SACMAT '17 Abstracts- Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies
Full Citation in the ACM Digital Library
SESSION: Keynote Address I
Ravi Sandhu
Distributed Intelligence: Trends in the Management of Complex Systems
Seraphin B. Calo
Dinesh C. Verma
Elisa Bertino
SESSION: Authorization and Authentication
Elena Ferrari
A Flexible Authorization Architecture for Systems of Interoperable Medical Devices
Qais Tasali
Chandan Chowdhury
Eugene Y. Vasserman
Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication
Aysajan Abidin
Enrique Argones Rúa
Roel Peeters
On Risk in Access Control Enforcement
Giuseppe Petracca
Frank Capobianco
Christian Skalka
Trent Jaeger
SESSION: Applications
Axel Kern
FACT: Functionality-centric Access Control System for IoT Programming Frameworks
Sanghak Lee
Jiwon Choi
Jihun Kim
Beumjin Cho
Sangho Lee
Hanjun Kim
Jong Kim
An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms
Seyed Hossein Ahmadinejad
Philip W.L. Fong
Secure Pick Up: Implicit Authentication When You Start Using the Smartphone
Wei-Han Lee
Xiaochen Liu
Yilin Shen
Hongxia Jin
Ruby B. Lee
SESSION: Policy Models and Frameworks
Hongxin Hu
Attribute Expressions, Policy Tables and Attribute-Based Access Control
Jason Crampton
Conrad Williams
A Datalog Framework for Modeling Relationship-based Access Control Policies
Edelmira Pasarella
Jorge Lobo
Towards a Top-down Policy Engineering Framework for Attribute-based Access Control
Masoud Narouei
Hamed Khanpour
Hassan Takabi
Natalie Parde
Rodney Nielsen
POSTER SESSION: Posters
Dan Lin
Robert Koch
Poster: A Location-Privacy Approach for Continuous Queries
Douglas Steiert
Dan Lin
Quincy Conduff
Wei Jiang
Poster: Design of an Anomaly-based Threat Detection & Explication System
Robert Luh
Sebastian Schrittwieser
Stefan Marschalek
Helge Janicke
Edgar Weippl
Poster: Constrained Policy Mining in Attribute Based Access Control
Mayank Gautam
Sadhana Jha
Shamik Sural
Jaideep Vaidya
Vijayalakshmi Atluri
POSTER: Access Control Model for the Hadoop Ecosystem
Maanak Gupta
Farhan Patwa
Ravi Sandhu
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control
Hongda Li
Juan Deng
Hongxin Hu
Kuang-Ching Wang
Gail-Joon Ahn
Ziming Zhao
Wonkyu Han
SESSION: Keynote Address II
Edgar Weippl
Leveraging Hardware Isolation for Process Level Access Control & Authentication
Syed Kamran Haider
Hamza Omar
Ilia Lebedev
Srinivas Devadas
Marten van Dijk
SESSION: Formal Techniques I
Edgar Weippl
A Framework for the Cryptographic Enforcement of Information Flow Policies
James Alderman
Jason Crampton
Naomi Farley
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks
Nishant Vishwamitra
Yifang Li
Kevin Wang
Hongxin Hu
Kelly Caine
Gail-Joon Ahn
Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures
Claiborne Johnson
Thomas MacGahan
John Heaps
Kevin Baldor
Jeffery von Ronne
Jianwei Niu
DEMONSTRATION SESSION: Demonstrations
Jianwei Niu
Authorization Enforcement Detection
Ehood Porat
Shmuel Tikochinski
Ariel Stulman
Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment
Maanak Gupta
Farhan Patwa
James Benson
Ravi Sandhu
Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language
Thomas MacGahan
Claiborne Johnson
Armando Rodriguez
Jeffery von Ronne
Jianwei Niu
NTApps: A Network Traffic Analyzer of Android Applications
Rodney Rodriguez
Shaikh Mostafa
Xiaoyin Wang
SESSION: Formal Techniques II
Xukai Zou
On the Satisfiability of Workflows with Release Points
Jason Crampton
Gregory Gutin
Rémi Watrigant
A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics
Shagufta Mehnaz
Gowtham Bellala
Elisa Bertino
SESSION: Short Papers
Elisa Bertino
Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis
Erisa Karafili
Emil C. Lupu
Mining Relationship-Based Access Control Policies
Thang Bui
Scott D. Stoller
Jiajie Li
Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems
Paolo Guarda
Silvio Ranise
Hari Siswantoro
A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records
Harsha S. Gardiyawasam Pussewalage
Vladimir A. Oleshchuk