Abstract is missing.
- State-aware Network Access Management for Software-Defined NetworksWonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng. 1-11 [doi]
- An Empirical Study on User Access Control in Online Social NetworksMinyue Ni, Yang Zhang, Weili Han, Jun Pang. 13-23 [doi]
- An Application Restriction System for Bring-Your-Own-Device ScenariosOyindamola Oluwatimi, Elisa Bertino. 25-36 [doi]
- Tri-Modularization of Firewall PoliciesHaiNing Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian Molloy, Youngja Park. 37-48 [doi]
- Panel Security and Privacy in the Age of Internet of Things: Opportunities and ChallengesJianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang. 49-50 [doi]
- Enabling Dynamic Access Control for Controller Applications in Software-Defined NetworksHitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang. 51-61 [doi]
- A Context-Aware System to Secure Enterprise ContentOyindamola Oluwatimi, Daniele Midi, Elisa Bertino. 63-72 [doi]
- Detecting Privilege Escalation Attacks through Instrumenting Web Application Source CodeJun Zhu, Bill Chu, Heather Richter Lipford. 73-80 [doi]
- Data-Centric Access Control for Cloud ComputingThomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers. 81-88 [doi]
- Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and ReusabilityDaniel Ricardo Dos Santos, Serena Elisa Ponta, Silvio Ranise. 89-99 [doi]
- Resiliency Policies in Access Control RevisitedJason Crampton, Gregory Gutin, Rémi Watrigant. 101-111 [doi]
- Start Here: Engineering Scalable Access Control SystemsAaron Elliott, Scott Knight. 113-124 [doi]
- Policy Negotiation for Co-owned Resources in Relationship-Based Access ControlPooya Mehregan, Philip W. L. Fong. 125-136 [doi]
- Automated Fault Localization of XACML PoliciesDianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen. 137-147 [doi]
- On Completeness in Languages for Attribute-Based Access ControlJason Crampton, Conrad Williams. 149-160 [doi]
- Extended ReBAC Administrative Models with Cascading Revocation and Provenance SupportYuan Cheng, Khalid Zaman Bijon, Ravi S. Sandhu. 161-170 [doi]
- Formal Comparison of an Attribute Based Access Control Language for RESTful Services with XACMLMarc Hüffmeyer, Ulf Schreier. 171-178 [doi]
- GemRBAC-DSL: A High-level Specification Language for Role-based Access Control PoliciesAmeni ben Fadhel, Domenico Bianculli, Lionel C. Briand. 179-190 [doi]
- A Space-Efficient Data Structure for Fast Access Control in ECM SystemsGarfield Zhiping Wu, Frank Wm. Tompa. 191-201 [doi]
- Boosting GSHADE Capabilities: New Applications and Security in Malicious SettingJulien Bringer, Othmane El Omri, Constance Morel, Hervé Chabanne. 203-214 [doi]
- A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and RevocationSherman S. M. Chow. 215-226 [doi]
- PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream ProcessingCory Thoma, Adam J. Lee, Alexandros Labrinidis. 227-238 [doi]