![](https://dblp.org/img/logo.320x120.png)
![search dblp search dblp](https://dblp.org/img/search.dark.16x16.png)
![search dblp](https://dblp.org/img/search.dark.16x16.png)
default search action
SACMAT 2024: San Antonio, TX, USA
- Jianwei Niu, Jaideep Vaidya:
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, SACMAT 2024, San Antonio, TX, USA, May 15-17, 2024. ACM 2024 - Ashish Kundu
:
AI/ML, Graphs and Access Control: Towards Holistic Identity and Access Management. - Barbara Masucci
:
Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future Directions. - Bhavani Thuraisingham
:
Trustworthy Artificial Intelligence for Securing Transportation Systems. - Jay Barot
, Ali A. Allami
, Ming Yin
, Dan Lin
:
ToneCheck: Unveiling the Impact of Dialects in Privacy Policy. - Tanveer Khan
, Mindaugas Budzys
, Antonis Michalas
:
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning. - Kunlong Liu
, Trinabh Gupta
:
Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries). - Gelareh Hasel Mehri
, Tien-Dung Le
, Bram C. M. Cappers
, Jerry den Hartog
, Nicola Zannone
:
WiP: Enhancing the Comprehension of XACML Policies. - Morgan Reece
, Nidhi Rastogi
, Theodore Lander
, Josiah Dykstra
, Sudip Mittal
, Andy Sampson
:
Defending Multi-Cloud Applications Against Man-in-the-Middle Attacks. - Jacob Hopkins
, Carlos E. Rubio-Medrano
:
SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private Data. - Ulrich Schöpp
, Fathiyeh Faghih
, Subhajit Bandopadhyay
, Hussein Joumaa
, Amjad Ibrahim
, Chuangjie Xu
, Xin Ye
, Theo Dimitrakos
:
Static and Dynamic Analysis of a Usage Control System. - Hanyu Wang
, Aimin Yu
, Lifang Xiao
, Jin Li
, Xu Cao
:
SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation. - Brian Ricks
, Patrick Tague
, Bhavani Thuraisingham
, Sriraam Natarajan
:
Utilizing Threat Partitioning for More Practical Network Anomaly Detection. - Mohiuddin Ahmed
, Jinpeng Wei
, Ehab Al-Shaer
:
Prompting LLM to Enforce and Validate CIS Critical Security Control. - Carlos E. Rubio-Medrano
, Akash Kotak
, Wenlu Wang
, Karsten Sohr
:
Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal Specifications. - Niklas Hemken
, Florian Jacob
, Fabian Tërnava
, Rainer Kartmann
, Tamim Asfour
, Hannes Hartenstein
:
BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots. - Gelareh Hasel Mehri
, Benjamin Monmege
, Clara Bertolissi
, Nicola Zannone
:
A Bargaining-Game Framework for Multi-Party Access Control. - Pieter-Jan Vrielynck
, Tim Van hamme
, Rawad Ghostin
, Bert Lagaisse
, Davy Preuveneers
, Wouter Joosen
:
A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive Delegations. - Hussein Joumaa
, Ali Hariri
, Ana Petrovska
, Oleksii Osliak
, Theo Dimitrakos
, Bruno Crispo
:
Obligation Management Framework for Usage Control. - Josué A. Ruiz
, Paliath Narendran
, Amir Masoumzadeh
, Padmavathi Iyer
:
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules. - Roberta Cimorelli Belfiore
, Alfredo De Santis
, Anna Lisa Ferrara
, Barbara Masucci
:
Hierarchical Key Assignment Schemes with Key Rotation. - Camille Nuoskala
, Reyhaneh Rabbaninejad
, Tassos Dimitriou
, Antonis Michalas
:
FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional Encryption. - Jennifer Mondragon
, Gael Cruz
, Dvijesh Shastri
, Carlos E. Rubio-Medrano
:
Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart Homes.
![](https://dblp.org/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.