Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies最新文献

筛选
英文 中文
Federated Synthetic Data Generation with Stronger Security Guarantees 具有更强安全保证的联邦合成数据生成
Ali Reza Ghavamipour, F. Turkmen, Rui Wang, K. Liang
{"title":"Federated Synthetic Data Generation with Stronger Security Guarantees","authors":"Ali Reza Ghavamipour, F. Turkmen, Rui Wang, K. Liang","doi":"10.1145/3589608.3593835","DOIUrl":"https://doi.org/10.1145/3589608.3593835","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"56 1","pages":"31-42"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75716533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups 安全通行证:弱势群体在隐私、问责、安全和安全方面的管理、倡导、公平和赋权
Indrajit Ray, B. Thuraisingham, Jaideep Vaidya, S. Mehrotra, V. Atluri, Indrakshi Ray, Murat Kantarcioglu, R. Raskar, Babak Salimi, Steve Simske, N. Venkatasubramanian, Vivek K. Singh
{"title":"SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups","authors":"Indrajit Ray, B. Thuraisingham, Jaideep Vaidya, S. Mehrotra, V. Atluri, Indrakshi Ray, Murat Kantarcioglu, R. Raskar, Babak Salimi, Steve Simske, N. Venkatasubramanian, Vivek K. Singh","doi":"10.1145/3589608.3593830","DOIUrl":"https://doi.org/10.1145/3589608.3593830","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"29 1","pages":"145-155"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91231916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Analysis of Access Control Policies for Smart Homes 智能家居访问控制策略的安全性分析
Roberta Cimorelli Belfiore, A. L. Ferrara
{"title":"Security Analysis of Access Control Policies for Smart Homes","authors":"Roberta Cimorelli Belfiore, A. L. Ferrara","doi":"10.1145/3589608.3593842","DOIUrl":"https://doi.org/10.1145/3589608.3593842","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"8 1 1","pages":"99-106"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83839550","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots 海报:如何培养机器人-超越辅助类人机器人的访问控制约束
N. Hemken, F. Jacob, Fabian Peller-Konrad, Rainer Kartmann, T. Asfour, H. Hartenstein
{"title":"Poster: How to Raise a Robot - Beyond Access Control Constraints in Assistive Humanoid Robots","authors":"N. Hemken, F. Jacob, Fabian Peller-Konrad, Rainer Kartmann, T. Asfour, H. Hartenstein","doi":"10.1145/3589608.3595078","DOIUrl":"https://doi.org/10.1145/3589608.3595078","url":null,"abstract":"Humanoid robots will be able to assist humans in their daily life, in particular due to their versatile action capabilities. However, while these robots need a certain degree of autonomy to learn and explore, they also should respect various constraints, for access control and beyond. We explore incorporating privacy and security constraints (Activity-Centric Access Control and Deep Learning Based Access Control) with robot task planning approaches (classical symbolic planning and end-to-end learning-based planning). We report pre-liminary results on their respective trade-offs and conclude that a hybrid approach will most likely be the method of choice.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"32 1","pages":"55-57"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72944264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality 利用授权策略防止移动增强现实中的空间和隐私攻击
Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn
{"title":"SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality","authors":"Luis Claramunt, Carlos E. Rubio-Medrano, Jaejong Baek, Gail-Joon Ahn","doi":"10.1145/3589608.3593839","DOIUrl":"https://doi.org/10.1145/3589608.3593839","url":null,"abstract":"Mobile Augmented Reality (MAR) is a portable, powerful, and suitable technology that integrates digital content , e.g., 3D virtual objects, into the physical world, which not only has been implemented for multiple intents such as shopping, entertainment, gaming, etc., but it is also expected to grow at a tremendous rate in the upcoming years. Unfortunately, the applications that implement MAR, hereby referred to as MAR-Apps, bear security issues, which have been imaged in worldwide incidents such as robberies, which has led authorities to ban MAR-Apps at specific locations. Existing problems with MAR-Apps can be classified into three categories: first, Space Invasion , which implies the intrusive modification through MAR of sensitive spaces, e.g., hospitals, memorials, etc. Second, Space Affectation , which involves the degradation of users’ experience via interaction with undesirable MAR or malicious entities. Finally, MAR-Apps mishandling sensitive data leads to Privacy Leaks . To alleviate these concerns, we present an approach for Policy-Governed MAR-Apps, which allows end-users to fully control under what circumstances, e.g., their presence inside a given sensitive space, digital content may be displayed by MAR-Apps. Through SpaceMediator , a proof-of-concept MAR-App that imitates the well-known and successful MAR-App Pokémon GO, we evaluated our approach through a user study with 40 participants, who recognized and prevented the issues just described with success rates as high as 92.50%. Furthermore, there is an enriched interest in Policy-Governed MAR-Apps as 87.50% of participants agreed with it, and 82.50% would use it to implement content-based restrictions in MAR-Apps. These promising results encourage the adoption of our solution in future MAR-Apps","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"105 1","pages":"79-90"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74822397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Coverage-Based Testing of Obligations in NGAC Systems NGAC系统中基于覆盖率的义务测试
Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu
{"title":"Coverage-Based Testing of Obligations in NGAC Systems","authors":"Erzhuo Chen, Vladislav Dubrovenski, Dianxiang Xu","doi":"10.1145/3589608.3593832","DOIUrl":"https://doi.org/10.1145/3589608.3593832","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"16 1","pages":"169-179"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75468664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS) 演示:智能手机用户认证(MBBS)的多模式行为生物识别方案
Attaullah Buriro, Samuele Ceol
{"title":"Demo: A Multimodal Behavioral Biometric Scheme for Smartphone User Authentication (MBBS)","authors":"Attaullah Buriro, Samuele Ceol","doi":"10.1145/3589608.3595083","DOIUrl":"https://doi.org/10.1145/3589608.3595083","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"4 1","pages":"43-45"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73059652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sidecar-based Path-aware Security for Microservices 基于sidecar的微服务路径感知安全性
C. Meadows, Sena Hounsinou, Timothy Wood, Gedare Bloom
{"title":"Sidecar-based Path-aware Security for Microservices","authors":"C. Meadows, Sena Hounsinou, Timothy Wood, Gedare Bloom","doi":"10.1145/3589608.3594742","DOIUrl":"https://doi.org/10.1145/3589608.3594742","url":null,"abstract":"","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"6 1","pages":"157-162"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72691776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Qualitative Intention-aware Attribute-based Access Control Policy Refinement 基于定性意向感知属性的访问控制策略细化
Shohei Mitani, Jonghoon Kwon, N. Ghate, Taniya Singh, Hirofumi Ueda, A. Perrig
{"title":"Qualitative Intention-aware Attribute-based Access Control Policy Refinement","authors":"Shohei Mitani, Jonghoon Kwon, N. Ghate, Taniya Singh, Hirofumi Ueda, A. Perrig","doi":"10.1145/3589608.3593841","DOIUrl":"https://doi.org/10.1145/3589608.3593841","url":null,"abstract":"Designing access control policies is often expensive and tedious due to the heterogeneous systems, services, and diverse user demands. Although ABAC policy and decision engine creation methods based on machine learning have been proposed, they cannot make good access decisions for applications and situations not envisioned by the decision-makers who provide training examples. It results in over-and under-permissiveness. In this paper, we propose a framework that refines pre-developed policies. It creates a decision engine that makes better decisions than those policies. Inspired by multiple criteria decision theory, our method uses the policy manager’s qualitative intentions behind their judgments to guide access decisions so that more benefits are expected. In the evaluation, we prepare a coarse and relatively elaborate policy. We refine the coarse policy to obtain a decision engine that is compared for the similarity in access decisions with the elaborate policy using AUC as a measure. The results show that our method improves the coarse policy by a difference of 12–26% in AUC and outperforms the conventional machine learning methods by a difference of 3–11% in AUC.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"2016 1","pages":"201-208"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74034618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Automated Learning of Access Control Policies Enforced by Web Applications Web应用程序访问控制策略的自动学习
Padmavathi Iyer, A. Masoumzadeh
{"title":"Towards Automated Learning of Access Control Policies Enforced by Web Applications","authors":"Padmavathi Iyer, A. Masoumzadeh","doi":"10.1145/3589608.3594743","DOIUrl":"https://doi.org/10.1145/3589608.3594743","url":null,"abstract":"Obtaining an accurate specification of the access control policy enforced by an application is essential in ensuring that it meets our security/privacy expectations. This is especially important as many of real-world applications handle a large amount and variety of data objects that may have different applicable policies. We investigate the problem of automated learning of access control policies from web applications. The existing research on mining access control policies has mainly focused on developing algorithms for inferring correct and concise policies from low-level authorization information. However, little has been done in terms of systematically gathering the low-level authorization data and applications’ data models that are prerequisite to such a mining process. In this paper, we propose a novel black-box approach to inferring those prereq-uisites and discuss our initial observations on employing such a framework in learning policies from real-world web applications.","PeriodicalId":74509,"journal":{"name":"Proceedings of the ... ACM symposium on access control models and technologies. ACM Symposium on Access Control Models and Technologies","volume":"17 1","pages":"163-168"},"PeriodicalIF":0.0,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87544963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信