About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

ACM SACMAT 2022 Accepted Papers

Accepted Research Papers

Zheng Yang, Anh Dinh, Yingying Yao, Dianshi Yang, Xiaolin Chang and Jianying Zhou . LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X
Md Washik Al Azad, Reza Tourani, Abderrahmen Mtibaa and Spyridon Mastorakis . Harpocrates: Anonymous Data Publication in Named Data Networking
Trevor Dunlap, William Enck and Bradley Reaves . A Study of Application Sandbox Policies in Linux
Elham Al Qahtani, Lipsa Sahoo, Yousra Javed and Mohamed Shehab . "Why Would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA
Adrian Shuai Li, Reihaneh Safavi-Naini and Philip W. L. Fong . A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences
Chahal Arora, Syed Zain Raza Rizvi and Philip W.L. Fong . Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications
Jason Crampton, Eduard Eiben, Gregory Gutin, Daniel Karapetyan and Diptapriyo Majumdar . Generalized Noise Role Mining
Dianxiang Xu, Roshan Shrestha, Ning Shen and Yunpeng Zhang . Towards a Theory on Testing XACML Policies
Iffat Anjum, Daniel Kostecki, Ethan Leba, Jessica Sokal, Rajit Bharambe, William Enck, Cristina Nita-Rotaru and Bradley Reaves . Removing the Reliance on Perimeters for Security using Network Views
Masoumeh Abolfathi, Ilan Shomorony, Alireza Vahid and Jafar Haadi Jafarian . A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception
Clara Bertolissi and Maribel Fernandez . Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations
Minghong Fang, Jia Liu, Michinari Momma and Yi Sun . FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote Data
Qiang Guo and Mahesh Tripunitara . The Secrecy Resilience of Access Control Policies and Its Application to Role Mining
Samir Talegaon, Gunjan Batra, Vijay Atluri, Shamik Sural and Jaideep Vaidya . Contemporaneous Update and Enforcement of ABAC Policies
Padmavathi Iyer and Amirreza Masoumzadeh . Effective Evaluation of Relationship-Based Access Control Policy Mining

Accepted BlueSky/Vision Papers

Amirreza Masoumzadeh, Hans van der Laan and Albert Dercksen . BlueSky: Physical Access Control: Characteristics, Challenges, and Research Opportunities
Saskia Bayreuther, Florian Jacob, Markus Grotz, Rainer Kartmann, Fabian Peller-Konrad, Fabian Paus, Hannes Hartenstein and Tamim Asfour . BlueSky: Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots
Tanjila Mawla, Maanak Gupta and Ravi Sandhu . BlueSky: Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems
Safwa Ameer, Maanak Gupta, Smriti Bhatt and Ravi Sandhu . BlueSky: Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems

Accepted Work-in-Progress (WiP) Papers

Georgia Tsaloli, Alejandro Lancho, Katerina Mitrokotsa and Giuseppe Durisi . WiP: Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks
Ali Hariri, Amjad Ibrahim, Theo Dimitrakos and Bruno Crispo . WiP: Metamodel for Continuous Authorisation and Usage Control
Matt Gorbett, Hossein Shirazi and Indrakshi Ray . WiP: The Intrinsic Dimensionality of IoT Networks
David Reddick, Justin Presley, Alex Feltus and Susmit Shannigrahi . WiP: AABAC - Automated Attribute Based Access Control for Genomics Data

Accepted Posters

Liang Zhang, Haibin Kan, Yuan Li and Jinrong Huang . Poster: Blockchain-Envisioned Secure Generic Communication Framework using Signcryption
Jaime Acosta. Poster: Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots
Proteet Paul, Tushar Gupta and Shamik Sural . Poster: ASQL - Attribute Based Access Control Extension for SQL
Stanley Clark, Nikolay Yakovets, George H. L. Fletcher and Nicola Zannone . Poster: A Flexible Relationship-Based Access Control Policy Generator
Joshua Seaton, Sena Hounsinou, Timothy Wood, Shouhuai Xu, Philip Brown and Gedare Bloom . Poster: Toward Zero-Trust Path-Aware Access Control

Accepted Demonstration

Matteo Rizzi, Salvatore Manfredi, Giada Sciarretta and Silvio Ranise . Demo: TLSAssistant v2: A Modular and Extensible Framework for Securing TLS

Copyright (c) ACM SACMAT All rights reserved.