SACMAT C

25 papers

YearTitle / Authors
201419th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014
Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy
2014A bodyguard of lies: the use of honey objects in information security.
Ari Juels
2014A system for risk awareness during role mining.
Sharmin Ahmed, Sylvia L. Osborn
2014Access control models for geo-social computing systems.
Ebrahim Tarameshloo, Philip W. L. Fong
2014An access control concept for novel automotive HMI systems.
Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer
2014An actor-based, application-aware access control evaluation framework.
William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs
2014Anomaly detection and visualization in generative RBAC models.
Maria Leitner, Stefanie Rinderle-Ma
2014Attribute based access control for APIs in spring security.
Alessandro Armando, Roberto Carbone, Eyasu Getahun Chekole, Silvio Ranise
2014Comprehensive integrity protection for desktop linux.
Wai-Kit Sze, R. Sekar
2014Game theoretic analysis of multiparty access control in online social networks.
Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang
2014Hardware-enhanced distributed access enforcement for role-based access control.
Gedare Bloom, Rahul Simha
2014Limiting access to unintentionally leaked sensitive documents using malware signatures.
Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici
2014Monitor placement for large-scale systems.
Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger
2014Optimized and controlled provisioning of encrypted outsourced data.
Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard
2014Path conditions and principal matching: a new approach to access control.
Jason Crampton, James Sellwood
2014Policy models to protect resource retrieval.
Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger
2014Re-thinking networked privacy, security, identity and access control in our surveillance states.
Andrew Clement
2014Redaction based RDF access control language.
Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham
2014Reduction of access control decisions.
Charles Morisset, Nicola Zannone
2014Scalable and precise automated analysis of administrative temporal role-based access control.
Silvio Ranise, Anh Tuan Truong, Alessandro Armando
2014Sorting out role based access control.
Wouter Kuijper, Victor Ermolaev
2014Towards fine grained RDF access control.
Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham
2014Towards more usable information flow policies for contemporary operating systems.
Wai-Kit Sze, Bhuvan Mital, R. Sekar
2014User-centric identity as a service-architecture for eIDs with selective attribute disclosure.
Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer
2014What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems?
Lujo Bauer, Florian Kerschbaum