About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

Room information:

  • The sessions will be held in the Jennings Ballroom
  • The breakfasts and coffee breaks will be held in the Governor's Pre Function
  • The lunches and reception will be held in the Severin Lobby

-- ACM OpenTOC to download SACMAT'18 papers --

WED
13-Jun-18
7:30-8:30 Breakfast
8:00-9:00 Registration
9:00-9:15 Opening
9:15-10:15 Keynote-Daphne Yao (Virginia Tech)
Data Breach and Multiple Points to Stop It
10:15-10:30 Coffee Break
10:30-12:00 Research Track - Access Control and Authentication (Session Chair: Dianxiang Xu, dianxiangxu@boisestate.edu)
Automated Coverage-Based Testing of XACML Policies (Dianxiang Xu (Boise State University); Roshan Shrestha (Boise State University); Ning Shen (Boise State University))
Parametric RBAC Maintenance via Max-SAT (Marco Benedetti (Bank of Italy); Marco Mori (Bank of Italy))
Independent Key Distribution Protocols for Broadcast Authentication (Bruhadeshwar Bezawada (Colorado State University); Sandeep Kulkarni (Michigan State University); Indrajit Ray (Colorado State University); Indrakshi Ray (Colorado State University); Rui Li (Dongguan University of Technology))
12:00-1:30 Lunch Break
1:30-2:30 Blue sky session (Session Chair - Daphne Yao, Virginia Tech): Next generation security services for emerging networks
Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things (Maanak Gupta (University of Texas at San Antonio); Ravi Sandhu (University of Texas at San Antonio))
Securing Named Data Networks: Challenges and the Way Forward (Elisa Bertino (Purdue University); Mohamed Nabeel (Qatar Computing Research Institute))
Multi-Party Access Control: Requirements, State of the Art and Open Challenges (Anna Squicciarini (The Pennsylvania State University); Sarah Rajtmajer (Quantitative Scientific Solutions); Nicola Zannone (Eindhoven University of Technology))
2:30 - 2:45 Coffee Break
2:45 - 3:45 Short papers (Session Chair - Bo Luo, bluo@ku.edu) 
Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models (Wenxi Zhang (Institute of Software Chinese Academy of Science); Hao Li (Institute of Software Chinese Academy of Science); Min Zhang (Institute of Software Chinese Academy of Science); Zhiquan Lv (National Computer Network Emergency Response Technical Team/Coordination Center of China))
"Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based Features (Hossein Shirazi (Colorado State University); Bruhadeshwar Bezawada (Colorado State University); Indrakshi Ray (Colorado State University))
A Blockchain-based Distributed Access Control for the Internet of Things (Roberto Di Pietro (Hamad Bin Khalifa University); Xavier Salleras (Pompeu Fabra University); Matteo Signorini (Nokia Bell Labs); Erez Waisbard (Nokia Bell Labs))
Distributed Usage Control Enforcement Through Trusted Platform Modules And SGX Enclaves (Paul Georg Wagner (Karlsruhe Institute of Technology); Pascal Birnstill (Fraunhofer); Jargen Beyerer (Fraunhofer))
3:45 - 4:00 Coffee Break
4:00 - 5:30 Research Track - Privacy (Session Chair - Bruhadeshwar Bezawada, bez.bru@gmail.com)
My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks (Lingjing Yu (Chinese Academy of Sciences); Sri Mounica Motipalli (The University of Kansas); Dongwon Lee (The Pennsylvania State University); Peng Liu (The Pennsylvania State University); Heng Xu (The Pennsylvania State University); Qingyun Liu (Chinese Academy of Sciences); Jianlong Tan (Chinese Academy of Sciences); Bo Luo (The University of Kansas))
Sensing or Watching? Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms (Adam J. Lee (University of Pittsburgh); Jacob T. Biehl (FXPAL); Conor Curry (University of Pittsburgh))
Solving Quantitative Workflow Satisfiability Problems with Optimization Modulo Theories Techniques (Clara Bertolissi (Aix-Marseille University); Daniel Ricardo Dos Santos (Eindhoven University of Technology); Silvio Ranise (Fondazione Bruno Kessler))
7:00- 9:00 Reception
THUR
14-Jun-18
7:30-8:30 Breakfast
8:00-9:00 Registration
9:00-10:00 Keynote-Dan Thomsen (Smart Information Flow Technologies - SIFT)
Network Policy Enforcement Using Transactions: The NEUTRON Approach
10:00-10:30 Coffee Break
10:30-12:00 Research Track - ABAC (Session Chair - Yuan Cheng, California State University, Sacramento)
A Deep Learning Approach for Extracting Attributes of ABAC Policies (Manar Alohaly (University of North Texas); Hassan Takabi (University of North Texas); Eduardo Blanco (University of North Texas))
Efficient Extended ABAC Evaluation (Charles Morisset (Newcastle University); Tim Willemse (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology))
Mining Positive and Negative Attribute-Based Access Control Policy Rules (Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY))
12:00-1:30 Lunch Break
1:30-2:30 Blue sky session (Session Chair - Omar Haider Chowdhury, University of Iowa): Innovation in access control and privacy-aware data management for Big Data and IoT
Towards A Privacy-Aware Quantified Self Data Management Framework (Bhavani Thuraisingham and Murat Kantarcioglu (The University of Texas at Dallas); Elisa Bertino (Purdue University); Jonathan Z. Bakdash (U.S. Army Research Laboratory Field Element at The University of Texas Dallas and Department of Psychology, Counseling, and Special Education, Texas A&M Commerce); Maribel Fernandez (Kings College, University of London))
Access Control in the Era of Big Data: State of the Art and Research Directions (Pietro Colombo (University of Insubria); Elena Ferrari (University of Insubria))
Self-Generation of Access Control Policies (Elisa Bertino (Purdue University); Seraphin Calo (IBM); Dinesh Verma (IBM); Gregory Cirincione (ARL); Supriyo Chakraborty (IBM))
2:30-4:30 Demo/Posters
Poster: Reactive Access Control Systems (Maryam Davari (Purdue University); Elisa Bertino (Purdue University))
Poster: Toward A Code Pattern Based Vulnerability Measurement Model (John Heaps (University of Texas at San Antonio); Rocky Slavin (University of Texas at San Antonio); Xiaoyin Wang (University of Texas at San Antonio))
Poster: Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes (Saptarshi Das (IIT Kharagpur, India); Shamik Sural (IIT Kharagpur, India); Jaideep Vaidya (Rutgers University); Vijayalakshmi Atluri (Rutgers University))
Poster: Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control (Jiaming Jiang (North Carolina State University); Rada Chirkova (North Carolina State University); Jon Doyle (North Carolina State University); Arnon Rosenthal (The MITRE Corporation)) 
4:30 - 5:30  Inaugural Junior Keynote - Omar Haider Chowdhury (the University of Iowa)
How Inadequate Specification, Buggy Implementation, and Deficient Platform Support Hinder Security
5:30 - 6:15 Test of time award Invited Talk
ROWLBAC: representing role based access control in OWL. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. Winsborough, and B. Thuraisingham. In Proceedings of the 13th ACM symposium on Access control models and technologies (SACMAT '08). ACM, New York, NY, USA, 73-82.
7:00- 9:00 Conference Banquet
FRI
15-Jun-18
7:30-8:30 Breakfast
9:00-10:00 Panel: Attributes? Roles? Relationships? or no model at all? Model base vs Learnt Policies: finding the balance between expressible and usable policies (Moderator: Jorge Lobo, Universitat Pompeu Fabra)
Panelists: Elisa Bertino (Purdue University), Ian Molloy (IBM Research), Ravi Sandhu (UTSA), and Jaideep Vaidya (Rutgers University)
10:00-10:15 Coffee Break
10:15-11:45 Research Track  - IoT (Session Chair - Maanak Gupta, gmaanakg@yahoo.com)
Access Control Enforcement within MQTT-based Internet of Things Ecosystems (Pietro Colombo (University of Insubria); Elena Ferrari (University of Insubria))
A Lazy Approach to Access Control as a Service (ACaaS) for IoT (Tahir Ahmad (Foundation Bruno Kessler); Umberto Morelli (Foundation Bruno Kessler); Nicola Zannone (Eindhoven University of Technology); Silvio Ranise (Foundation Bruno Kessler))
HCAP: A History-Based Capability System for IoT Devices (Lakshya Tandon (University of Calgary); Philip W. L. Fong (University of Calgary); Reihaneh Safavi-Naini (University of Calgary))
11:45-12:15 Closing 
12:15 - 1:00 Lunch Break 

Copyright (c) ACM SACMAT All rights reserved.