default search action
SACMAT 2021: Virtual Event, Spain
- Jorge Lobo, Roberto Di Pietro, Omar Chowdhury, Hongxin Hu:
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021. ACM 2021, ISBN 978-1-4503-8365-3 - Alina Oprea:
Machine Learning Integrity and Privacy in Adversarial Environments. 1-2 - Simon Anderer, Bernd Scheuermann, Sanaz Mostaghim, Patrick Bauerle, Matthias Beil:
RMPlib: A Library of Benchmarks for the Role Mining Problem. 3-13 - Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong:
Backdoor Attacks to Graph Neural Networks. 15-26 - Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin:
Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection Research. 27-32 - Amirreza Masoumzadeh, Paliath Narendran, Padmavathi Iyer:
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models. 33-43 - B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar:
Towards Unifying RBAC with Information Flow Control. 45-54 - Mustafa Al-Lail:
Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control Decisions. 55-57 - Dominic Heutelbeck, Marc Lucas Baur, Martin Kluba:
In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access Control. 59-70 - Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu:
Mutation Analysis of NGAC Policies. 71-82 - Jason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar:
Valued Authorization Policy Existence Problem. 83-94 - Dominic Heutelbeck:
Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL). 95-97 - Marius Schlegel:
Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy Enforcement. 99-101 - Gaurav Panwar, Roopa Vishwanathan, Satyajayant Misra:
ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based Cryptosystems. 103-114 - Ferhat Karakoç, Melek Önen, Zeki Bilgin:
Secure Aggregation Against Malicious Users. 115-124 - Jonas Schiffl, Matthias Grundmann, Marc Leinweber, Oliver Stengele, Sebastian Friebe, Bernhard Beckert:
Towards Correct Smart Contracts: A Case Study on Formal Verification of Access Control. 125-130 - Frederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li:
Regulating Storage Overhead in Existing PoW-based Blockchains. 131-142 - Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. 143-154 - Maanak Gupta, Ravi S. Sandhu:
Towards Activity-Centric Access Control for Smart Collaborative Ecosystems. 155-164 - Charalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino:
Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and Testing. 165-174 - Isaac Polinsky, Pubali Datta, Adam Bates, William Enck:
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing. 175-186
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.