| 2024 | A Bargaining-Game Framework for Multi-Party Access Control. Gelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone |
| 2024 | A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. Pieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen |
| 2024 | AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management. Ashish Kundu |
| 2024 | BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots. Niklas Hemken, Florian Jacob, Fabian Tërnava, Rainer Kartmann, Tamim Asfour, Hannes Hartenstein |
| 2024 | Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes. Jennifer Mondragon, Gael Cruz, Dvijesh Shastri, Carlos E. Rubio-Medrano |
| 2024 | Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules. Josué A. Ruiz, Paliath Narendran, Amir Masoumzadeh, Padmavathi Iyer |
| 2024 | Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions. Barbara Masucci |
| 2024 | Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. Morgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson |
| 2024 | FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. Camille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas |
| 2024 | Hierarchical Key Assignment Schemes with Key Rotation. Roberta Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
| 2024 | Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. Tanveer Khan, Mindaugas Budzys, Antonis Michalas |
| 2024 | Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries). Kunlong Liu, Trinabh Gupta |
| 2024 | Obligation Management Framework for Usage Control. Hussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo |
| 2024 | Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. Carlos E. Rubio-Medrano, Akash Kotak, Wenlu Wang, Karsten Sohr |
| 2024 | Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, SACMAT 2024, San Antonio, TX, USA, May 15-17, 2024 Jianwei Niu, Jaideep Vaidya |
| 2024 | Prompting LLM to Enforce and Validate CIS Critical Security Control. Mohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer |
| 2024 | SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation. Hanyu Wang, Aimin Yu, Lifang Xiao, Jin Li, Xu Cao |
| 2024 | SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data. Jacob Hopkins, Carlos E. Rubio-Medrano |
| 2024 | Static and Dynamic Analysis of a Usage Control System. Ulrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos |
| 2024 | ToneCheck: Unveiling the Impact of Dialects in Privacy Policy. Jay Barot, Ali A. Allami, Ming Yin, Dan Lin |
| 2024 | Trustworthy Artificial Intelligence for Securing Transportation Systems. Bhavani Thuraisingham |
| 2024 | Utilizing Threat Partitioning for More Practical Network Anomaly Detection. Brian Ricks, Patrick Tague, Bhavani Thuraisingham, Sriraam Natarajan |
| 2024 | WiP: Enhancing the Comprehension of XACML Policies. Gelareh Hasel Mehri, Tien-Dung Le, Bram C. M. Cappers, Jerry den Hartog, Nicola Zannone |