Title |
HCAP: A History-Based Capability System for IoT Devices |
Authors |
Lakshya Tandon (University of Calgary); Philip W. L. Fong (University of Calgary); Reihaneh Safavi-Naini (University of Calgary) |
Title |
Automated Coverage-Based Testing of XACML Policies |
Authors |
Dianxiang Xu (Boise State University); Roshan Shrestha (Boise State University); Ning Shen (Boise State University) |
Title |
Efficient Extended ABAC Evaluation |
Authors |
Charles Morisset (Newcastle University); Tim Willemse (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology) |
Title |
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks |
Authors |
JLingjing Yu (Chinese Academy of Sciences); Sri Mounica Motipalli (The University of Kansas); Dongwon Lee (The Pennsylvania State University); Peng Liu (The Pennsylvania State University); Heng Xu (The Pennsylvania State University); Qingyun Liu (Chinese Academy of Sciences); Jianlong Tan (Chinese Academy of Sciences); Bo Luo (The University of Kansas) |
Title |
Sensing or Watching? Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms |
Authors |
Adam J. Lee (University of Pittsburgh); Jacob T. Biehl (FXPAL); Conor Curry (University of Pittsburgh) |
Title |
A Deep Learning Approach for Extracting Attributes of ABAC Policies |
Authors |
Manar Alohaly (University of North Texas); Hassan Takabi (University of North Texas); Eduardo Blanco (University of North Texas) |
Title |
Solving Quantitative Workflow Satisfiability Problems with Optimization Modulo Theories Techniques |
Authors |
Clara Bertolissi (Aix-Marseille University); Daniel Ricardo Dos Santos (Eindhoven University of Technology); Silvio Ranise (Fondazione Bruno Kessler) |
Title |
Independent Key Distribution Protocols for Broadcast Authentication |
Authors |
Bruhadeshwar Bezawada (Colorado State University); Sandeep Kulkarni (Michigan State University); Indrajit Ray (Colorado State University); Indrakshi Ray (Colorado State University); Rui Li (Dongguan University of Technology) |
Title |
Access Control Enforcement within MQTT-based Internet of Things Ecosystems |
Authors |
Pietro Colombo (Università dell'Insubria); Elena Ferrari (University of Insubria) |
Title |
Parametric RBAC Maintenance via Max-SAT |
Authors |
Marco Benedetti (Bank of Italy); Marco Mori (Bank of Italy) |
Title |
Mining Positive and Negative Attribute-Based Access Control Policy Rules |
Authors |
Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY) |
Title |
A Lazy Approach to Access Control as a Service (ACaaS) for IoT |
Authors |
Tahir Ahmad (Foundation Bruno Kessler); Umberto Morelli (Foundation Bruno Kessler); Nicola Zannone (Eindhoven University of Technology); Silvio Ranise (Foundation Bruno Kessler) |
Title |
Distributed Usage Control Enforcement Through Trusted Platform Modules And SGX Enclaves |
Authors |
Paul Georg Wagner (Karlsruhe Institute of Technology); Pascal Birnstill (Fraunhofer); Jürgen Beyerer (Fraunhofer) |
Title |
Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models |
Authors |
Wenxi Zhang (Institute of Software Chinese Academy of Science); Hao Li (Institute of Software Chinese Academy of Science); Min Zhang (Institute of Software Chinese Academy of Science); Zhiquan Lv (National Computer Network Emergency Response Technical Team/Coordination Center of China) |
Title |
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features |
Authors |
Hossein Shirazi (Colorado State University); Bruhadeshwar Bezawada (Colorado State University); Indrakshi Ray (Colorado State University) |
Title |
A Blockchain-based Distributed Access Control for the Internet of Things |
Authors |
Roberto Di Pietro (Hamad Bin Khalifa University); Xavier Salleras (Pompeu Fabra University); Matteo Signorini (Nokia Bell Labs); Erez Waisbard (Nokia Bell Labs) |
Title |
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things |
Authors |
Maanak Gupta (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio) |
Title |
Self-Generation of Access Control Policies |
Authors |
Elisa Bertino (Purdue University); Seraphin Calo (IBM); Dinesh Verma (IBM); Gregory Cirincione (ARL); Supriyo Chakraborty (IBM) |
Title |
Securing Named Data Networks: Challenges and the Way Forward |
Authors |
Elisa Bertino (Purdue University); Mohamed Nabeel (Qatar Computing Research Institute) |
Title |
Towards A Privacy-Aware Quantified Self Data Management Framework |
Authors |
Bhavani Thuraisingham and Murat Kantarcioglu (The University of Texas at Dallas); Elisa Bertino (Purdue University); Jonathan Z. Bakdash (U.S. Army Research Laboratory Field Element at The University of Texas Dallas and Department of Psychology, Counseling, and Special Education, Texas A&M Commerce); Maribel Fernandez (Kings College, University of London) |
Title |
Access Control in the Era of Big Data: State of the Art and Research Directions |
Authors |
Pietro Colombo (Università dell'Insubria); Elena Ferrari (University of Insubria) |
Title |
Multi-Party Access Control: Requirements, State of the Art and Open Challenges |
Authors |
Anna Squicciarini (The Pennsylvania State University); Sarah Rajtmajer (Quantitative Scientific Solutions); Nicola Zannone (Eindhoven University of Technology) |