Title |
[matrix] Decomposition: Analysis of an Access ControlApproach on Transaction-based DAGs without Finality |
Authors |
Florian Jacob, Luca Becker, Grashöfer Jan and Hannes Hartenstein |
Title |
A Data Access Model for Privacy-Preserving Cloud-IoT Architectures |
Authors |
Maribel Fernandez, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro and Bhavani Thuraisingham |
Title |
A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies |
Authors |
Thang Bui and Scott D. stoller |
Title |
Active Learning of Relationship-Based Access Control Policies |
Authors |
Padmavathi Iyer and Amirreza Masoumzadeh |
Title |
Automated Strong Mutation Testing of XACML Policies |
Authors |
Dianxiang Xu, Roshan Shrestha and Ning Shen |
Title |
Constraint Branching in Workflow Satisfiability Problem |
Authors |
Gregory Gutin and Daniel Karapetyan |
Title |
Declarative Access Control for Aggregations of Multiple Ownership Data |
Authors |
Marco Rosa, Francesco Di Cerbo and Rocio Cabrera Lozoya |
Title |
Informed Privilege-Complexity Trade-Offs in RBAC Configuration |
Authors |
Jon Currey, Robbie McKinstry, Armon Dadgar and Mark Gritter |
Title |
Metering Graphical Data Leakage with Snowman |
Authors |
Qiuyu Xiao, Brittany Subialdea, Lujo Bauer and Michael Reiter |
Title |
Norm-based Access Control |
Authors |
Onuralp Ulusoy and Pinar Yolum |
Title |
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies |
Authors |
Carlos Rubio Medrano, Luis Claramunt, Shaishavkumar Jogani and Gail-Joon Ahn |
Title |
Security and Privacy Analysis of Android Family Locator Apps |
Authors |
Khalid Alkhattabi, Ahmed Alshehri and Chuan Yue |
Title |
Visualizing and Interpreting RNN Models in URL-based Phishing Detection |
Authors |
Tao Feng and Chuan Yue |