


default search action
SACMAT 2020: Barcelona, Spain
- Jorge Lobo, Scott D. Stoller, Peng Liu:

Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, SACMAT 2020, Barcelona, Spain, June 10-12, 2020. ACM 2020, ISBN 978-1-4503-7568-9 - Qiuyu Xiao, Brittany Subialdea, Lujo Bauer

, Michael K. Reiter:
Metering Graphical Data Leakage with Snowman. 1-12 - Tao Feng, Chuan Yue:

Visualizing and Interpreting RNN Models in URL-based Phishing Detection. 13-24 - Deshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin

:
Parallel Space Traveling: A Security Analysis of App-Level Virtualization in Android. 25-32 - Tal Rabin:

Cryptography for #MeToo. 33 - Onuralp Ulusoy, Pinar Yolum:

Norm-based Access Control. 35-46 - Khalid Alkhattabi, Ahmed Alshehri, Chuan Yue:

Security and Privacy Analysis of Android Family Locator Apps. 47-58 - Marco Rosa, Francesco Di Cerbo, Rocío Cabrera Lozoya:

Declarative Access Control for Aggregations of Multiple Ownership Data. 59-70 - Nurul Momen

, Sven Bock
, Lothar Fritsch:
Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of Android. 71-80 - Florian Jacob

, Luca Becker, Jan Grashöfer, Hannes Hartenstein:
Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without Finality. 81-92 - Gregory Z. Gutin, Daniel Karapetyan:

Constraint Branching in Workflow Satisfiability Problem. 93-103 - Dianxiang Xu, Roshan Shrestha, Ning Shen:

Automated Strong Mutation Testing of XACML Policies. 105-116 - William Enck:

Analysis of Access Control Enforcement in Android. 117-118 - Jon Currey, Robbie McKinstry, Armon Dadgar, Mark Gritter:

Informed Privilege-Complexity Trade-Offs in RBAC Configuration. 119-130 - Carlos E. Rubio-Medrano

, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn
:
Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC Policies. 131-144 - Alessandro Armando, Giorgia Gazzarata, Fatih Turkmen

:
Benchmarking UAQ Solvers. 145-152 - Alessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen

:
AQUA: An Efficient Solver for the User Authorization Query Problem. 153-154 - Padmavathi Iyer, Amirreza Masoumzadeh:

Active Learning of Relationship-Based Access Control Policies. 155-166 - Thang Bui, Scott D. Stoller:

A Decision Tree Learning Approach for Mining Relationship-Based Access Control Policies. 167-178 - Jorge Lobo

, Elisa Bertino, Alessandra Russo
:
On Security Policy Migrations. 179-188 - Anna Cinzia Squicciarini:

Multi-party Access Control - 10 Years of Successes and Lessons Learned. 189-190 - Maribel Fernández

, Alex Franch Tapia, Jenjira Jaimunk
, Manuel Martinez Chamorro, Bhavani Thuraisingham:
A Data Access Model for Privacy-Preserving Cloud-IoT Architectures. 191-202 - Smriti Bhatt, Ravi S. Sandhu:

ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of Things. 203-212 - Tahir Ahmad

, Umberto Morelli
, Silvio Ranise:
Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP Theorem. 213-220 - Pietro Colombo

, Elena Ferrari, Samuele Salvia:
Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystems. 221-222 - Paras Bhatt, Smriti Bhatt, Myung Ko:

Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In Organizations. 223-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














