Abstract is missing.
- Data Breach and Multiple Points to Stop ItDanfeng (Daphne) Yao. 1 [doi]
- Automated Coverage-Based Testing of XACML PoliciesDianxiang Xu, Roshan Shrestha, Ning Shen. 3-14 [doi]
- Parametric RBAC Maintenance via Max-SATMarco Benedetti, Marco Mori. 15-25 [doi]
- Independent Key Distribution Protocols for Broadcast AuthenticationBruhadeshwar Bezawada, Sandeep S. Kulkarni, Indrajit Ray, Indrakshi Ray, Rui Li. 27-38 [doi]
- Self-Generation of Access Control PoliciesSeraphin B. Calo, Dinesh C. Verma, Supriyo Chakraborty, Elisa Bertino, Emil Lupu, Gregory H. Cirincione. 39-47 [doi]
- Multi-Party Access Control: Requirements, State of the Art and Open ChallengesAnna Cinzia Squicciarini, Sarah Michele Rajtmajer, Nicola Zannone. 49 [doi]
- Securing Named Data Networks: Challenges and the Way ForwardElisa Bertino, Mohamed Nabeel. 51-59 [doi]
- Privacy-Aware Risk-Adaptive Access Control in Health Information Systems using Topic ModelsWenxi Zhang, Hao Li, Min Zhang, Zhiquan Lv. 61-67 [doi]
- "Kn0w Thy Doma1n Name": Unbiased Phishing Detection Using Domain Name Based FeaturesHossein Shirazi, Bruhadeshwar Bezawada, Indrakshi Ray. 69-75 [doi]
- A blockchain-based Trust System for the Internet of ThingsRoberto Di Pietro, Xavier Salleras, Matteo Signorini, Erez Waisbard. 77-83 [doi]
- Distributed Usage Control Enforcement through Trusted Platform Modules and SGX EnclavesPaul Georg Wagner, Pascal Birnstill, Jürgen Beyerer. 85-91 [doi]
- My Friend Leaks My Privacy: Modeling and Analyzing Privacy in Social NetworksLingjing Yu, Sri Mounica Motipalli, Dongwon Lee 0001, Peng Liu, Heng Xu, Qingyun Liu, Jianlong Tan, Bo Luo. 93-104 [doi]
- Sensing or Watching?: Balancing Utility and Privacy in Sensing Systems via Collection and Enforcement MechanismsAdam J. Lee, Jacob T. Biehl, Conor Curry. 105-116 [doi]
- Solving Multi-Objective Workflow Satisfiability Problems with Optimization Modulo Theories TechniquesClara Bertolissi, Daniel Ricardo Dos Santos, Silvio Ranise. 117-128 [doi]
- Network Policy Enforcement Using Transactions: The NEUTRON ApproachDan Thomsen, Elisa Bertino. 129-136 [doi]
- A Deep Learning Approach for Extracting Attributes of ABAC PoliciesManar Alohaly, Hassan Takabi, Eduardo Blanco. 137-148 [doi]
- Efficient Extended ABAC EvaluationCharles Morisset, Tim A. C. Willemse, Nicola Zannone. 149-160 [doi]
- Mining Positive and Negative Attribute-Based Access Control Policy RulesPadmavathi Iyer, Amirreza Masoumzadeh. 161-172 [doi]
- Towards a Privacy-Aware Qunatified Self Data Management FrameworkBhavani M. Thuraisingham, Murat Kantarcioglu, Elisa Bertino, Jonathan Z. Bakdash, Maribel Fernández. 173-184 [doi]
- Access Control in the Era of Big Data: State of the Art and Research DirectionsPietro Colombo, Elena Ferrari. 185-192 [doi]
- Authorization Framework for Secure Cloud Assisted Connected Cars and Vehicular Internet of ThingsMaanak Gupta, Ravi S. Sandhu. 193-204 [doi]
- Reactive Access Control SystemsMaryam Davari, Elisa Bertino. 205-207 [doi]
- Toward A Code Pattern Based Vulnerability Measurement ModelJohn Heaps, Rocky Slavin, Xiaoyin Wang. 209-211 [doi]
- Using Gini Impurity to Mine Attribute-based Access Control Policies with Environment AttributesSaptarshi Das, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. 213-215 [doi]
- Towards Greater Expressiveness, Flexibility, and Uniformity in Access ControlJiaming Jiang, Rada Chirkova, Jon Doyle, Arnon Rosenthal. 217-219 [doi]
- How Inadequate Specification, Buggy Implementation, and Deficient Platform-Support Hinder SecurityOmar Chowdhury. 221 [doi]
- Access Control Enforcement within MQTT-based Internet of Things EcosystemsPietro Colombo, Elena Ferrari. 223-234 [doi]
- A Lazy Approach to Access Control as a Service (ACaaS) for IoT: An AWS Case StudyTahir Ahmad, Umberto Morelli, Silvio Ranise, Nicola Zannone. 235-246 [doi]
- HCAP: A History-Based Capability System for IoT DevicesLakshya Tandon, Philip W. L. Fong, Reihaneh Safavi-Naini. 247-258 [doi]