Title |
Access Control for Binary Integrity Protection using Ethereum |
Authors |
Oliver Stengele (Karlsruhe Institute of Technology); Andreas Baumeister (Fraunhofer); Pascal Birnstill (Karlsruhe Institute of Technology); Hannes Hartenstein (Karlsruhe Institute of Technology) |
Title |
CAOS: Concurrent-Access Obfuscated Store |
Authors |
Mihai Ordean (University of Birmingham); Mark Ryan (University of Birmingham); David Galindo (University of Birmingham) |
Title |
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC |
Authors |
Ronit Nath (Indian Institute of Technology Kharagpur); Saptarshi Das(Indian Institute of Technology Kharagpur); Shamik Sural(Indian Institute of Technology Kharagpur); Jaideep Vaidya(Rutgers University); Vijay Atluri (Rutgers University) |
Title |
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree |
Authors |
Joshua Morris (University of Missouri Columbia); Dan Lin (University of Missouri Columbia; Anna Squicciarini (The Pennsylvania State University) |
Title |
Brokering Policies and Execution Monitors for IoT Middleware |
Authors |
Juan Carlos Fuentes Carranza (University of Calgary); Philip W. L. Fong (University of Calgary) |
Title |
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms |
Authors |
Moosa Yahyazadeh (The University of Iowa); Proyash Podder (Florida International University); Endadul Hoque (Florida International University); Omar Chowdhury (The University of Iowa) |
Title |
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols |
Authors |
Eduard Marin Fabregas (University of Birmingham); Enrique Argones Rúa (imec-COSIC KU Leuven); Dave Singelée (imec-COSIC KU Leuven); Bart Preneel (imec-COSIC KU Leuven) |
Title |
HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control |
Authors |
Ahmed Khalil Abdulla (Hamad bin Khalifa University); Spiridon Bakiras (Hamad bin Khalifa University) |
Title |
Towards Effective Verification of Multi-Model Access Control Properties |
Authors |
Bernhard J. Berger (Universitat Bremen); Christian Maeder (Universitat Bremen); Rodrigue Wete Nguempnang (Universitat Bremen); Karsten Sohr and Carlos Rubio-Medrano (Universitat Bremen) |
Title |
Efficient and Extensible Policy Mining for Relationship-Based Access Control |
Authors |
Thang Bui (Stony Brook University); Scott Stoller (Stony Brook University); Hieu Le (Stony Brook University) |
Title |
Using provenance for secure data fusion in cooperative systems |
Authors |
Clara Bertolissi (LIF-Universite Aix-Marseille 1 and King's College London); Jerry Den Hartog (Eindhoven University of Technology); Nicola Zannone (Eindhoven University of Technology) |
Title |
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies |
Authors |
Carlos Rubio Medrano (Arizona State University); Shaishavkumar Jogani (Arizona State University); Maria Leitner (Austrian Institute of Technology); Ziming Zhao (Rochester Institute of Technology); Gail-Joon Ahn (Arizona State University) |
Title |
Generalized Mining of Relationship Based Access Control Policies in Evolving Systems |
Authors |
Padmavathi Iyer (University at Albany - SUNY); Amirreza Masoumzadeh (University at Albany - SUNY) |
Title |
Enhancing Biometric-Capsule-based Authentication and Facial Recognition Via Deep Learning |
Authors |
Tyler Phillips (Indiana University-Purdue University Indianapolis); Xukai Zou (Indiana University-Purdue University Indianapolis); Feng Li (Indiana University-Purdue University Indianapolis); Ninghui Li (Purdue University) |
Title |
A Rule-based Approach to the Decidability of Safety of ABAC_alpha |
Authors |
Mircea Marin (West University of Timisoara); Temur Kutsia (RISC, Johannes Kepler University Linz); Besik Dundua (Ilia Vekua Institute of Applied Mathematics, Tbilisi State University) |
Title |
Bounded and Approximate Strong Satisfiability in Workflows |
Authors |
Jason Crampton (Royal Holloway, University of London); Gregory Gutin (Royal Holloway, University of London); Diptapriyo Majumdar (Royal Holloway, University of London) |
Title |
CMCAP: Ephemeral sandboxes for adaptive access control |
Authors |
Theogene Hakiza Bucuti (University of North Texas); Ram Dantu (University of North Texas); Kirill Morozov (University of North Texas) |
Title |
Mutual Authorizations:Semantics, Integration Issues, and Performance |
Authors |
Gabriela Lorena Suntaxi Ona (Karlsruhe Institute of Technology); Aboubakr Achraf El Ghazi (Karlsruhe Institute of Technology); Klemens Böhm (Karlsruhe Institute of Technology) |
Title |
Owner-centric Sharing of Physical Resources, Data, and Data-driven Insights in Digital Ecosystems |
Authors |
Kwok Cheung (Extropy, United Kingdom); Michael Huth (XAIN AG, Germany); Laurence Krik (Extropy, United Kingdom); Leif-Nissen Lundbæk (XAIN AG, Germany); Rodolphe Marques (XAIN AG, Germany); Jan Petsche (XAIN AG, Germany) |
Title |
A Blockchain-Based Trust Framework for Collaborative Internet-of-Things |
Authors |
Bo Tang (Sichuan Changhong Electric Co., Ltd., China); Hongjuan Kang (Sichuan Changhong Electric Co., Ltd., China); Jingwen Fan (Sichuan Changhong Electric Co., Ltd., China); Qi Li (Tsinghua University, China); Ravi Sandhu (University of Texas at San Antonio) |
Title |
An OpenRBAC Semantic Model for Access Control in Vehicular Networks |
Authors |
I-Ling Yen (The University of Texas at Dallas); Sultan Alsarra (The University of Texas at Dallas); Yongtao Huang (The University of Texas at Dallas); Bhavani Thuraisingham (The University of Texas at Dallas); Farokh Bastani (The University of Texas at Dallas) |
Title |
Toward Detection of Access Control Models from Source Code via Word Embedding |
Authors |
John Heaps (University of Texas at San Antonio); Xiaoyin Wang (University of Texas at San Antonio); Travis Breaux (Carnegie Mellon University); Jianwei Niu (University of Texas at San Antonio) |