| 2025 | A Policy-Based Mitigation of Transaction Exclusion in Ethereum [Work in Progress Paper]. Patrick Spiesberger, Jan Droll, Hannes Hartenstein |
| 2025 | ABAC Lab: An Interactive Platform for Attribute-based Access Control Policy Analysis, Tools, and Datasets [Dataset/Tool Paper]. Thang Bui, Anthony Matricia, Emily Contreras, Ryan Mauvais, Luis Medina, Israel Serrano |
| 2025 | ACGuard5GC: Privacy-Preserving Prevention of Access Control Attacks within 5G Core Networks. Harsh Sanjay Pacherkar, Guanhua Yan |
| 2025 | Caplification: Bridging Capability-Aware and Capability-Oblivious Software. Jason Zhijingcheng Yu, Mingkai Li, Aditya Badole, Trevor E. Carlson, Michael Swift, Prateek Saxena |
| 2025 | Cedar: An Expressive, Fast, Safe, and Analyzable Authorization Language for Modern Distributed Systems [Keynote Abstract]. John H. Kastner |
| 2025 | Coordinated Enforcement of Obligations in Distributed Usage Control Systems [Work In Progress Paper]. Hussein Joumaa, Ali Hariri, Theo Dimitrakos, Bruno Crispo |
| 2025 | Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation. Mian Yang, Vijayalakshmi Atluri, Shamik Sural, Ashish Kundu |
| 2025 | In-Context Vulnerability Propagation in LLMs [Work In Progress Paper]. Aditya Nangia, Sriya Ayachitula, Chinmay Kundu |
| 2025 | Leakage-Resilient Easily Deployable and Efficiently Searchable Encryption (EDESE). Jiaming Yuan, Yingjiu Li, Jun Li, Daoyuan Wu, Jianting Ning, Yangguang Tian, Robert H. Deng |
| 2025 | MUBox: A Critical Evaluation Framework of Deep Machine Unlearning [Systematization of Knowledge Paper]. Xiang Li, Wenqi Wei, Bhavani Thuraisingham |
| 2025 | Machine Learning in Access Control: A Taxonomy [Systematization of Knowledge Paper]. Mohammad Nur Nobi, Maanak Gupta, Ram Krishnan, Md. Shohel Rana, Lopamudra Praharaj, Mahmoud Abdelsalam |
| 2025 | Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration. Mahesh Tripunitara |
| 2025 | New Algorithms for Minimizing the Number of Edges in Bottom-Up Role Mining. Puneet Gill, Mahesh Tripunitara |
| 2025 | Policy Mining: Putting LLMs to Work [Keynote Abstract]. Vijayalakshmi Atluri |
| 2025 | Predictive Enhancement of ABAC Policies Using Access Log Analytics [Work In Progress Paper]. Shmuel Amour, Ehud Gudes |
| 2025 | Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, SACMAT 2025, Stony Brook, NY, USA, 10 July 2025 Scott D. Stoller, Omar Chowdhury, Adam J. Lee, Amir Masoumzadeh |
| 2025 | ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations. Ben Weintraub, Chanyuan Liu, William Enck, Cristina Nita-Rotaru |
| 2025 | RAN Tester UE: An Automated Declarative UE Centric Security Testing Platform [Dataset/Tool Paper]. Charles Marion Ueltschey, Joshua Moore, Aly Sabri Abdalla, Vuk Marojevic |
| 2025 | Relying on Trust to Balance Protection and Performance in Cryptographic Access Control. Simone Brunello, Stefano Berlato, Roberto Carbone, Adam J. Lee, Silvio Ranise |
| 2025 | SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs. Rakesh Podder, Turgay Caglar, Shadaab Kawnain Bashir, Sarath Sreedharan, Indrajit Ray, Indrakshi Ray |
| 2025 | Safety Analysis in the NGAC Model. Brian Tan, Ewan S. D. Davies, Indrakshi Ray, Mahmoud Abdelgawad |
| 2025 | Towards Explainable Access Control [BlueSky Paper]. Gelareh Hasel Mehri, Charles Morisset, Nicola Zannone |
| 2025 | ZeroTouch: Reinforcing RSS for Secure Geofencing. Nikola Antonijevic, Sayon Duttagupta, Dave Singelée, Enrique Argones-Rúa, Bart Preneel |