Abstract is missing.
- Securing Big Data: New Access Control Challenges and ApproachesMurat Kantarcioglu. 1-2 [doi]
- Access Control for Binary Integrity Protection using EthereumOliver Stengele, Andreas Baumeister, Pascal Birnstill, Hannes Hartenstein. 3-12 [doi]
- CAOS: Concurrent-Access Obfuscated StoreMihai Ordean, Mark Ryan 0001, David Galindo. 13-24 [doi]
- PolTree: A Data Structure for Making Efficient Access Decisions in ABACRonit Nath, Saptarshi Das, Shamik Sural, Jaideep Vaidya, Vijay Atluri. 25-35 [doi]
- FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure DegreeJoshua Morris, Dan Lin, Anna Squicciarini. 37-48 [doi]
- Brokering Policies and Execution Monitors for IoT MiddlewareJuan Carlos Fuentes Carranza, Philip W. L. Fong. 49-60 [doi]
- Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home PlatformsMoosa Yahyazadeh, Proyash Podder, Md. Endadul Hoque, Omar Chowdhury. 61-72 [doi]
- Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital EcosystemsKwok Cheung, Michael Huth, Laurence Kirk, Leif-Nissen Lundbæk, Rodolphe Marques, Jan Petsche. 73-81 [doi]
- IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-ThingsBo Tang, Hongjuan Kang, Jingwen Fan, Qi Li, Ravi Sandhu. 83-92 [doi]
- An OpenRBAC Semantic Model for Access Control in Vehicular NetworksSultan Alsarra, I-Ling Yen, Yongtao Huang, Farokh B. Bastani, Bhavani M. Thuraisingham. 93-102 [doi]
- Toward Detection of Access Control Models from Source Code via Word EmbeddingJohn Heaps, Xiaoyin Wang, Travis D. Breaux, Jianwei Niu 0001. 103-112 [doi]
- On the Difficulty of Using Patient's Physiological Signals in Cryptographic ProtocolsEduard Marin, Enrique Argones-Rúa, Dave Singelée, Bart Preneel. 113-122 [doi]
- HITC: Data Privacy in Online Social Networks with Fine-Grained Access ControlAhmed Khalil Abdulla, Spiridon Bakiras. 123-134 [doi]
- Generalized Mining of Relationship-Based Access Control Policies in Evolving SystemsPadmavathi Iyer, Amirreza Masoumzadeh. 135-140 [doi]
- Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep LearningTyler Phillips, Xukai Zou, Feng Li 0001, Ninghui Li. 141-146 [doi]
- History and Future of Automated Vulnerability AnalysisAdam Doupé. 147 [doi]
- Towards Effective Verification of Multi-Model Access Control PropertiesBernhard J. Berger, Christian Maeder, Rodrigue Wete Nguempnang, Karsten Sohr, Carlos E. Rubio-Medrano. 149-160 [doi]
- Efficient and Extensible Policy Mining for Relationship-Based Access ControlThang Bui, Scott D. Stoller, Hieu Le. 161-172 [doi]
- A Rule-based Approach to the Decidability of Safety of ABACαMircea Marin, Temur Kutsia, Besik Dundua. 173-178 [doi]
- Bounded and Approximate Strong Satisfiability in WorkflowsJason Crampton, Gregory Z. Gutin, Diptapriyo Majumdar. 179-184 [doi]
- Using Provenance for Secure Data Fusion in Cooperative SystemsClara Bertolissi, Jerry den Hartog, Nicola Zannone. 185-194 [doi]
- Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive TechnologiesCarlos E. Rubio-Medrano, Shaishavkumar Jogani, Maria Leitner, Ziming Zhao 0001, Gail-Joon Ahn. 195-206 [doi]
- CMCAP: Ephemeral Sandboxes for Adaptive Access ControlTheogene Hakiza Bucuti, Ram Dantu, Kirill Morozov. 207-212 [doi]
- Mutual Authorizations: Semantics and Integration IssuesGabriela Suntaxi, Aboubakr Achraf El Ghazi, Klemens Böhm. 213-218 [doi]
- CloudProtect - A Cloud-based Software Protection ServiceAndreas Schaad, Björn Grohmann, Oliver Winzenried. 219-221 [doi]
- Poster: A Pluggable Authentication Module for Big Data Federation ArchitectureFeras M. Awaysheh, José Carlos Cabaleiro, Tomás F. Pena, Mamoun Alazab. 223-225 [doi]
- Verifying OAuth Implementations Through Encrypted Network AnalysisJosh Talkington, Ram Dantu, Kirill Morozov. 227-229 [doi]
- Poster: Unified Access Control for Surgical RoboticsRyan Shah, Shishir Nagaraja. 231-233 [doi]