SACMAT C

23 papers

YearTitle / Authors
2016A Context-Aware System to Secure Enterprise Content.
Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino
2016A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation.
Sherman S. M. Chow
2016A Space-Efficient Data Structure for Fast Access Control in ECM Systems.
Garfield Zhiping Wu, Frank Wm. Tompa
2016An Application Restriction System for Bring-Your-Own-Device Scenarios.
Oyindamola Oluwatimi, Elisa Bertino
2016An Empirical Study on User Access Control in Online Social Networks.
Minyue Ni, Yang Zhang, Weili Han, Jun Pang
2016Automated Fault Localization of XACML Policies.
Dianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen
2016Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting.
Julien Bringer, Othmane El Omri, Constance Morel, Hervé Chabanne
2016Data-Centric Access Control for Cloud Computing.
Thomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers
2016Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code.
Jun Zhu, Bill Chu, Heather Richter Lipford
2016Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Hitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang
2016Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support.
Yuan Cheng, Khalid Zaman Bijon, Ravi S. Sandhu
2016Formal Comparison of an Attribute Based Access Control Language for RESTful Services with XACML.
Marc Hüffmeyer, Ulf Schreier
2016GemRBAC-DSL: A High-level Specification Language for Role-based Access Control Policies.
Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand
2016Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability.
Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise
2016On Completeness in Languages for Attribute-Based Access Control.
Jason Crampton, Conrad Williams
2016Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang
2016Policy Negotiation for Co-owned Resources in Relationship-Based Access Control.
Pooya Mehregan, Philip W. L. Fong
2016PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing.
Cory Thoma, Adam J. Lee, Alexandros Labrinidis
2016Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016
X. Sean Wang, Lujo Bauer, Florian Kerschbaum
2016Resiliency Policies in Access Control Revisited.
Jason Crampton, Gregory Z. Gutin, Rémi Watrigant
2016Start Here: Engineering Scalable Access Control Systems.
Aaron Elliott, Scott Knight
2016State-aware Network Access Management for Software-Defined Networks.
Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng
2016Tri-Modularization of Firewall Policies.
Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park