SACMAT C

27 papers

YearTitle / Authors
2015A Logic of Trust for Reasoning about Delegation and Revocation.
Marcos Cramer, Diego Agustín Ambrossio, Pieter Van Hertum
2015A Logical Approach to Restricting Access in Online Social Networks.
Marcos Cramer, Jun Pang, Yang Zhang
2015A Prototype to Reduce the Amount of Accessible Information.
Rainer Fischer
2015A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies.
Alessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad S. Wrona
2015Automated Inference of Access Control Policies for Web Applications.
Ha-Thanh Le, Cu Duy Nguyen, Lionel C. Briand, Benjamin Hourte
2015Challenges in Making Access Control Sensitive to the "Right" Contexts.
Trent Jaeger
2015Commune: Shared Ownership in an Agnostic Cloud.
Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun
2015Federated Access Management for Collaborative Network Environments: Framework and Case Study.
Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn
2015Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking.
Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino
2015Generating Secure Images for CAPTCHAs through Noise Addition.
David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri
2015Hard Instances for Verification Problems in Access Control.
Nima Mousavi, Mahesh V. Tripunitara
2015Initial Encryption of large Searchable Data Sets using Hadoop.
Feng Wang, Mathias Kohler, Andreas Schaad
2015Mitigating Access Control Vulnerabilities through Interactive Static Analysis.
Jun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas
2015Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling.
Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu
2015Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies.
Jonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara
2015On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval.
Jason Crampton, Charles Morisset, Nicola Zannone
2015Post-Snowden Threat Models.
Bart Preneel
2015Preventing Information Inference in Access Control.
Federica Paci, Nicola Zannone
2015Privacy and Access Control: How are These Two concepts Related?
Anna Cinzia Squicciarini, Ting Yu
2015Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015
Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee
2015Relationship-Based Access Control for an Open-Source Medical Records System.
Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood
2015SPA: Inviting Your Friends to Help Set Android Apps.
Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni
2015SecLoc: Securing Location-Sensitive Storage in the Cloud.
Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Shuang Liang, Chunfu Jia
2015Towards Attribute-Based Authorisation for Bidirectional Programming.
Lionel Montrieux, Zhenjiang Hu
2015Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach.
Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab
2015Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques.
Masoud Narouei, Hassan Takabi
2015Valued Workflow Satisfiability Problem.
Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan