Abstract is missing.
- A Bargaining-Game Framework for Multi-Party Access ControlGelareh Hasel Mehri, Benjamin Monmege, Clara Bertolissi, Nicola Zannone. [doi]
- Making Privacy-preserving Federated Graph Analytics Practical (for Certain Queries)Kunlong Liu, Trinabh Gupta. [doi]
- Cryptographic Enforcement of Access Control Policies: Models, Applications, and Future DirectionsBarbara Masucci. [doi]
- FE[r]Chain: Enforcing Fairness in Blockchain Data Exchanges Through Verifiable Functional EncryptionCamille Nuoskala, Reyhaneh Rabbaninejad, Tassos Dimitriou, Antonis Michalas. [doi]
- Prompting LLM to Enforce and Validate CIS Critical Security ControlMohiuddin Ahmed, Jinpeng Wei, Ehab Al-Shaer. [doi]
- Utilizing Threat Partitioning for More Practical Network Anomaly DetectionBrian Ricks, Patrick Tague, Bhavani Thuraisingham, Sriraam Natarajan. [doi]
- Static and Dynamic Analysis of a Usage Control SystemUlrich Schöpp, Fathiyeh Faghih, Subhajit Bandopadhyay, Hussein Joumaa, Amjad Ibrahim, Chuangjie Xu, Xin Ye, Theo Dimitrakos. [doi]
- Defending Multi-Cloud Applications Against Man-in-the-Middle AttacksMorgan Reece, Nidhi Rastogi, Theodore Lander, Josiah Dykstra, Sudip Mittal, Andy Sampson. [doi]
- SecureCheck: User-Centric and Geolocation-Aware Access Mediation Contracts for Sharing Private DataJacob Hopkins, Carlos E. Rubio-Medrano. [doi]
- AI/ML, Graphs and Access Control: Towards Holistic Identity and Access ManagementAshish Kundu. [doi]
- ToneCheck: Unveiling the Impact of Dialects in Privacy PolicyJay Barot, Ali Allami, Ming Yin, Dan Lin. [doi]
- BlueSky: How to Raise a Robot - A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive RobotsNiklas Hemken, Florian Jacob, Fabian Tërnava, Rainer Kartmann, Tamim Asfour, Hannes Hartenstein. [doi]
- A Self-Sovereign Identity Approach to Decentralized Access Control with Transitive DelegationsPieter-Jan Vrielynck, Tim Van hamme, Rawad Ghostin, Bert Lagaisse, Davy Preuveneers, Wouter Joosen. [doi]
- Obligation Management Framework for Usage ControlHussein Joumaa, Ali Hariri, Ana Petrovska, Oleksii Osliak, Theo Dimitrakos, Bruno Crispo. [doi]
- Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split LearningTanveer Khan, Mindaugas Budzys, Antonis Michalas. [doi]
- WiP: Enhancing the Comprehension of XACML PoliciesGelareh Hasel Mehri, Tien-Dung Le, Bram C. M. Cappers, Jerry den Hartog, Nicola Zannone. [doi]
- Hierarchical Key Assignment Schemes with Key RotationRoberta Cimorelli Belfiore, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. [doi]
- Trustworthy Artificial Intelligence for Securing Transportation SystemsBhavani Thuraisingham. [doi]
- Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny RulesJosué A. Ruiz, Paliath Narendran, Amir Masoumzadeh 0001, Padmavathi Iyer. [doi]
- Circles of Trust: A Voice-Based Authorization Scheme for Securing IoT Smart HomesJennifer Mondragon, Gael Cruz, Dvijesh Shastri, Carlos E. Rubio-Medrano. [doi]
- SPRT: Automatically Adjusting SELinux Policy for Vulnerability MitigationHanyu Wang, Aimin Yu, Lifang Xiao, Jin Li, Xu Cao. [doi]
- Pairing Human and Artificial Intelligence: Enforcing Access Control Policies with LLMs and Formal SpecificationsCarlos E. Rubio-Medrano, Akash Kotak, Wenlu Wang, Karsten Sohr. [doi]