![]() |
|||||||||||
| SACMAT'17 Table of Contents General
Chair and PC Chairs' Welcome SACMAT 2017 Symposium Organization SACMAT 2017 Sponsor & Supporters
Keynote Address I Distributed
Intelligence - Trends in the Management of Complex Systems (Page
1) |
|||||||||||
| (Return to Top) |
Session: Authorization and Authentication A
Flexible Authorization Architecture for Systems of Interoperable Medical
Devices (Page 9) Uncoupling
Biometrics from Templates for Secure and Privacy-Preserving Authentication (Page
21) On
Risk in Access Control Enforcement (Page
31) |
||||||||||
| (Return to Top) |
Session: Applications FACT:
Functionality-centric Access Control System for IoT Programming Frameworks (Page
43) An
Enforcement Model for Preventing Inference Attacks in Social Computing
Platforms (Page
55) Secure
Pick Up: Implicit Authentication When You Start Using the Smartphone (Page
67) |
||||||||||
| (Return to Top) |
Session: Policy Models and Frameworks Attribute
Expressions, Policy Tables and Attribute-Based Access Control (Page
79) A
Datalog Framework for Modeling Relationship-based Access Control Policies (Page
91) Towards
a Top-down Policy Engineering Framework for Attribute-based Access Control (Page
103) |
||||||||||
| (Return to Top) |
Posters Poster:
A Location-Privacy Approach for Continuous Queries (Page
115) Poster:
Design of an Anomaly-based Threat Detection & Explication System (Page
119) Poster:
Constrained Policy Mining in Attribute Based Access Control (Page
121) POSTER:
Access Control Model for the Hadoop Ecosystem (Page
125) Poster:
On the Safety and Efficiency of Virtual Firewall Elasticity Control (Page
129) |
||||||||||
| (Return to Top) |
Keynote Address II Leveraging
Hardware Isolation for Process Level Access Control & Authentication (Page
133) |
||||||||||
| (Return to Top) |
Session: Formal Techniques I A
Framework for the Cryptographic Enforcement of Information Flow Policies (Page
143) Towards
PII-based Multiparty Access Control for Photo Sharing in Online Social
Networks (Page
155) Verifiable
Assume-Guarantee Privacy Specifications for Actor Component Architectures (Page
167) |
||||||||||
| (Return to Top) |
Demonstrations Authorization
Enforcement Detection (Page
179) Multi-Layer
Authorization Framework for a Representative Hadoop Ecosystem Deployment (Page
183) Provable
Enforcement of HIPAA-Compliant Release of Medical Records Using the
History Aware Programming Language (Page
191) NTApps:
A Network Traffic Analyzer of Android Applications (Page
199) |
||||||||||
| (Return to Top) |
Session: Formal Techniques II On
the Satisfiability of Workflows with Release Points (Page
207) A
Secure Sum Protocol and Its Application to Privacy-preserving Multi-party
Analytics (Page
219) |
||||||||||
| (Return to Top) |
Short Papers Enabling
Data Sharing in Contextual Environments: Policy Representation and Analysis (Page
231) Mining
Relationship-Based Access Control Policies (Page
239) Security
Analysis and Legal Compliance Checking for the Design of Privacy-friendly
Information Systems (Page
247) A
Distributed Multi-Authority Attribute Based Encryption Scheme for Secure
Sharing of Personal Health Records (Page
255) |
||||||||||