Abstract is missing.
- Metering Graphical Data Leakage with SnowmanQiuyu Xiao, Brittany Subialdea, Lujo Bauer, Michael K. Reiter. 1-12 [doi]
- Visualizing and Interpreting RNN Models in URL-based Phishing DetectionTao Feng, Chuan Yue. 13-24 [doi]
- Parallel Space Traveling: A Security Analysis of App-Level Virtualization in AndroidDeshun Dai, Ruixuan Li, Junwei Tang, Ali Davanian, Heng Yin. 25-32 [doi]
- Cryptography for #MeTooTal Rabin. 33 [doi]
- Norm-based Access ControlOnuralp Ulusoy, Pinar Yolum. 35-46 [doi]
- Security and Privacy Analysis of Android Family Locator AppsKhalid Alkhattabi, Ahmed Alshehri, Chuan Yue. 47-58 [doi]
- Declarative Access Control for Aggregations of Multiple Ownership DataMarco Rosa, Francesco Di Cerbo, Rocío Cabrera Lozoya. 59-70 [doi]
- Accept - Maybe - Decline: Introducing Partial Consent for the Permission-based Access Control Model of AndroidNurul Momen, Sven Bock, Lothar Fritsch. 71-80 [doi]
- Matrix Decomposition: Analysis of an Access Control Approach on Transaction-based DAGs without FinalityFlorian Jacob, Luca Becker, Jan Grashöfer, Hannes Hartenstein. 81-92 [doi]
- Constraint Branching in Workflow Satisfiability ProblemGregory Z. Gutin, Daniel Karapetyan. 93-103 [doi]
- Automated Strong Mutation Testing of XACML PoliciesDianxiang Xu, Roshan Shrestha, Ning Shen. 105-116 [doi]
- Analysis of Access Control Enforcement in AndroidWilliam Enck. 117-118 [doi]
- Informed Privilege-Complexity Trade-Offs in RBAC ConfigurationJon Currey, Robbie McKinstry, Armon Dadgar, Mark Gritter. 119-130 [doi]
- Proactive Risk Assessment for Preventing Attribute-Forgery Attacks to ABAC PoliciesCarlos E. Rubio-Medrano, Luis Claramunt, Shaishavkumar Jogani, Gail-Joon Ahn. 131-144 [doi]
- Benchmarking UAQ SolversAlessandro Armando, Giorgia Gazzarata, Fatih Turkmen. 145-152 [doi]
- AQUA: An Efficient Solver for the User Authorization Query ProblemAlessandro Armando, Giorgia A. Gazzarata, Fatih Turkmen. 153-154 [doi]
- Active Learning of Relationship-Based Access Control PoliciesPadmavathi Iyer, Amirreza Masoumzadeh. 155-166 [doi]
- A Decision Tree Learning Approach for Mining Relationship-Based Access Control PoliciesThang Bui, Scott D. Stoller. 167-178 [doi]
- On Security Policy MigrationsJorge Lobo 0001, Elisa Bertino, Alessandra Russo. 179-188 [doi]
- Multi-party Access Control - 10 Years of Successes and Lessons LearnedAnna Cinzia Squicciarini. 189-190 [doi]
- A Data Access Model for Privacy-Preserving Cloud-IoT ArchitecturesMaribel Fernández, Alex Franch Tapia, Jenjira Jaimunk, Manuel Martinez Chamorro, Bhavani M. Thuraisingham. 191-202 [doi]
- ABAC-CC: Attribute-Based Access Control and Communication Control for Internet of ThingsSmriti Bhatt, Ravi Sandhu. 203-212 [doi]
- Deploying Access Control Enforcement for IoT in the Cloud-Edge Continuum with the help of the CAP TheoremTahir Ahmad, Umberto Morelli, Silvio Ranise. 213-220 [doi]
- Mammoth: Monitoring the ABAC Monitor of MQTT-based Internet of Things ecosystemsPietro Colombo, Elena Ferrari, Samuele Salvia. 221-222 [doi]
- Poster: IoT SENTINEL - An ABAC Approach Against Cyber-Warfare In OrganizationsParas Bhatt, Smriti Bhatt, Myung Ko. 223-225 [doi]