Backdoor Attacks to Graph Neural Networks |
Zaixi Zhang: Duke University; Jinyuan Jia: Duke University; Binghui Wang: Duke University; Neil Zhenqiang Gong: Duke University |
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing |
Shengmin Xu: Singapore Management University; Jianting Ning: Singapore Management University: Jinhua Ma: Fujian Normal University; Xinyi Huang: Fujian Normal University; Hwee Hwa Pang: Singapore Management University: Robert Deng: Singapore Management University |
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control |
Dominic Heutelbeck: FTK e.V. Forschungsinstitut für Telekommunikation und Kooperation; Marc Lucas Baur: FTK e.V. Forschungsinstitut für Telekommunikation und Kooperation; Martin Kluba: FTK e.V. Forschungsinstitut für Telekommunikation und Kooperation |
Mutation Analysis of NGAC Policies |
Erzhuo Chen: University of Missouri - Kansas City; Vladislav Dubrovenski: University of Missouri - Kansas City; Dianxiang Xu: University of Missouri - Kansas City |
Regulating Storage Overhead in Existing PoW-based Blockchains |
Frederik Armknecht: Universität Mannheim; Jens-Matthias Bohli: Mannheim University of Applied Sciences; Ghassan Karame: NEC Laboratories Europe; Wenting Li: NEC Laboratories Europe |
Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems |
Gaurav Panwar: New Mexico State University; Roopa Vishwanathan: New Mexico State University; Satyajayant Misra: New Mexico State University |
RMPlib: A Library of Benchmarks for the Role Mining Problem |
Simon Anderer: Hochschule Karlsruhe; Bernd Scheuermann: Hochschule Karlsruhe; Sanaz Mostaghim: Otto-von-Guericke University Magdeburg; Patrick Bauerle: SIVIS GmbH; Matthias Beil: SIVIS GmbH |
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing |
Isaac Polinsky: North Carolina State University; Pubali Datta: University of Illinois at Urbana-Champaign; Adam Bates: University of Illinois at Urbana-Champaign; William Enck: North Carolina State University |
Secure Aggregation Against Malicious Users |
Ferhat Karakoç: Ericsson Research; Melek Önen: EURECOM; Zeki Bilgin: Arçelik Research |
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models |
Amirreza Masoumzadeh: University at Albany - SUNY; Paliath Narendran: University at Albany - SUNY; Padmavathi Iyer: University at Albany - SUNY |
Towards Unifying RBAC with Information Flow Control |
Radhika B S: Indian Institute of Technology Bombay; Narendra Kumar N V: Institute for Development and Research in Banking Technology; Shyamasundar R K: Indian Institute of Technology Bombay |
Valued Authorization Policy Existence Problem |
Jason Crampton: Royal Holloway, University of London; Eduard Eiben: Royal Holloway, University of London; Gregory Gutin: Royal Holloway, University of London; Daniel Karapetyan: University of Nottingham; Diptapriyo Majumdar: Royal Holloway, University of London |