Abstract is missing.
- Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road AheadRoberto Di Pietro. 1-2 [doi]
- Keynote Talk - Federated Learning: The Hype, State-of-the-Art and Open ChallengesNathalie Baracaldo. 3-4 [doi]
- Network (In)security: Leniency in Protocols' Design, Code and ConfigurationEndadul Hoque. 5-6 [doi]
- Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level CombinationsClara Bertolissi, Maribel Fernández. 7-18 [doi]
- A Study of Application Sandbox Policies in LinuxTrevor Dunlap, William Enck, Bradley Reaves. 19-30 [doi]
- Contemporaneous Update and Enforcement of ABAC PoliciesSamir Talegaon, Gunjan Batra, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya. 31-42 [doi]
- WiP: Metamodel for Continuous Authorisation and Usage ControlAli Hariri, Amjad Ibrahim, Theo Dimitrakos, Bruno Crispo. 43-48 [doi]
- LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2XZheng Yang 0001, Tien Tuan Anh Dinh, Chao Yin, Yingying Yao, Dianshi Yang, Xiaolin Chang, Jianying Zhou 0001. 49-60 [doi]
- WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor NetworksGeorgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa, Giuseppe Durisi. 61-66 [doi]
- A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and DeceptionMasoumeh Abolfathi, Ilan Shomorony, Alireza Vahid, Jafar Haadi Jafarian. 67-78 [doi]
- Harpocrates: Anonymous Data Publication in Named Data NetworkingMd Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa, Spyridon Mastorakis. 79-90 [doi]
- Generalized Noise Role MiningJason Crampton, Eduard Eiben, Gregory Z. Gutin, Daniel Karapetyan, Diptapriyo Majumdar. 91-102 [doi]
- Towards a Theory on Testing XACML PoliciesDianxiang Xu, Roshan Shrestha, Ning Shen, Yunpeng Zhang. 103-114 [doi]
- The Secrecy Resilience of Access Control Policies and Its Application to Role MiningQiang Guo, Mahesh Tripunitara. 115-126 [doi]
- Effective Evaluation of Relationship-Based Access Control Policy MiningPadmavathi Iyer, Amirreza Masoumzadeh. 127-138 [doi]
- "Why would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FAElham Al Qahtani, Lipsarani Sahoo, Yousra Javed, Mohamed Shehab. 139-150 [doi]
- Removing the Reliance on Perimeters for Security using Network ViewsIffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru, Bradley Reaves. 151-162 [doi]
- BlueSky: Physical Access Control: Characteristics, Challenges, and Research OpportunitiesAmirreza Masoumzadeh, Hans van der Laan, Albert Dercksen. 163-172 [doi]
- FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote DataMinghong Fang, Jia Liu 0002, Michinari Momma, Yi Sun. 173-184 [doi]
- BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid RobotsSaskia Bayreuther, Florian Jacob, Markus Grotz, Rainer Kartmann, Fabian Peller-Konrad, Fabian Paus, Hannes Hartenstein, Tamim Asfour. 185-194 [doi]
- A Capability-based Distributed Authorization System to Enforce Context-aware Permission SequencesAdrian Shuai Li, Reihaneh Safavi-Naini, Philip W. L. Fong. 195-206 [doi]
- BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative SystemsTanjila Mawla, Maanak Gupta, Ravi S. Sandhu. 207-216 [doi]
- WiP: AABAC - Automated Attribute Based Access Control for Genomics DataDavid Reddick, Justin Presley, Frank Alex Feltus, Susmit Shannigrahi. 217-222 [doi]
- Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT ApplicationsChahal Arora, Syed Zain R. Rizvi, Philip W. L. Fong. 223-234 [doi]
- BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart SystemsSafwa Ameer, Maanak Gupta, Smriti Bhatt, Ravi S. Sandhu. 235-244 [doi]
- WiP: The Intrinsic Dimensionality of IoT NetworksMatt Gorbett, Hossein Shirazi, Indrakshi Ray. 245-250 [doi]
- Poster: Blockchain-Envisioned Secure Generic Communication Framework using SigncryptionLiang Zhang, Haibin Kan, Yuan Li 0001, Jinrong Huang. 251-253 [doi]
- Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction HoneypotsJaime C. Acosta. 255-257 [doi]
- Poster: ASQL - Attribute Based Access Control Extension for SQLProteet Paul, Tushar Gupta, Shamik Sural. 259-261 [doi]
- Poster: A Flexible Relationship-Based Access Control Policy GeneratorStanley Clark, Nikolay Yakovets, George H. L. Fletcher, Nicola Zannone. 263-265 [doi]
- Poster: Toward Zero-Trust Path-Aware Access ControlJoshua H. Seaton, Sena Hounsinou, Timothy Wood 0001, Shouhuai Xu, Philip N. Brown, Gedare Bloom. 267-269 [doi]
- Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLSMatteo Rizzi, Salvatore Manfredi, Giada Sciarretta, Silvio Ranise. 271-272 [doi]