SACMAT C

29 papers

YearTitle / Authors
2018A Deep Learning Approach for Extracting Attributes of ABAC Policies.
Manar Alohaly, Hassan Takabi, Eduardo Blanco
2018A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study.
Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone
2018A blockchain-based Trust System for the Internet of Things.
Roberto Di Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard
2018Access Control Enforcement within MQTT-based Internet of Things Ecosystems.
Pietro Colombo, Elena Ferrari
2018Access Control in the Era of Big Data: State of the Art and Research Directions.
Pietro Colombo, Elena Ferrari
2018Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things.
Maanak Gupta, Ravi S. Sandhu
2018Automated Coverage-Based Testing of XACML Policies.
Dianxiang Xu, Roshan Shrestha, Ning Shen
2018Data Breach and Multiple Points to Stop It.
Danfeng (Daphne) Yao
2018Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves.
Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer
2018Efficient Extended ABAC Evaluation.
Charles Morisset, Tim A. C. Willemse, Nicola Zannone
2018HCAP: A History-Based Capability System for IoT Devices.
Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini
2018How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security.
Omar Chowdhury
2018Independent Key Distribution Protocols for Broadcast Authentication.
Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li
2018Mining Positive and Negative Attribute-Based Access Control Policy Rules.
Padmavathi Iyer, Amirreza Masoumzadeh
2018Multi-Party Access Control: Requirements, State of the Art and Open Challenges.
Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone
2018My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks.
Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo
2018Network Policy Enforcement Using Transactions: The NEUTRON Approach.
Dan Thomsen, Elisa Bertino
2018Parametric RBAC Maintenance via Max-SAT.
Marco Benedetti, Marco Mori
2018Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models.
Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv
2018Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018
Elisa Bertino, Dan Lin, Jorge Lobo
2018Reactive Access Control Systems.
Maryam Davari, Elisa Bertino
2018Securing Named Data Networks: Challenges and the Way Forward.
Elisa Bertino, Mohamed Nabeel
2018Self-Generation of Access Control Policies.
Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione
2018Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms.
Adam J. Lee, Jacob T. Biehl, Conor Curry
2018Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques.
Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise
2018Toward A Code Pattern Based Vulnerability Measurement Model.
John Heaps, Rocky Slavin, Xiaoyin Wang
2018Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control.
Jiaming Jiang, Rada Chirkova, Jon Doyle, Arnon Rosenthal
2018Towards a Privacy-Aware Qunatified Self Data Management Framework.
Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández
2018Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes.
Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri