Main Page

ASIACCS 2017

ASIACCS 2017 Workshops

CCS 2016

CCS 2016
Workshops

CODASPY 2017

CODASPY 2017 Workshops

SACMAT 2017

WiSec 2016

Compilation Author Index

ACM SIGSAC Membership Application

SACMAT'17 Table of Contents

General Chair and PC Chairs' Welcome
Elisa Bertino (Purdue University)

Ravi Sandhu (University of Texas at San Antonio)

Edgar Weippl (SBA Research)

SACMAT 2017 Symposium Organization

SACMAT 2017 Sponsor & Supporters

Keynote Address I

Keynote Address II

Session: Authorization and Authentication

Session: Formal Techniques I

Session: Applications

Demonstrations

Session: Policy Models and Frameworks

Session: Formal Techniques II

Posters

Short Papers

Keynote Address I
Session Chair: Ravi Sandhu (University of Texas at San Antonio)

Distributed Intelligence - Trends in the Management of Complex Systems (Page 1)
Seraphin B. Calo (IBM Research)

Dinesh C. Verma (IBM Research)

Elisa Bertino (Purdue University)

(Return to Top)

Session: Authorization and Authentication
Session Chair: Elena Ferrari (University of Insubria)

A Flexible Authorization Architecture for Systems of Interoperable Medical Devices (Page 9)
Qais Tasali (Kansas State University)

Chandan Chowdhury (Kansas State University)

Eugene Y. Vasserman (Kansas State University)

Uncoupling Biometrics from Templates for Secure and Privacy-Preserving Authentication (Page 21)
Aysajan Abidin (imec-COSIC KU Leuven)

Enrique Argones Rúa (imec-COSIC KU Leuven)

Roel Peeters (imec-COSIC KU Leuven)

On Risk in Access Control Enforcement (Page 31)
Giuseppe Petracca (Pennsylvania State University)

Frank Capobianco (Pennsylvania State University)

Christian Skalka (University of Vermont)

Trent Jaeger (Pennsylvania State University)

(Return to Top)

Session: Applications
Session Chair: Axel Kern (Beta Systems Software AG)

FACT: Functionality-centric Access Control System for IoT Programming Frameworks (Page 43)
Sanghak Lee (Pohang University of Science and Technology)

Jiwon Choi (Pohang University of Science and Technology)

Jihun Kim (Pohang University of Science and Technology)

Beumjin Cho (Pohang University of Science and Technology)

Sangho Lee (Georgia Institute of Technology)

Hanjun Kim (Pohang University of Science and Technology)

Jong Kim (Pohang University of Science and Technology)

An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms (Page 55)
Seyed Hossein Ahmadinejad (Nulli)

Philip W. L. Fong (University of Calgary)

Secure Pick Up: Implicit Authentication When You Start Using the Smartphone (Page 67)
Wei-Han Lee (Princeton University)

Xiaochen Liu (University of Southern California)

Yilin Shen (Samsung Research America)

Hongxia Jin (Samsung Research America)

Ruby B. Lee (Princeton University)

(Return to Top)

Session: Policy Models and Frameworks
Session Chair: Hongxin Hu (Clemson University)

Attribute Expressions, Policy Tables and Attribute-Based Access Control (Page 79)
Jason Crampton (Royal Holloway, University of London)

Conrad Williams (Royal Holloway, University of London)

A Datalog Framework for Modeling Relationship-based Access Control Policies (Page 91)
Edelmira Pasarella (Universitat Politècnica de Catalunya)

Jorge Lobo (Institució Catalana de Recerca i Estudis Avançats -Universitat Pompeu Fabra)

Towards a Top-down Policy Engineering Framework for Attribute-based Access Control (Page 103)
Masoud Narouei (University of North Texas)

Hamed Khanpour (University of North Texas)

Hassan Takabi (University of North Texas)

Natalie Parde (University of North Texas)

Rodney Nielsen (University of North Texas)

(Return to Top)

Posters
Session Chairs: Dan Lin (Missouri University of Science and Technology) and
Robert Koch (Universität der Bundeswehr München)

Poster: A Location-Privacy Approach for Continuous Queries (Page 115)
Douglas Steiert (Missouri University of Science and Technology)

Dan Lin (Missouri University of Science and Technology)

Quincy Conduff (Missouri University of Science and Technology)

Wei Jiang (Missouri University of Science and Technology)

Poster: Design of an Anomaly-based Threat Detection & Explication System (Page 119)
Robert Luh (Josef Ressel Center TARGET & De Montfort University, Leicester)

Sebastian Schrittwieser (Josef Ressel Center TARGET)

Stefan Marschalek (Josef Ressel Center TARGET)

Helge Janicke (De Montfort University, Leicester)

Edgar Weippl (SBA Research)

Poster: Constrained Policy Mining in Attribute Based Access Control (Page 121)
Mayank Gautam (IIT Kharagpur)

Sadhana Jha (IIT Kharagpur)

Shamik Sural (IIT Kharagpur)

Jaideep Vaidya (Rutgers University)

Vijayalakshmi Atluri (Rutgers University)

POSTER: Access Control Model for the Hadoop Ecosystem (Page 125)
Maanak Gupta (University of Texas at San Antonio)

Farhan Patwa (University of Texas at San Antonio)

Ravi Sandhu (University of Texas at San Antonio)

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control (Page 129)
Hongda Li (Clemson University)

Juan Deng (Clemson University)

Hongxin Hu (Clemson University)

Kuang-Ching Wang (Clemson University)

Gail-Joon Ahn (Arizona State University)

Ziming Zhao (Arizona State University)

Wonkyu Han (Arizona State University)

(Return to Top)

Keynote Address II
Session Chair: Edgar Weippl (SBA Research)

Leveraging Hardware Isolation for Process Level Access Control & Authentication (Page 133)
Syed Kamran Haider (University of Connecticut)

Hamza Omar (University of Connecticut)

Ilia Lebedev (Massachusetts Institute of Technology)

Srinivas Devadas (Massachusetts Institute of Technology)

Marten van Dijk (University of Connecticut)

(Return to Top)

Session: Formal Techniques I
Session Chair: Edgar Weippl (SBA Research)

A Framework for the Cryptographic Enforcement of Information Flow Policies (Page 143)
James Alderman (Royal Holloway, University of London)

Jason Crampton (Royal Holloway, University of London)

Naomi Farley (Royal Holloway, University of London)

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks (Page 155)
Nishant Vishwamitra (Clemson University)

Yifang Li (Clemson University)

Kevin Wang (Clemson University)

Hongxin Hu (Clemson University)

Kelly Caine (Clemson University)

Gail-Joon Ahn (Arizona State University)

Verifiable Assume-Guarantee Privacy Specifications for Actor Component Architectures (Page 167)
Claiborne Johnson (University of Texas at San Antonio)

Thomas MacGahan (Accenture Federal Services)

John Heaps (University of Texas at San Antonio)

Kevin Baldor (University of Texas at San Antonio)

Jeffery von Ronne (University of Texas at San Antonio & Google, Inc.)

Jianwei Niu (University of Texas at San Antonio)

(Return to Top)

Demonstrations
Session Chair: Jianwei Niu (University of Texas at San Antonio)

Authorization Enforcement Detection (Page 179)
Ehood Porat (Jerusalem College of Technology)

Shmuel Tikochinski (Jerusalem College of Technology)

Ariel Stulman (Jerusalem College of Technology)

Multi-Layer Authorization Framework for a Representative Hadoop Ecosystem Deployment (Page 183)
Maanak Gupta (University of Texas at San Antonio)

Farhan Patwa (University of Texas at San Antonio)

James Benson (University of Texas at San Antonio)

Ravi Sandhu (University of Texas at San Antonio)

Provable Enforcement of HIPAA-Compliant Release of Medical Records Using the History Aware Programming Language (Page 191)
Thomas MacGahan (Accenture Federal Services)

Claiborne Johnson (University of Texas at San Antonio)

Armando Rodriguez (University of Texas at San Antonio)

Jeffery von Ronne (University of Texas at San Antonio & Google, Inc.)

Jianwei Niu (University of Texas at San Antonio)

NTApps: A Network Traffic Analyzer of Android Applications (Page 199)
Rodney Rodriguez (University of Texas at San Antonio)

Shaikh Mostafa (University of Texas at San Antonio)

Xiaoyin Wang (University of Texas at San Antonio)

(Return to Top)

Session: Formal Techniques II
Session Chair: Xukai Zou (Indiana University-Purdue University Indiana)

On the Satisfiability of Workflows with Release Points (Page 207)
Jason Crampton (Royal Holloway, University of London)

Gregory Gutin (Royal Holloway, University of London)

Rémi Watrigant (Inria Sophia Antipolis)

A Secure Sum Protocol and Its Application to Privacy-preserving Multi-party Analytics (Page 219)
Shagufta Mehnaz (Purdue University)

Gowtham Bellala (C3 IoT & Hewlett Packard Labs)

Elisa Bertino (Purdue University)

(Return to Top)

Short Papers
Session Chair: Elisa Bertino (Purdue University)

Enabling Data Sharing in Contextual Environments: Policy Representation and Analysis (Page 231)
Erisa Karafili (Imperial College London)

Emil C. Lupu (Imperial College London)

Mining Relationship-Based Access Control Policies (Page 239)
Thang Bui (Stony Brook University)

Scott D. Stoller (Stony Brook University)

Jiajie Li (Stony Brook University)

Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems (Page 247)
Paolo Guarda (University of Trento)

Silvio Ranise (FBK-Irst)

Hari Siswantoro (FBK-Irst & University of Trento)

A Distributed Multi-Authority Attribute Based Encryption Scheme for Secure Sharing of Personal Health Records (Page 255)
Harsha S. Gardiyawasam Pussewalage (University of Agder)

Vladimir A. Oleshchuk (University of Agder)