| 2022 | "Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA. Elham Al Qahtani, Lipsarani Sahoo, Yousra Javed, Mohamed Shehab |
| 2022 | A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences. Adrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong |
| 2022 | A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception. Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian |
| 2022 | A Study of Application Sandbox Policies in Linux. Trevor Dunlap, William Enck, Bradley Reaves |
| 2022 | BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems. Tanjila Mawla, Maanak Gupta, Ravi S. Sandhu |
| 2022 | BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots. Saskia Bayreuther, Florian Jacob, Markus Grotz, Rainer Kartmann, Fabian Peller-Konrad, Fabian Paus, Hannes Hartenstein, Tamim Asfour |
| 2022 | BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities. Amirreza Masoumzadeh, Hans van der Laan, Albert Dercksen |
| 2022 | BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems. Safwa Ameer, Maanak Gupta, Smriti Bhatt, Ravi S. Sandhu |
| 2022 | Contemporaneous Update and Enforcement of ABAC Policies. Samir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya |
| 2022 | Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS. Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise |
| 2022 | Effective Evaluation of Relationship-Based Access Control Policy Mining. Padmavathi Iyer, Amirreza Masoumzadeh |
| 2022 | FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote Data. Minghong Fang, Jia Liu, Michinari Momma, Yi Sun |
| 2022 | Generalized Noise Role Mining. Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar |
| 2022 | Harpocrates: Anonymous Data Publication in Named Data Networking. Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis |
| 2022 | Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications. Chahal Arora, Syed Zain R. Rizvi, Philip W. L. Fong |
| 2022 | Keynote Talk - Federated Learning: The Hype, State-of-the-Art and Open Challenges. Nathalie Baracaldo |
| 2022 | LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X. Zheng Yang, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou |
| 2022 | Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations. Clara Bertolissi, Maribel Fernández |
| 2022 | Network (In)security: Leniency in Protocols' Design, Code and Configuration. Md. Endadul Hoque |
| 2022 | Poster: A Flexible Relationship-Based Access Control Policy Generator. Stanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone |
| 2022 | Poster: ASQL - Attribute Based Access Control Extension for SQL. Proteet Paul, Tushar Gupta, Shamik Sural |
| 2022 | Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption. Liang Zhang, Haibin Kan, Yuan Li, Jinrong Huang |
| 2022 | Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots. Jaime C. Acosta |
| 2022 | Poster: Toward Zero-Trust Path-Aware Access Control. Joshua H. Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip N. Brown, Gedare Bloom |
| 2022 | Removing the Reliance on Perimeters for Security using Network Views. Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves |
| 2022 | SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8 - 10, 2022 Sven Dietrich, Omar Chowdhury, Daniel Takabi |
| 2022 | Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead. Roberto Di Pietro |
| 2022 | The Secrecy Resilience of Access Control Policies and Its Application to Role Mining. Qiang Guo, Mahesh Tripunitara |
| 2022 | Towards a Theory on Testing XACML Policies. Dianxiang Xu, Roshan Shrestha, Ning Shen, Yunpeng Zhang |
| 2022 | WiP: AABAC - Automated Attribute Based Access Control for Genomics Data. David Reddick, Justin Presley, Frank Alex Feltus, Susmit Shannigrahi |
| 2022 | WiP: Metamodel for Continuous Authorisation and Usage Control. Ali Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo |
| 2022 | WiP: The Intrinsic Dimensionality of IoT Networks. Matt Gorbett, Hossein Shirazi, Indrakshi Ray |
| 2022 | WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks. Georgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa, Giuseppe Durisi |