| 2018 | A Deep Learning Approach for Extracting Attributes of ABAC Policies. Manar Alohaly, Hassan Takabi, Eduardo Blanco |
| 2018 | A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case Study. Tahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone |
| 2018 | A blockchain-based Trust System for the Internet of Things. Roberto Di Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard |
| 2018 | Access Control Enforcement within MQTT-based Internet of Things Ecosystems. Pietro Colombo, Elena Ferrari |
| 2018 | Access Control in the Era of Big Data: State of the Art and Research Directions. Pietro Colombo, Elena Ferrari |
| 2018 | Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things. Maanak Gupta, Ravi S. Sandhu |
| 2018 | Automated Coverage-Based Testing of XACML Policies. Dianxiang Xu, Roshan Shrestha, Ning Shen |
| 2018 | Data Breach and Multiple Points to Stop It. Danfeng (Daphne) Yao |
| 2018 | Distributed Usage Control Enforcement through Trusted Platform Modules and SGX Enclaves. Paul Georg Wagner, Pascal Birnstill, Jürgen Beyerer |
| 2018 | Efficient Extended ABAC Evaluation. Charles Morisset, Tim A. C. Willemse, Nicola Zannone |
| 2018 | HCAP: A History-Based Capability System for IoT Devices. Lakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini |
| 2018 | How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security. Omar Chowdhury |
| 2018 | Independent Key Distribution Protocols for Broadcast Authentication. Bruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li |
| 2018 | Mining Positive and Negative Attribute-Based Access Control Policy Rules. Padmavathi Iyer, Amirreza Masoumzadeh |
| 2018 | Multi-Party Access Control: Requirements, State of the Art and Open Challenges. Anna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone |
| 2018 | My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks. Lingjing Yu, Sri Mounica Motipalli, Dongwon Lee, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo |
| 2018 | Network Policy Enforcement Using Transactions: The NEUTRON Approach. Dan Thomsen, Elisa Bertino |
| 2018 | Parametric RBAC Maintenance via Max-SAT. Marco Benedetti, Marco Mori |
| 2018 | Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models. Wenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv |
| 2018 | Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018 Elisa Bertino, Dan Lin, Jorge Lobo |
| 2018 | Reactive Access Control Systems. Maryam Davari, Elisa Bertino |
| 2018 | Securing Named Data Networks: Challenges and the Way Forward. Elisa Bertino, Mohamed Nabeel |
| 2018 | Self-Generation of Access Control Policies. Seraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione |
| 2018 | Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms. Adam J. Lee, Jacob T. Biehl, Conor Curry |
| 2018 | Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques. Clara Bertolissi, Daniel Ricardo dos Santos, Silvio Ranise |
| 2018 | Toward A Code Pattern Based Vulnerability Measurement Model. John Heaps, Rocky Slavin, Xiaoyin Wang |
| 2018 | Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control. Jiaming Jiang, Rada Chirkova, Jon Doyle, Arnon Rosenthal |
| 2018 | Towards a Privacy-Aware Qunatified Self Data Management Framework. Bhavani Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández |
| 2018 | Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes. Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri |