Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacmat/sacmat2018.bht:"
@inproceedings{DBLP:conf/sacmat/AhmadMRZ18, author = {Tahir Ahmad and Umberto Morelli and Silvio Ranise and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An {AWS} Case Study}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {235--246}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205989}, doi = {10.1145/3205977.3205989}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/AhmadMRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/AlohalyTB18, author = {Manar Alohaly and Hassan Takabi and Eduardo Blanco}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A Deep Learning Approach for Extracting Attributes of {ABAC} Policies}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {137--148}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205984}, doi = {10.1145/3205977.3205984}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/AlohalyTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BenedettiM18, author = {Marco Benedetti and Marco Mori}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Parametric {RBAC} Maintenance via Max-SAT}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {15--25}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205987}, doi = {10.1145/3205977.3205987}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BenedettiM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertinoN18, author = {Elisa Bertino and Mohamed Nabeel}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Securing Named Data Networks: Challenges and the Way Forward}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {51--59}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205996}, doi = {10.1145/3205977.3205996}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BertinoN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BertolissiSR18, author = {Clara Bertolissi and Daniel Ricardo dos Santos and Silvio Ranise}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories Techniques}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {117--128}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205982}, doi = {10.1145/3205977.3205982}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/BertolissiSR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/BezawadaKRRL18, author = {Bruhadeshwar Bezawada and Sandeep S. Kulkarni and Indrajit Ray and Indrakshi Ray and Rui Li}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Independent Key Distribution Protocols for Broadcast Authentication}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {27--38}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205985}, doi = {10.1145/3205977.3205985}, timestamp = {Tue, 29 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/BezawadaKRRL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/CaloVCBLC18, author = {Seraphin B. Calo and Dinesh C. Verma and Supriyo Chakraborty and Elisa Bertino and Emil Lupu and Gregory H. Cirincione}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Self-Generation of Access Control Policies}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {39--47}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205995}, doi = {10.1145/3205977.3205995}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/CaloVCBLC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Chowdhury18, author = {Omar Chowdhury}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder Security}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {221}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3206002}, doi = {10.1145/3205977.3206002}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Chowdhury18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ColomboF18, author = {Pietro Colombo and Elena Ferrari}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Access Control in the Era of Big Data: State of the Art and Research Directions}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {185--192}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205998}, doi = {10.1145/3205977.3205998}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ColomboF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ColomboF18a, author = {Pietro Colombo and Elena Ferrari}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Access Control Enforcement within MQTT-based Internet of Things Ecosystems}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {223--234}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205986}, doi = {10.1145/3205977.3205986}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ColomboF18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/DasSVA18, author = {Saptarshi Das and Shamik Sural and Jaideep Vaidya and Vijayalakshmi Atluri}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment Attributes}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {213--215}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3208949}, doi = {10.1145/3205977.3208949}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/DasSVA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/DavariB18, author = {Maryam Davari and Elisa Bertino}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Reactive Access Control Systems}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {205--207}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3208947}, doi = {10.1145/3205977.3208947}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/DavariB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/GuptaS18, author = {Maanak Gupta and Ravi S. Sandhu}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of Things}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {193--204}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205994}, doi = {10.1145/3205977.3205994}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/GuptaS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/HeapsSW18, author = {John Heaps and Rocky Slavin and Xiaoyin Wang}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Toward {A} Code Pattern Based Vulnerability Measurement Model}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {209--211}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3208948}, doi = {10.1145/3205977.3208948}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/HeapsSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/IyerM18, author = {Padmavathi Iyer and Amirreza Masoumzadeh}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Mining Positive and Negative Attribute-Based Access Control Policy Rules}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {161--172}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205988}, doi = {10.1145/3205977.3205988}, timestamp = {Fri, 08 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/IyerM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/JiangCDR18, author = {Jiaming Jiang and Rada Chirkova and Jon Doyle and Arnon Rosenthal}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Towards Greater Expressiveness, Flexibility, and Uniformity in Access Control}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {217--219}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3208950}, doi = {10.1145/3205977.3208950}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/JiangCDR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/LeeBC18, author = {Adam J. Lee and Jacob T. Biehl and Conor Curry}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement Mechanisms}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {105--116}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205983}, doi = {10.1145/3205977.3205983}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/LeeBC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/MorissetWZ18, author = {Charles Morisset and Tim A. C. Willemse and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Efficient Extended {ABAC} Evaluation}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {149--160}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205980}, doi = {10.1145/3205977.3205980}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/MorissetWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/PietroSSW18, author = {Roberto Di Pietro and Xavier Salleras and Matteo Signorini and Erez Waisbard}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {A blockchain-based Trust System for the Internet of Things}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {77--83}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205993}, doi = {10.1145/3205977.3205993}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/PietroSSW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ShiraziBR18, author = {Hossein Shirazi and Bruhadeshwar Bezawada and Indrakshi Ray}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {\emph{"Kn0w Thy Doma1n Name"}: Unbiased Phishing Detection Using Domain Name Based Features}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {69--75}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205992}, doi = {10.1145/3205977.3205992}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ShiraziBR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/SquicciariniRZ18, author = {Anna Cinzia Squicciarini and Sarah Michele Rajtmajer and Nicola Zannone}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Multi-Party Access Control: Requirements, State of the Art and Open Challenges}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {49}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205999}, doi = {10.1145/3205977.3205999}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/SquicciariniRZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/TandonFS18, author = {Lakshya Tandon and Philip W. L. Fong and Reihaneh Safavi{-}Naini}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {{HCAP:} {A} History-Based Capability System for IoT Devices}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {247--258}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205978}, doi = {10.1145/3205977.3205978}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/TandonFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ThomsenB18, author = {Dan Thomsen and Elisa Bertino}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Network Policy Enforcement Using Transactions: The {NEUTRON} Approach}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {129--136}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3206000}, doi = {10.1145/3205977.3206000}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ThomsenB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ThuraisinghamKB18, author = {Bhavani Thuraisingham and Murat Kantarcioglu and Elisa Bertino and Jonathan Z. Bakdash and Maribel Fern{\'{a}}ndez}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Towards a Privacy-Aware Qunatified Self Data Management Framework}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {173--184}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205997}, doi = {10.1145/3205977.3205997}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/ThuraisinghamKB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/WagnerBB18, author = {Paul Georg Wagner and Pascal Birnstill and J{\"{u}}rgen Beyerer}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Distributed Usage Control Enforcement through Trusted Platform Modules and {SGX} Enclaves}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {85--91}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205990}, doi = {10.1145/3205977.3205990}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacmat/WagnerBB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/XuSS18, author = {Dianxiang Xu and Roshan Shrestha and Ning Shen}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Automated Coverage-Based Testing of {XACML} Policies}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {3--14}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205979}, doi = {10.1145/3205977.3205979}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/XuSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/Yao18, author = {Danfeng (Daphne) Yao}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Data Breach and Multiple Points to Stop It}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {1}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3206001}, doi = {10.1145/3205977.3206001}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/Yao18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/YuM0LXLTL18, author = {Lingjing Yu and Sri Mounica Motipalli and Dongwon Lee and Peng Liu and Heng Xu and Qingyun Liu and Jianlong Tan and Bo Luo}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social Networks}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {93--104}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205981}, doi = {10.1145/3205977.3205981}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/YuM0LXLTL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacmat/ZhangLZL18, author = {Wenxi Zhang and Hao Li and Min Zhang and Zhiquan Lv}, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic Models}, booktitle = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, pages = {61--67}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977.3205991}, doi = {10.1145/3205977.3205991}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/ZhangLZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/sacmat/2018, editor = {Elisa Bertino and Dan Lin and Jorge Lobo}, title = {Proceedings of the 23nd {ACM} on Symposium on Access Control Models and Technologies, {SACMAT} 2018, Indianapolis, IN, USA, June 13-15, 2018}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205977}, doi = {10.1145/3205977}, timestamp = {Wed, 21 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacmat/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.