Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3322431acmconferencesBook PagePublication PagessacmatConference Proceedingsconference-collections
SACMAT '19: Proceedings of the 24th ACM Symposium on Access Control Models and Technologies
ACM2019 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
SACMAT '19: The 24th ACM Symposium on Access Control Models and Technologies Toronto ON Canada June 3 - 6, 2019
ISBN:
978-1-4503-6753-0
Published:
28 May 2019
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN

Reflects downloads up to 25 Dec 2024Bibliometrics
Skip Abstract Section
Abstract

It is our great pleasure to welcome you to the ACM Symposium on Access Control Models and Technologies (SACMAT 2019). This year's symposium continues its tradition of being the premier forum for presentation of research results and experience reports on leading edge issues of access control, including models, systems, applications, and theory. The aims of the symposium are to share novel access control solutions that fulfil the needs of heterogeneous applications and environments, and to identify new directions for future research and development. SACMAT provides researchers and practitioners with a unique opportunity to share their perspectives with others interested in the various aspects of access control.

We had 52 submissions from a variety of countries around the world. Submissions were anonymous; each paper has been reviewed by at least three reviewers who are experts in the field. Extensive online discussions took place to make the selections for the symposium. The program committee finally accepted 12 papers as full papers for presentation at the conference. The program contains 6 short papers, poster and demo presentations, and a panel session. This year we are very happy to welcome three well-known keynote speakers: Securing Big Data: New Access Control Challenges and Approaches, Murat Kantarcioglu (University of Texas at Dallas, USA) Trading SLAs for PhDs: Moving towards streamlined innovation with academia, Kory Fong (RBC, Canada) History and Future of Automated Vulnerability Analysis, Adam Doupé (Arizona State University, USA)

Putting together SACMAT 2019 was a team effort. We first thank the authors for providing the content of the program. We are grateful to the program committee, who worked very hard in reviewing papers and providing feedback for authors. Special thanks go to Elisa Bertino (Blue Sky/Vision Chair), Aniket Kate (Panels Chair), Axel Kern (Demonstrations Chair), Murtuza Jadliwala (Poster Chair), James Joshi (Test of Time Award Chair), Dongwan Shin (Webmaster), Hongxin Hu (Proceedings Chair) and Giovanni Livraga (Publicity Chair) for their help in organizing and publicizing the symposium. We also thank the members of the steering committee and especially its chair, Elena Ferrari, for providing valuable advice and support.

Skip Table Of Content Section
SESSION: Keynote Address I
keynote
Public Access
Securing Big Data: New Access Control Challenges and Approaches

Recent cyber attacks have shown that the leakage/stealing of big data may result in enormous monetary loss and damage to organizational reputation, and increased identity theft risks for individuals. Furthermore, in the age of big data, protecting the ...

SESSION: Mechanisms and Structures
research-article
Access Control for Binary Integrity Protection using Ethereum

The integrity of executable binaries is essential to the security of any device that runs them. At best, a manipulated binary can leave the system in question open to attack, and at worst, it can compromise the entire system by itself. In recent years, ...

research-article
CAOS: Concurrent-Access Obfuscated Store

This paper proposes Concurrent-Access Obfuscated Store (CAOS), a construction for remote data storage that provides access-pattern obfuscation in a honest-but-curious adversarial model, while allowing for low bandwidth overhead and client storage. ...

research-article
Public Access
PolTree: A Data Structure for Making Efficient Access Decisions in ABAC

In Attribute-Based Access Control (ABAC), a user is permitted or denied access to an object based on a set of rules (together called an ABAC Policy) specified in terms of the values of attributes of various types of entities, namely, user, object and ...

SESSION: IoT and Social
research-article
Public Access
Best Paper
Best Paper
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree

With the prevalence of online social networking, a large amount of studies have focused on online users' privacy. Existing work has heavily focused on preventing unauthorized access of one's personal information (e.g. locations, posts and photos). Very ...

research-article
Brokering Policies and Execution Monitors for IoT Middleware

Event-based systems lie at the heart of many cloud-based Internet-of-Things (IoT) platforms. This combination of the Broker architectural style and the Publisher-Subscriber design pattern provides a way for smart devices to communicate and coordinate ...

research-article
Public Access
Expat: Expectation-based Policy Analysis and Enforcement for Appified Smart-Home Platforms

This paper focuses on developing a security mechanism geared towards appified smart-home platforms. Such platforms often expose programming interfaces for developing automation apps that mechanize different tasks among smart sensors and actuators (e.g., ...

SESSION: Blue Sky/Vision Track
research-article
Owner-Centric Sharing of Physical Resources, Data, and Data-Driven Insights in Digital Ecosystems

We are living in an age in which digitization will connect more and more physical assets with IT systems and where IoT endpoints will generate a wealth of valuable data. Companies, individual users, and organizations alike therefore have the need to ...

research-article
IoT Passport: A Blockchain-Based Trust Framework for Collaborative Internet-of-Things

Internet-of-Things (IoT) is a rapidly-growing transformative expansion of the Internet with increasing influence on our daily life. Since the number of "things" is expected to soon surpass human population, control and automation of IoT devices has ...

research-article
An OpenRBAC Semantic Model for Access Control in Vehicular Networks

Inter-vehicle communication has the potential to significantly improve driving safety, but also raises security concerns. The fundamental mechanism to govern information sharing behaviors is access control. Since vehicular networks have a highly dynamic ...

research-article
Public Access
Toward Detection of Access Control Models from Source Code via Word Embedding

Advancement in machine learning techniques in recent years has led to deep learning applications on source code. While there is little research available on the subject, the work that has been done shows great potential. We believe deep learning can be ...

SESSION: Applications and Protocols
research-article
On the Difficulty of Using Patient's Physiological Signals in Cryptographic Protocols

With the increasing capabilities of wearable sensors and implantable medical devices, new opportunities arise to diagnose, control and treat several chronic conditions. Unfortunately, these advancements also open new attack vectors, making security an ...

research-article
HITC: Data Privacy in Online Social Networks with Fine-Grained Access Control

Online Social Networks (OSNs), such as Facebook and Twitter, are popular platforms that enable users to interact and socialize through their networked devices. The social nature of such applications encourages users to share a great amount of personal ...

short-paper
Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems

Relationship-based access control (ReBAC) provides a flexible approach to specify policies based on relationships between system entities, which makes them a natural fit for many modern information systems, beyond online social networks. In this paper ...

short-paper
Enhancing Biometric-Capsule-based Authentication and Facial Recognition via Deep Learning

In recent years, developers have used the proliferation of biometric sensors in smart devices, along with recent advances in deep learning, to implement an array of biometrics-based authentication systems. Though these systems demonstrate remarkable ...

SESSION: Junior Keynote
keynote
Public Access
History and Future of Automated Vulnerability Analysis

The software upon which our modern society operates is riddled with security vulnerabilities. These vulnerabilities allow hackers access to our sensitive data and make our system insecure. To identify vulnerabilities in software, human experts, or ...

SESSION: Mining and Analysis
research-article
Public Access
Towards Effective Verification of Multi-Model Access Control Properties

Many existing software systems like logistics systems or enterprise applications employ data security in a more or less ad hoc fashion. Our approach focuses on access control such as permission-based discretionary access control (DAC), variants of role-...

research-article
Public Access
Efficient and Extensible Policy Mining for Relationship-Based Access Control

Relationship-based access control (ReBAC) is a flexible and expressive framework that allows policies to be expressed in terms of chains of relationship between entities as well as attributes of entities. ReBAC policy mining algorithms have a potential ...

short-paper
A Rule-based Approach to the Decidability of Safety of ABACα

ABACα is a foundational model for attribute-based access control with a minimal set of capabilities to configure many access control models of interest, including the dominant traditional ones: discretionary (DAC), mandatory (MAC), and role-based (RBAC)...

short-paper
Bounded and Approximate Strong Satisfiability in Workflows

There has been a considerable amount of interest in recent years in the problem of workflow satisfiability, which asks whether the existence of constraints in a workflow specification makes it impossible to allocate authorized users to each step in the ...

SESSION: Models and Emerging Applications
research-article
Using Provenance for Secure Data Fusion in Cooperative Systems

In the context of cooperative systems, data coming from multiple, autonomous, heterogeneous information sources, is processed and fused into new pieces of information that can be further processed by other entities participating in the cooperation. ...

research-article
Public Access
Effectively Enforcing Authorization Constraints for Emerging Space-Sensitive Technologies

Recently, applications that deliver customized content to end-users, e.g., digital objects on top of a video stream, depending on information such as their current physical location, usage patterns, personal data, etc., have become extremely popular. ...

short-paper
Public Access
CMCAP: Ephemeral Sandboxes for Adaptive Access Control

We present CMCAP (context-mapped capabilities), a decentralized mechanism for specifying and enforcing adaptive access control policies for resource-centric security. Policies in CMCAP express runtime constraints defined as containment domains with ...

short-paper
Mutual Authorizations: Semantics and Integration Issues

Studies in fields like psychology and sociology have revealed that reciprocity is a powerful determinant of human behavior. None of the existing access control models however captures this reciprocity phenomenon. In this paper, we introduce a new kind ...

research-article
CloudProtect - A Cloud-based Software Protection Service

Protecting software from illegal access, intentional modification or reverse engineering is an inherently difficult practical problem involving code obfuscation techniques and real-time cryptographic protection of code. In traditional systems a secure ...

SESSION: Posters
poster
Poster: A Pluggable Authentication Module for Big Data Federation Architecture

This paper intends to propose a trustworthy model for authenticating users and services over a Big Data Federation deployment architecture. The main goal of this model is to provide a Single-Sign-on (SSO) approach for the latest Hadoop 3.x platform. To ...

poster
Public Access
Verifying OAuth Implementations Through Encrypted Network Analysis

Verifying protocol implementations via application analysis can be cumbersome. Rapid development cycles of both the protocol and applications that use it can hinder up-to-date analysis. A better approach is to use formal models to characterize the ...

poster
Poster: Unified Access Control for Surgical Robotics
Contributors
  • University of Waterloo
  • Toronto Metropolitan University
  • The University of Texas at San Antonio
  • University of Pittsburgh
Index terms have been assigned to the content through auto-classification.

Recommendations

Acceptance Rates

SACMAT '19 Paper Acceptance Rate 12 of 52 submissions, 23%;
Overall Acceptance Rate 177 of 597 submissions, 30%
YearSubmittedAcceptedRate
SACMAT '19521223%
SACMAT '18501428%
SACMAT '17 Abstracts501428%
SACMAT '16551833%
SACMAT '15591729%
SACMAT '14581729%
SACMAT '13621931%
SACMAT '12731926%
SACMAT '09752432%
SACMAT '03632337%
Overall59717730%