Towards Continuous Access Control Validation and Forensics. Xiang, C., Wu, Y., Shen, B., Shen, M., Huang, H., Xu, T., Zhou, Y., Moore, C., Jin, X., & Sheng, T. In Cavallaro, L., Kinder, J., Wang, X., & Katz, J., editors, Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019, pages 113–129, 2019. ACM. Paper doi bibtex @inproceedings{DBLP:conf/ccs/XiangWSSHX0MJS19,
author = {Chengcheng Xiang and
Yudong Wu and
Bingyu Shen and
Mingyao Shen and
Haochen Huang and
Tianyin Xu and
Yuanyuan Zhou and
Cindy Moore and
Xinxin Jin and
Tianwei Sheng},
editor = {Lorenzo Cavallaro and
Johannes Kinder and
XiaoFeng Wang and
Jonathan Katz},
title = {Towards Continuous Access Control Validation and Forensics},
booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},
pages = {113--129},
publisher = {{ACM}},
year = {2019},
url = {https://doi.org/10.1145/3319535.3363191},
doi = {10.1145/3319535.3363191},
timestamp = {Fri, 06 Mar 2020 13:19:56 +0100},
biburl = {https://dblp.org/rec/conf/ccs/XiangWSSHX0MJS19.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"riypNaYKkqH4m4aE8","bibbaseid":"xiang-wu-shen-shen-huang-xu-zhou-moore-etal-towardscontinuousaccesscontrolvalidationandforensics-2019","authorIDs":[],"author_short":["Xiang, C.","Wu, Y.","Shen, B.","Shen, M.","Huang, H.","Xu, T.","Zhou, Y.","Moore, C.","Jin, X.","Sheng, T."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Chengcheng"],"propositions":[],"lastnames":["Xiang"],"suffixes":[]},{"firstnames":["Yudong"],"propositions":[],"lastnames":["Wu"],"suffixes":[]},{"firstnames":["Bingyu"],"propositions":[],"lastnames":["Shen"],"suffixes":[]},{"firstnames":["Mingyao"],"propositions":[],"lastnames":["Shen"],"suffixes":[]},{"firstnames":["Haochen"],"propositions":[],"lastnames":["Huang"],"suffixes":[]},{"firstnames":["Tianyin"],"propositions":[],"lastnames":["Xu"],"suffixes":[]},{"firstnames":["Yuanyuan"],"propositions":[],"lastnames":["Zhou"],"suffixes":[]},{"firstnames":["Cindy"],"propositions":[],"lastnames":["Moore"],"suffixes":[]},{"firstnames":["Xinxin"],"propositions":[],"lastnames":["Jin"],"suffixes":[]},{"firstnames":["Tianwei"],"propositions":[],"lastnames":["Sheng"],"suffixes":[]}],"editor":[{"firstnames":["Lorenzo"],"propositions":[],"lastnames":["Cavallaro"],"suffixes":[]},{"firstnames":["Johannes"],"propositions":[],"lastnames":["Kinder"],"suffixes":[]},{"firstnames":["XiaoFeng"],"propositions":[],"lastnames":["Wang"],"suffixes":[]},{"firstnames":["Jonathan"],"propositions":[],"lastnames":["Katz"],"suffixes":[]}],"title":"Towards Continuous Access Control Validation and Forensics","booktitle":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, London, UK, November 11-15, 2019","pages":"113–129","publisher":"ACM","year":"2019","url":"https://doi.org/10.1145/3319535.3363191","doi":"10.1145/3319535.3363191","timestamp":"Fri, 06 Mar 2020 13:19:56 +0100","biburl":"https://dblp.org/rec/conf/ccs/XiangWSSHX0MJS19.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/ccs/XiangWSSHX0MJS19,\n author = {Chengcheng Xiang and\n Yudong Wu and\n Bingyu Shen and\n Mingyao Shen and\n Haochen Huang and\n Tianyin Xu and\n Yuanyuan Zhou and\n Cindy Moore and\n Xinxin Jin and\n Tianwei Sheng},\n editor = {Lorenzo Cavallaro and\n Johannes Kinder and\n XiaoFeng Wang and\n Jonathan Katz},\n title = {Towards Continuous Access Control Validation and Forensics},\n booktitle = {Proceedings of the 2019 {ACM} {SIGSAC} Conference on Computer and\n Communications Security, {CCS} 2019, London, UK, November 11-15, 2019},\n pages = {113--129},\n publisher = {{ACM}},\n year = {2019},\n url = {https://doi.org/10.1145/3319535.3363191},\n doi = {10.1145/3319535.3363191},\n timestamp = {Fri, 06 Mar 2020 13:19:56 +0100},\n biburl = {https://dblp.org/rec/conf/ccs/XiangWSSHX0MJS19.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Xiang, C.","Wu, Y.","Shen, B.","Shen, M.","Huang, H.","Xu, T.","Zhou, Y.","Moore, C.","Jin, X.","Sheng, T."],"editor_short":["Cavallaro, L.","Kinder, J.","Wang, X.","Katz, J."],"key":"DBLP:conf/ccs/XiangWSSHX0MJS19","id":"DBLP:conf/ccs/XiangWSSHX0MJS19","bibbaseid":"xiang-wu-shen-shen-huang-xu-zhou-moore-etal-towardscontinuousaccesscontrolvalidationandforensics-2019","role":"author","urls":{"Paper":"https://doi.org/10.1145/3319535.3363191"},"downloads":0},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/190/3392.bib","creationDate":"2020-06-14T22:56:41.467Z","downloads":0,"keywords":[],"search_terms":["towards","continuous","access","control","validation","forensics","xiang","wu","shen","shen","huang","xu","zhou","moore","jin","sheng"],"title":"Towards Continuous Access Control Validation and Forensics","year":2019,"dataSources":["PQxandfK5Rt3dFaGo"]}