the proceedings contain 24 papers. the topics discussed include: safety in discretionary accesscontrol for logic-based publish-subscribe systems;ensuring spatio-temporal accesscontrol for real-world applications;an ...
ISBN:
(纸本)9781605585376
the proceedings contain 24 papers. the topics discussed include: safety in discretionary accesscontrol for logic-based publish-subscribe systems;ensuring spatio-temporal accesscontrol for real-world applications;an efficient framework for user authorization queries in RBAC systems;towards formal security analysis of GTRBAC using timed automata;xDomain: cross-border proofs of access;dynamic mandatory accesscontrol for multiple stakeholders;an algebra for fine-grained integration of XacmL policies;usability meets accesscontrol: challenges and research opportunities;automating role-based provisioning by learning from examples;a formal framework to elicit roles with business meaning in RBAC systems;evaluating role mining algorithms;a decision support system for secure information sharing;foundations for group-centric secure information sharing models;patient-centric authorization framework for sharing electronic health records;and accesscontrol policy combining: theory meets practice.
Current networked control systems are facing more and more severe challenges of cyber threats, and various intrinsic network-related vulnerabilities may cause serious damage to industrial production. To strengthen the...
详细信息
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastruc...
详细信息
the proceedings contain 19 papers. the topics discussed include: integrity constraints in trust management;declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure;future direction of accesscontrolmodels, architectures, and technologies;supporting conditional delegation in secure workflow management systems;a fine-grained, controllable, user-to-user delegation method in RBAC;relevancy based accesscontrol of versioned XML documents;provable bounds for portable and flexible privacy-preserving access rights;verifiable composition of accesscontrol and application features;adaptive trust negotiation and accesscontrol;and role mining with ORCA.
the proceedings contain 24 papers. the topics discussed include: metering graphical data leakage with snowman;visualizing and interpreting RNN models in URL-based phishing detection;parallel space traveling: a securit...
ISBN:
(纸本)9781450375689
the proceedings contain 24 papers. the topics discussed include: metering graphical data leakage with snowman;visualizing and interpreting RNN models in URL-based phishing detection;parallel space traveling: a security analysis of app-level virtualization in android;norm-based accesscontrol;security and privacy analysis of android family locator apps;declarative accesscontrol for aggregations of multiple ownership data;accept - maybe - decline: introducing partial consent for the permission-based accesscontrol model of android;and matrix decomposition: analysis of an accesscontrol approach on transaction-based dags without finality.
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placem...
ISBN:
(纸本)9781450329392
the proceedings contain 22 papers. the topics discussed include: hardware-enhanced distributed access enforcement for role-based accesscontrol;an accesscontrol concept for novel automotive HMI systems;monitor placement for large-scale systems;anomaly detection and visualization in generative RBAC models;reduction of accesscontrol decisions;towards more usable information flow policies for contemporary operating systems;attribute based accesscontrol for APIs in spring security;comprehensive integrity protection for desktop Linux;game theoretic analysis of multiparty accesscontrol in online social networks;scalable and precise automated analysis of administrative temporal role-based accesscontrol;accesscontrolmodels for geo-social computing systems;limiting access to unintentionally leaked sensitive documents using malware signatures;and user-centric identity as a service-architecture for eIDs with selective attribute disclosure.
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for accesscontrol policies: applications to role mining over logs wi...
ISBN:
(纸本)9781450312950
the proceedings contain 27 papers. the topics discussed include: ensuring authorization privileges for cascading user obligations;generative models for accesscontrol policies: applications to role mining over logs with attribution;SCUTA: a server-side accesscontrol system for web applications;optimal workflow-aware authorizations;accesscontrol for RDF graphs using abstract models;a cloud-based RDF policy engine for assured information sharing;SecureBPMN: modeling and enforcing accesscontrol requirements in business processes;encryption-enforced accesscontrol for an RFID discovery service;automating architectural security analysis;a trust-and-risk aware RBAC framework: tackling insider threat;analyzing temporal role based accesscontrolmodels;a framework integrating attribute-based policies into role-based accesscontrol;and a framework for verification and optimal reconfiguration of event-driven role based accesscontrol policies.
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity an...
ISBN:
(纸本)9781450307215
the proceedings contain 22 papers. the topics discussed include: a decade of model-driven security;deriving role engineering artifacts from business processes and scenario models;an integrated approach for identity and access management in a SOA context;program synthesis in administration of higher-order permissions;relationship-based accesscontrol policies and their policy languages;rumpole: a flexible break-glass accesscontrol model;SEAL: a logic programming framework for specifying and verifying accesscontrolmodels;transforming provenance using redaction;data leakage mitigation for discretionary accesscontrol in collaboration clouds;modeling data flow in socio-information networks: a risk estimation approach;an authorization scheme for version control systems;security validation tool for business processes;and system for automatic estimation of data sensitivity with applications to accesscontrol and other applications.
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for sem...
ISBN:
(纸本)9781450383653
the proceedings contain 19 papers. the topics discussed include: backdoor attacks to graph neural networks;analyzing the usefulness of the DARPA OpTC dataset in cyber threat detection research;towards a theory for semantics and expressiveness analysis of rule-based accesscontrolmodels;towards unifying RBAC with information flow control;towards cloud-based software for incorporating time and location into accesscontrol decisions;in-memory policy indexing for policy retrieval points in attribute-based accesscontrol;valued authorization policy existence problem;attribute-stream-based accesscontrol (ASBAC) withthe streaming attribute policy language (SAPL);shielding AppSPEAR â€" enhancing memory safety for trusted application-level security policy enforcement;and ReTRACe: revocable and traceable blockchain rewrites using attribute-based cryptosystems.
the proceedings contain 30 papers. the topics discussed include: privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule;evolving role definitions through permission invo...
ISBN:
(纸本)9781450319508
the proceedings contain 30 papers. the topics discussed include: privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule;evolving role definitions through permission invocation patterns;ensuring continuous compliance through reconciling policy with usage;least-restrictive enforcement of the Chinese wall security policy;constraint expressions and workflow satisfiability;information flow control for stream processing in clouds;HyXAC: a hybrid approach for XML accesscontrol;heuristic safety analysis of accesscontrolmodels;a white-box policy analysis and its efficient implementation;on the notion of redundancy in accesscontrol policies;a BigData platform for analytics on accesscontrol policies and logs;enabling intensional accesscontrol via preference-aware query optimization;and beyond accountability: using obligations to reduce risk exposure and deter insider attacks.
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system accesscontrol configurations;monitoring security ...
ISBN:
(纸本)9781450300490
the proceedings contain 19 papers. the topics discussed include: a model of triangulating environments for policy authoring;towards analyzing complex operating system accesscontrol configurations;monitoring security policies with metric first-order temporal logic;on the definition of role mining;mining roles with noisy data;StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy;role mining based on weights;accesscontrol in practice: pain points;automated management of network accesscontrol from design to enforcement;role-based accesscontrol (RBAC) in Java via proxy objects using annotations;role updating for assignments;enforcing spatial constraints for mobile RBAC systems;capability-based delegation model in RBAC;and a card requirements language enabling privacy-preserving accesscontrol.
暂无评论