About
Call for Papers
Important Dates
Officers
Proceedings
Program
Program Committee
Venue
Visa Information
Since 1995

Program

All times are in Central Daylight Time (CDT).

The program is tentative and may be subject to changes.

Day 1 (Wednesday, 15 May 2024)
https://utsa.zoom.us/j/93340981507

Introductory Remarks

9:00-9:15

Keynote 1

Session Chair: Jianwei Niu

AI/ML, Graphs, and Access Control

Ashish Kundu

9:15-10:15

Coffee Break

Conference venue

10:15-10:45

Regular Track 1 (Privacy)

Session Chair: Barbara Masucci

Full Paper

ToneCheck: Unveiling the Impact of Dialects in Privacy Policy

Jay Barot, Ali Allami, Yin Ming and Dan Lin

10:45-11:15

Full Paper

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

Tanveer Khan, Mindaugas Budzys and Antonis Michalas

11:15-11:45

Short Paper

Making privacy-preserving federated graph analytics with strong guarantees practical (for certain queries)

Kunlong Liu and Trinabh Gupta

11:45-12:05

Lunch

Conference venue

12:05-13:30

Work-In-Progress Track

Session Chair: Theo Dimitrakos

Work-In-Progress

Enhancing the Comprehension of XACML Policies

Gelareh Hasel Mehri, Tien Dung Le, Bram Cappers, Jerry Den Hartog and Nicola Zannone

13:30-13:50

Work-In-Progress

Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks

Morgan Reece, Sudip Mittal, Theodore Lander, Nidhi Rastogi, Andy Sampson and Josiah Dykstra

13:50-14:10

Work-In-Progress

SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data

Jacob Hopkins and Carlos Rubio Medrano

14:10-14:30

Coffee Break

Conference venue

14:30-15:00

Regular Track 2 (Policy Analysis and Validation)

Session Chair: Carlos Rubio Medrano

Full Paper

Static and Dynamic Analysis of a Usage Control System

Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye and Theo Dimitrakos

15:00-15:30

Full Paper

SPRT: Automatically Adjusting SELinux Policy for Vulnerabilities Mitigation

Hanyu Wang, Aimin Yu, Lifang Xiao, Jin Li and Xu Cao

15:30-16:00

Short Paper

Utilizing Threat Partitioning for more Practical Network Anomaly Detection

Brian Ricks, Patrick Tague, Bhavani Thuraisingham and Sriraam Natarajan

16:00-16:20

ACM SIGSAC Women's Networking Reception

All the conference participants are welcome!

Session Chair - Elisa Bertino and Jaideep Vaidya

From 18:00

 

Day 2 (Thursday, 16 May 2024)
https://utsa.zoom.us/j/99067541298

Keynote 2

Session Chair: Ram Krishnan

Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions

Barbara Masucci

9:00-10:00

Coffee Break

Conference venue

10:00-10:30

Regular Track 3 (LLMs and Access Control Management)

Session Chair: Mitra Bokaei Hosseini

Full Paper

Prompting LLM to Enforce and Validate CIS Critical Security Control

Mohiuddin Ahmed, Jinpeng Wei and Ehab Al-Shaer

10:30-11:00

Full Paper

Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications

Carlos Rubio Medrano, Akash Kotak, Wenlu Wang and Karsten Sohr

11:00-11:30

Blue Sky/Vision Track

Session Chair: Mitra Bokaei Hosseini

Blue Sky/Vision

How to Raise a Robot — A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots

Niklas Hemken, Florian Jacob, Fabian Tërnava, Rainer Kartmann, Tamim Asfour and Hannes Hartenstein

11:30-12:00

Lunch

Conference venue

12:00-13:30


 

Regular Track 4 (Access Control Framework)

Session Chair: Amir Masoumzadeh

Full Paper

A Game Theoretic Framework for Multi-Party Access Control

Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi and Nicola Zannone

13:30-14:00

Short Paper

A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations

Pieter-Jan Vrielynck, Tim Van Hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers and Wouter Joosen

14:00-14:20

Short Paper

Obligation Management Framework for Usage Control

Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos and Bruno Crispo

14:20-14:40

Coffee Break

Conference venue

14:40-15:00

Panel

Moderator: Ram Krishnan

Panel

Title: Zero Trust Architectures and the Future of Security and Privacy

Panelists: Elisa Bertino, Hongxin Hu, Amir Masoumzadeh, and Shouhuai Xu

15:00-16:00

Celebration of Prof. Ravi Sandhu

Session Chair: Jianwei Niu and Jaideep Vaidya

16:00-17:00

Conference Banquet

Venue

From 18:00

 


 

Day 3 (Friday 17 May 2024)
https://utsa.zoom.us/j/99010506617

Keynote 3

Session Chair: Jaideep Vaidya

Trustworthy Artificial Intelligence for Securing Transportation Systems

Bhavani Thuraisingham

9:00-10:00

Coffee Break

Conference venue

10:00-10:20

Regular Track 5 (Policy Management and Enforcement)

Session Chair: Rocky Slavin

Full Paper

Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules

Josue Ruiz, Amir Masoumzadeh, Paliath Narendran and Padmavathi Iyer

10:20-10:50

Full Paper

Hierarchical Key Assignment Schemes with Key Rotation Roberta Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara and Barbara Masucci

10:50-11:20

Short Paper

FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption

Camille Foucault, Reyhaneh Rabbaninejad, Tassos Dimitriou and Antonis Michalas

11:20-11:40

Poster Paper

Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes

Jennifer Mondragon, Carlos Rubio Medrano, Gael Cruz and Dvijesh Shastri

11:40-11:50

Announcement of the Best Paper Award and Closing Remarks

11:50-12:00

Lunch/Lunch Box Collection
Depending on the preference expressed during registration

Conference venue

12:00-12:30

 

Copyright © 2005-2025 ACM SACMAT All rights reserved.

Privacy policy • Cookie policy