SACMAT C

23 papers

YearTitle / Authors
2025A Policy-Based Mitigation of Transaction Exclusion in Ethereum [Work in Progress Paper].
Patrick Spiesberger, Jan Droll, Hannes Hartenstein
2025ABAC Lab: An Interactive Platform for Attribute-based Access Control Policy Analysis, Tools, and Datasets [Dataset/Tool Paper].
Thang Bui, Anthony Matricia, Emily Contreras, Ryan Mauvais, Luis Medina, Israel Serrano
2025ACGuard5GC: Privacy-Preserving Prevention of Access Control Attacks within 5G Core Networks.
Harsh Sanjay Pacherkar, Guanhua Yan
2025Caplification: Bridging Capability-Aware and Capability-Oblivious Software.
Jason Zhijingcheng Yu, Mingkai Li, Aditya Badole, Trevor E. Carlson, Michael Swift, Prateek Saxena
2025Cedar: An Expressive, Fast, Safe, and Analyzable Authorization Language for Modern Distributed Systems [Keynote Abstract].
John H. Kastner
2025Coordinated Enforcement of Obligations in Distributed Usage Control Systems [Work In Progress Paper].
Hussein Joumaa, Ali Hariri, Theo Dimitrakos, Bruno Crispo
2025Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation.
Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu
2025In-Context Vulnerability Propagation in LLMs [Work In Progress Paper].
Aditya Nangia, Sriya Ayachitula, Chinmay Kundu
2025Leakage-Resilient Easily Deployable and Efficiently Searchable Encryption (EDESE).
Jiaming Yuan, Yingjiu Li, Jun Li, Daoyuan Wu, Jianting Ning, Yangguang Tian, Robert H. Deng
2025MUBox: A Critical Evaluation Framework of Deep Machine Unlearning [Systematization of Knowledge Paper].
Xiang Li, Wenqi Wei, Bhavani Thuraisingham
2025Machine Learning in Access Control: A Taxonomy [Systematization of Knowledge Paper].
Mohammad Nur Nobi, Maanak Gupta, Ram Krishnan, Md. Shohel Rana, Lopamudra Praharaj, Mahmoud Abdelsalam
2025Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration.
Mahesh Tripunitara
2025New Algorithms for Minimizing the Number of Edges in Bottom-Up Role Mining.
Puneet Gill, Mahesh Tripunitara
2025Policy Mining: Putting LLMs to Work [Keynote Abstract].
Vijayalakshmi Atluri
2025Predictive Enhancement of ABAC Policies Using Access Log Analytics [Work In Progress Paper].
Shmuel Amour, Ehud Gudes
2025Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, SACMAT 2025, Stony Brook, NY, USA, 10 July 2025
Scott D. Stoller, Omar Chowdhury, Adam J. Lee, Amir Masoumzadeh
2025ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations.
Ben Weintraub, Chanyuan Liu, William Enck, Cristina Nita-Rotaru
2025RAN Tester UE: An Automated Declarative UE Centric Security Testing Platform [Dataset/Tool Paper].
Charles Marion Ueltschey, Joshua Moore, Aly Sabri Abdalla, Vuk Marojevic
2025Relying on Trust to Balance Protection and Performance in Cryptographic Access Control.
Simone Brunello, Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise
2025SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs.
Rakesh Podder, Turgay Caglar, Shadaab Kawnain Bashir, Sarath Sreedharan, Indrajit Ray, Indrakshi Ray
2025Safety Analysis in the NGAC Model.
Brian Tan, Ewan S. D. Davies, Indrakshi Ray, Mahmoud Abdelgawad
2025Towards Explainable Access Control [BlueSky Paper].
Gelareh Hasel Mehri, Charles Morisset, Nicola Zannone
2025ZeroTouch: Reinforcing RSS for Secure Geofencing.
Nikola Antonijevic, Sayon Duttagupta, Dave Singelée, Enrique Argones-Rúa, Bart Preneel