| 2017 | A Datalog Framework for Modeling Relationship-based Access Control Policies. Edelmira Pasarella, Jorge Lobo |
| 2017 | A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records. Harsha S. Gardiyawasam Pussewalage, Vladimir A. Oleshchuk |
| 2017 | A Flexible Authorization Architecture for Systems of Interoperable Medical Devices. Qais Tasali, Chandan Chowdhury, Eugene Y. Vasserman |
| 2017 | A Framework for the Cryptographic Enforcement of Information Flow Policies. James Alderman, Jason Crampton, Naomi Farley |
| 2017 | A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics. Shagufta Mehnaz, Gowtham Bellala, Elisa Bertino |
| 2017 | An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms. Seyed Hossein Ahmadinejad, Philip W. L. Fong |
| 2017 | Attribute Expressions, Policy Tables and Attribute-Based Access Control. Jason Crampton, Conrad Williams |
| 2017 | Authorization Enforcement Detection. Ehood Porat, Shmuel Tikochinski, Ariel Stulman |
| 2017 | Distributed Intelligence: Trends in the Management of Complex Systems. Seraphin B. Calo, Dinesh C. Verma, Elisa Bertino |
| 2017 | Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis. Erisa Karafili, Emil C. Lupu |
| 2017 | FACT: Functionality-centric Access Control System for IoT Programming Frameworks. Sanghak Lee, Jiwon Choi, Jihun Kim, Beumjin Cho, Sangho Lee, Hanjun Kim, Jong Kim |
| 2017 | Leveraging Hardware Isolation for Process Level Access Control & Authentication. Syed Kamran Haider, Hamza Omar, Ilia A. Lebedev, Srinivas Devadas, Marten van Dijk |
| 2017 | Mining Relationship-Based Access Control Policies. Thang Bui, Scott D. Stoller, Jiajie Li |
| 2017 | Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment. Maanak Gupta, Farhan Patwa, James O. Benson, Ravi S. Sandhu |
| 2017 | NTApps: A Network Traffic Analyzer of Android Applications. Rodney Rodriguez, Shaikh Mostafa, Xiaoyin Wang |
| 2017 | On Risk in Access Control Enforcement. Giuseppe Petracca, Frank Capobianco, Christian Skalka, Trent Jaeger |
| 2017 | On the Satisfiability of Workflows with Release Points. Jason Crampton, Gregory Z. Gutin, Rémi Watrigant |
| 2017 | POSTER: Access Control Model for the Hadoop Ecosystem. Maanak Gupta, Farhan Patwa, Ravi S. Sandhu |
| 2017 | Poster: A Location-Privacy Approach for Continuous Queries. Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang |
| 2017 | Poster: Constrained Policy Mining in Attribute Based Access Control. Mayank Gautam, Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |
| 2017 | Poster: Design of an Anomaly-based Threat Detection & Explication System. Robert Luh, Sebastian Schrittwieser, Stefan Marschalek, Helge Janicke, Edgar R. Weippl |
| 2017 | Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han |
| 2017 | Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2017, Indianapolis, IN, USA, June 21-23, 2017 Elisa Bertino, Ravi S. Sandhu, Edgar R. Weippl |
| 2017 | Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language. Thomas MacGahan, Claiborne Johnson, Armando Rodriguez, Jeffery von Ronne, Jianwei Niu |
| 2017 | Secure Pick Up: Implicit Authentication When You Start Using the Smartphone. Wei-Han Lee, Xiaochen Liu, Yilin Shen, Hongxia Jin, Ruby B. Lee |
| 2017 | Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems. Paolo Guarda, Silvio Ranise, Hari Siswantoro |
| 2017 | Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn |
| 2017 | Towards a Top-down Policy Engineering Framework for Attribute-based Access Control. Masoud Narouei, Hamed Khanpour, Hassan Takabi, Natalie Parde, Rodney D. Nielsen |
| 2017 | Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication. Aysajan Abidin, Enrique Argones-Rúa, Roel Peeters |
| 2017 | Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures. Claiborne Johnson, Thomas MacGahan, John Heaps, Kevin Baldor, Jeffery von Ronne, Jianwei Niu |