About
Advance Program
Invited Speakers
Call for Papers
Important Dates
Accepted Papers
Program Committee
Officers
Conference Venue
Registration
Hotel Information
Travel Information
Since 1995

 

Maintained and
Sponsored by

 

The following is a tentative schedule for ACM SACMAT 2022.

All of the following times are in Eastern Daylight Time (EDT)/UTC-4.



The full proceedings of ACM SACMAT 2022 can be found in the following ACM Digital Library URL: ACM SACMAT 2022 proceedings

 

Day 1 (June 8, 2022)

Introductory Remarks

EDT/UTC-4 9:00-9:10

Best Paper and Best Student Paper Awards

EDT/UTC-4 9:10-9:20

Test-of-Time Award Presentation and Talk

EDT/UTC-4 9:20-9:40

Session 1 (Policies and their Efficient Enforcement)
Session Chair: Scott Stoller

Generalized Noise Role Mining (Full paper)

EDT/UTC-4/UTC-4 9:40-10:00

Towards a Theory on Testing XACML Policies (Full paper)

EDT/UTC-4 10:00-10:20

The Secrecy Resilience of Access Control Policies and Its Application to Role Mining (Full paper)

EDT/UTC-4 10:20-10:40

Effective Evaluation of Relationship-Based Access Control Policy Mining (Full paper)

EDT/UTC-4 10:40-11:00

Virtual Coffee Break

EDT/UTC-4 11:00-11:15

Session 2 (Keynote 1)
Session Chair: Elena Ferrari

Securing Content in Decentralized Online Social Networks: Solutions, Limitations, and the Road Ahead
Speaker: Roberto Di Pietro (Hamad Bin Khalifa University, Qatar)

EDT/UTC-4 11:15-12:15

Virtual Coffee Break

EDT/UTC-4 12:15-12:30

Session 3 (Panel)
Session Chair: Omar Haider Chowdhury

Enforcing Security and Privacy Policies in Emerging Systems and Networks

Panel members: Adam Bates, Jean Camp, Berkay Celik, Mihai Christodorescu, Ian Molloy, Moti Yung

EDT/UTC-4 12:30-13:45

 

 

Day 2 (June 9, 2022)

Session 4 (Protocols and Defenses for Emerging and Traditional Networks)
Session Chair: Dianxiang Xu

LARP: A Lightweight Auto-Refreshing Pseudonym Protocol for V2X (Full paper)

EDT/UTC-4

9:00-9:20

A Game-Theoretically Optimal Defense Paradigm against Traffic Analysis Attacks using Multipath Routing and Deception (Full paper)

EDT/UTC-4

9:20-9:40

Harpocrates: Anonymous Data Publication in Named Data Networking (Full paper)

EDT/UTC-4

9:40-10:00

Verifiable, Secure and Energy-Efficient Private Data Aggregation in Wireless Sensor Networks (Work-in-progress)

EDT/UTC-4

10:00-10:15

Virtual Coffee Break

EDT/UTC-4

10:15-10:30

Session 5 (Keynote 2)
Session Chair:  Hongxin Hu

Federated Learning: The Hype, State-of-the-Art and Open Challenges
Speaker: Dr. Nathalie Baracaldo (IBM Research)

EDT/UTC-4

10:30-11:30

Virtual Coffee Break

EDT/UTC-4

11:30-11:45

Session 6 (Policy Mining and Testing)
Session Chair: 
Spyridon Mastorakis

Metamodel for Continuous Authorisation and Usage Control (Work-in-progress)

EDT/UTC-4

11:45-12:00

A Study of Application Sandbox Policies in Linux (Full paper)

EDT/UTC-4

12:00-12:20

Contemporaneous Update and Enforcement of ABAC Policies (Full paper)

EDT/UTC-4

12:20-12:40

Modular Composition of Access Control Policies: A Framework to Build Multi-Site Multi-Level Combinations (Full paper)

EDT/UTC-4

12:40-13:00

Session 7 (Posters and Demo)
Session Chair: Haadi Jafarian

 

Blockchain-Envisioned Secure Generic Communication Framework using Signcryption (Poster)

EDT/UTC-4

13:00-13:10

Toward Dynamic, Session-Preserving, Transition from Low to High Interaction Honeypots (Poster)

EDT/UTC-4

13:10-13:20

ASQL - Attribute Based Access Control Extension for SQL (Poster)

EDT/UTC-4

13:20-13:30

A Flexible Relationship-Based Access Control Policy Generator (Poster)

EDT/UTC-4

13:30-13:40

Toward Zero-Trust Path-Aware Access Control (Poster)

EDT/UTC-4

13:40-13:50

TLSAssistant v2: A Modular and Extensible Framework for Securing TLS (Demo)

EDT/UTC-4

13:50-14:00

 

 

 

Day 3 (June 10, 2022)

Session 8 (Enhancing System Resiliency with Defense in Depth)
Session Chair: Susmit Shannigrahi

"Why Would Someone Hack Me out of Thousands of Students": Video Presenter's Impact on Motivating Users to Adopt 2FA (Full paper)

EDT/UTC-4

9:00-9:20

Removing the Reliance on Perimeters for Security using Network Views (Full paper)

EDT/UTC-4

9:20-9:40

Physical Access Control: Characteristics, Challenges, and Research Opportunities (BlueSky)

EDT/UTC-4

9:40-10:00

FairRoad: Achieving Fairness for Recommender Systems with Optimized Antidote Data (Full paper)

EDT/UTC-4

10:00-10:20

Virtual Coffee Break

EDT/UTC-4

10:20-10:30

Session 9 (Keynote 3)
Session Chair: Amjad Ibrahim

Network (In)security: Leniency in Protocols' Design, Code and Configuration
Speaker: Dr. Endadul Hoque (Syracuse University)

EDT/UTC-4

10:30-11:30

Virtual Coffee Break

EDT/UTC-4

11:30-11:40

Session 10 (Applications of Access Control)
Session Chair: Shweta Khare

Combining Task Planning and Activity-Centric Access Control for Assistive Humanoid Robots (BlueSky)

EDT/UTC-4

11:40-12:00

A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences (Full paper)

EDT/UTC-4

12:00-12:20

Activity Control: A Vision for "Active" Security Models for Smart Collaborative Systems (BlueSky)

EDT/UTC-4

12:20-12:40

AABAC - Automated Attribute Based Access Control for Genomics Data (Work-in-progress)

EDT/UTC-4

12:40-12:55

Virtual Coffee Break

EDT/UTC-4 12:55-13:05

Session 11 (Defending IoT Systems and Networks)
Session Chair: Weili Han

 

The Intrinsic Dimensionality of IoT Networks (Work-in-progress)

EDT/UTC-4

13:05-13:20

Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications (Full paper)

EDT/UTC-4

13:20-13:40

Towards Convergence of Zero Trust Principles and Score-Based Authorization for IoT Enabled Smart Systems (BlueSky)

EDT/UTC-4

13:40-14:00

Closing Remarks

EDT/UTC-4

14:00 – 14:15

 

 

 

Copyright (c) ACM SACMAT All rights reserved.