Abstract is missing.
- Machine Learning Integrity and Privacy in Adversarial EnvironmentsAlina Oprea. 1-2 [doi]
- RMPlib: A Library of Benchmarks for the Role Mining ProblemSimon Anderer, Bernd Scheuermann, Sanaz Mostaghim, Patrick Bauerle, Matthias Beil. 3-13 [doi]
- Backdoor Attacks to Graph Neural NetworksZaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong. 15-26 [doi]
- Analyzing the Usefulness of the DARPA OpTC Dataset in Cyber Threat Detection ResearchMd. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin. 27-32 [doi]
- Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control ModelsAmirreza Masoumzadeh, Paliath Narendran, Padmavathi Iyer. 33-43 [doi]
- Towards Unifying RBAC with Information Flow ControlB. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar. 45-54 [doi]
- Poster: Towards Cloud-Based Software for Incorporating Time and Location into Access Control DecisionsMustafa Al-Lail. 55-57 [doi]
- In-Memory Policy Indexing for Policy Retrieval Points in Attribute-Based Access ControlDominic Heutelbeck, Marc Lucas Baur, Martin Kluba. 59-70 [doi]
- Mutation Analysis of NGAC PoliciesErzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu. 71-82 [doi]
- Valued Authorization Policy Existence ProblemJason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar. 83-94 [doi]
- Demo: Attribute-Stream-Based Access Control (ASBAC) with the Streaming Attribute Policy Language (SAPL)Dominic Heutelbeck. 95-97 [doi]
- Poster: Shielding AppSPEAR - Enhancing Memory Safety for Trusted Application-level Security Policy EnforcementMarius Schlegel. 99-101 [doi]
- ReTRACe: Revocable and Traceable Blockchain Rewrites using Attribute-based CryptosystemsGaurav Panwar, Roopa Vishwanathan, Satyajayant Misra. 103-114 [doi]
- Secure Aggregation Against Malicious UsersFerhat Karakoç, Melek Önen, Zeki Bilgin. 115-124 [doi]
- Towards Correct Smart Contracts: A Case Study on Formal Verification of Access ControlJonas Schiffl, Matthias Grundmann, Marc Leinweber, Oliver Stengele, Sebastian Friebe, Bernhard Beckert. 125-130 [doi]
- Regulating Storage Overhead in Existing PoW-based BlockchainsFrederik Armknecht, Jens-Matthias Bohli, Ghassan O. Karame, Wenting Li. 131-142 [doi]
- Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog ComputingShengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng. 143-154 [doi]
- Towards Activity-Centric Access Control for Smart Collaborative EcosystemsMaanak Gupta, Ravi S. Sandhu. 155-164 [doi]
- Can I Reach You? Do I Need To? New Semantics in Security Policy Specification and TestingCharalampos Katsis, Fabrizio Cicala, Dan Thomsen, Nathan Ringo, Elisa Bertino. 165-174 [doi]
- SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless ComputingIsaac Polinsky, Pubali Datta, Adam Bates 0001, William Enck. 175-186 [doi]