjan Capkun (ETH Zurich) |
Paper 13 |
Title |
Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking |
Authors |
Weili Han (Fudan University); Yin Zhang (Fudan University); Zeqing Guo (Fudan University); Elisa Bertino (Purdue University) |
Paper 14 |
Title |
SPA: Inviting Your Friends to Help Set Android Apps |
Authors |
Zeqing Guo (Fudan University); Weili Han (Fudan University); Liangxing Liu (Fudan University); Wenyuan Xu (Zhejiang University); Ruiqi Bu (Fudan University); Minyue Ni (Fudan University) |
Paper 15 |
Title |
Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach |
Authors |
Jafar Haadi Jafarian (University of North Carolina at Charlotte); Hassan Takabi (University of North Texas); Ehsan Hesamifard (University of North Texas); Hakim Touati (University of North Carolina at Charlotte) |
Paper 16 |
Title |
Mitigating Access Control Vulnerabilities through Interactive Static Analysis |
Authors |
Jun Zhu (University of North Carolina at Charlotte); Bill Chu (University of North Carolina at Charlotte); Heather Lipford (University of North Carolina at Charlotte); Tyler Thomas (University of North Carolina at Charlotte) |
Paper 17 |
Title |
Federated Access Management for Collaborative Network Environments: Framework and Case Study |
Authors |
Carlos E. Rubio-Medrano (Arizona State University); Ziming Zhao (Arizona State University); Adam Doupe (Arizona State University); Gail-Joon Ahn (Arizona State University) |