


default search action
SACMAT 2025: Stony Brook, NY, USA
- Scott D. Stoller, Omar Chowdhury, Adam J. Lee

, Amir Masoumzadeh:
Proceedings of the 30th ACM Symposium on Access Control Models and Technologies, SACMAT 2025, Stony Brook, NY, USA, 10 July 2025. ACM 2025, ISBN 979-8-4007-1503-7 - Vijayalakshmi Atluri

:
Policy Mining: Putting LLMs to Work [Keynote Abstract]. 1-2 - John H. Kastner

:
Cedar: An Expressive, Fast, Safe, and Analyzable Authorization Language for Modern Distributed Systems [Keynote Abstract]. 3 - Mahesh Tripunitara

:
Minimizing the Number of Roles in Bottom-Up Role-Mining using Maximal Biclique Enumeration. 4-15 - Shmuel Amour

, Ehud Gudes
:
Predictive Enhancement of ABAC Policies Using Access Log Analytics [Work In Progress Paper]. 16-21 - Puneet Gill

, Mahesh Tripunitara
:
New Algorithms for Minimizing the Number of Edges in Bottom-Up Role Mining. 22-32 - Jason Zhijingcheng Yu

, Mingkai Li
, Aditya Badole
, Trevor E. Carlson
, Michael Swift
, Prateek Saxena
:
Caplification: Bridging Capability-Aware and Capability-Oblivious Software. 33-44 - Simone Brunello

, Stefano Berlato
, Roberto Carbone
, Adam J. Lee
, Silvio Ranise
:
Relying on Trust to Balance Protection and Performance in Cryptographic Access Control. 45-56 - Hussein Joumaa

, Ali Hariri
, Theo Dimitrakos
, Bruno Crispo
:
Coordinated Enforcement of Obligations in Distributed Usage Control Systems [Work In Progress Paper]. 57-61 - Rakesh Podder

, Turgay Caglar, Shadaab Kawnain Bashir
, Sarath Sreedharan
, Indrajit Ray, Indrakshi Ray:
SPEAR: Security Posture Evaluation using AI Planner-Reasoning on Attack-Connectivity Hypergraphs. 62-73 - Harsh Sanjay Pacherkar

, Guanhua Yan
:
ACGuard5GC: Privacy-Preserving Prevention of Access Control Attacks within 5G Core Networks. 74-84 - Charles Marion Ueltschey

, Joshua Moore
, Aly Sabri Abdalla
, Vuk Marojevic
:
RAN Tester UE: An Automated Declarative UE Centric Security Testing Platform [Dataset/Tool Paper]. 85-90 - Brian Tan

, Ewan S. D. Davies
, Indrakshi Ray
, Mahmoud Abdelgawad
:
Safety Analysis in the NGAC Model. 91-98 - Ben Weintraub

, Chanyuan Liu
, William Enck
, Cristina Nita-Rotaru
:
ProfessorX: Detecting Silent Vulnerabilities in Policy Engine Implementations. 99-110 - Thang Bui

, Anthony Matricia
, Emily Contreras
, Ryan Mauvais
, Luis Medina
, Israel Serrano
:
ABAC Lab: An Interactive Platform for Attribute-based Access Control Policy Analysis, Tools, and Datasets [Dataset/Tool Paper]. 111-116 - Gelareh Hasel Mehri

, Charles Morisset
, Nicola Zannone
:
Towards Explainable Access Control [BlueSky Paper]. 117-126 - Patrick Spiesberger

, Jan Droll
, Hannes Hartenstein
:
A Policy-Based Mitigation of Transaction Exclusion in Ethereum [Work in Progress Paper]. 127-132 - Jiaming Yuan

, Yingjiu Li
, Jun Li
, Daoyuan Wu
, Jianting Ning
, Yangguang Tian
, Robert H. Deng
:
Leakage-Resilient Easily Deployable and Efficiently Searchable Encryption (EDESE). 133-144 - Mohammad Nur Nobi

, Maanak Gupta
, Ram Krishnan
, Md. Shohel Rana
, Lopamudra Praharaj
, Mahmoud Abdelsalam
:
Machine Learning in Access Control: A Taxonomy [Systematization of Knowledge Paper]. 145-156 - Mian Yang

, Vijayalakshmi Atluri
, Shamik Sural
, Ashish Kundu
:
Extraction of Machine Enforceable ABAC Policies from Natural Language Text using LLM Knowledge Distillation. 157-168 - Aditya Nangia

, Sriya Ayachitula
, Chinmay Kundu
:
In-Context Vulnerability Propagation in LLMs [Work In Progress Paper]. 169-174 - Xiang Li

, Wenqi Wei
, Bhavani Thuraisingham
:
MUBox: A Critical Evaluation Framework of Deep Machine Unlearning [Systematization of Knowledge Paper]. 175-188 - Nikola Antonijevic

, Sayon Duttagupta
, Dave Singelée
, Enrique Argones-Rúa
, Bart Preneel
:
ZeroTouch: Reinforcing RSS for Secure Geofencing. 189-200 - Maxwel Bar-on, Katherine Patterson, Bruhadeshwar Bezawada

, Indrakshi Ray, Indrajit Ray:
"Bring your own device!": Adaptive IoT Device-type Fingerprinting using Automatic Behavior Extraction [Work In Progress Paper]. 201-206

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














