Padmavathi Iyer

Orcid: 0000-0001-9611-451X

According to our database1, Padmavathi Iyer authored at least 11 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Converting Rule-Based Access Control Policies: From Complemented Conditions to Deny Rules.
Proceedings of the 29th ACM Symposium on Access Control Models and Technologies, 2024

2023
Towards Automated Learning of Access Control Policies Enforced by Web Applications.
Proceedings of the 28th ACM Symposium on Access Control Models and Technologies, 2023

2022
Learning Relationship-Based Access Control Policies from Black-Box Systems.
ACM Trans. Priv. Secur., 2022

On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models.
Comput. Secur., 2022

Effective Evaluation of Relationship-Based Access Control Policy Mining.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2021
Towards a Theory for Semantics and Expressiveness Analysis of Rule-Based Access Control Models.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
Active Learning of Relationship-Based Access Control Policies.
Proceedings of the 25th ACM Symposium on Access Control Models and Technologies, 2020

2019
Generalized Mining of Relationship-Based Access Control Policies in Evolving Systems.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

2018
Mining Positive and Negative Attribute-Based Access Control Policy Rules.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
Email spoofing detection using volatile memory forensics.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017


  Loading...