Philip W. L. Fong

Orcid: 0000-0002-7974-3653

Affiliations:
  • University of Calgary, Canada


According to our database1, Philip W. L. Fong authored at least 52 papers between 1995 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Quantifying Policy Administration Cost in an Active Learning Framework.
CoRR, 2024

Social Control and Interactivity in Anonymous Public Events.
Proceedings of the Computer Security - ESORICS 2024, 2024

Mining Domain-Based Policies.
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024

2022
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022

2020
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model.
ACM Trans. Priv. Secur., 2020

2019
Brokering Policies and Execution Monitors for IoT Middleware.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

SEPD: An Access Control Model for Resource Sharing in an IoT Environment.
Proceedings of the Computer Security - ESORICS 2019, 2019

Results in Workflow Resiliency: Complexity, New Formulation, and ASP Encoding.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019

2018
Towards a Resilient Smart Home.
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018

HCAP: A History-Based Capability System for IoT Devices.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

2017
An Enforcement Model for Preventing Inference Attacks in Social Computing Platforms.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

2016
Using Visualization to Explore Original and Anonymized LBSN Data.
Comput. Graph. Forum, 2016

Policy Negotiation for Co-owned Resources in Relationship-Based Access Control.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Interoperability of Relationship- and Role-Based Access Control.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Relationship-Based Access Control for OpenMRS.
CoRR, 2015

Relationship-Based Access Control for an Open-Source Medical Records System.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies.
ACM Trans. Inf. Syst. Secur., 2014

Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems.
Comput. Secur., 2014

Papilio: Visualizing Android Application Permissions.
Comput. Graph. Forum, 2014

Access control models for geo-social computing systems.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Design Patterns for Multiple Stakeholders in Social Computing.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

On protection in federated social computing systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

2013
A white-box policy analysis and its efficient implementation.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Relational abstraction in community-based secure collaboration.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

On the feasibility of inference attacks by third-party extensions to social network systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
A visualization tool for evaluating access control policies in facebook-style social network systems.
Proceedings of the ACM Symposium on Applied Computing, 2012

Satisfiability and Feasibility in a Relationship-Based Workflow Authorization Model.
Proceedings of the Computer Security - ESORICS 2012, 2012

Relationship-based access control: its expression and enforcement through hybrid logic.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

The specification and compilation of obligation policies for program monitoring.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Relationship-based access control policies and their policy languages.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Inference attacks by third-party extensions to social network systems.
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011

Towards defining semantic foundations for purpose-based privacy policies.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Relationship-based access control: protection model and policy language.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Isolating untrusted software extensions by custom scoping rules.
Comput. Lang. Syst. Struct., 2010

2009
Reading a computer science research paper.
ACM SIGCSE Bull., 2009

A Privacy Preservation Model for Facebook-Style Social Network Systems.
Proceedings of the Computer Security, 2009

Visualizing Privacy Implications of Access Control Policies in Social Network Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Efficient IRM enforcement of history-based access control policies.
Proceedings of the 2009 ACM Symposium on Information, 2009

2008
Discretionary capability confinement.
Int. J. Inf. Sec., 2008

2007
Reasoning about safety properties in a JVM-like environment.
Sci. Comput. Program., 2007

2006
A Module System for Isolating Untrusted Software Extensions.
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006

2005
Link-Time Enforcement of Confined Types for JVM Bytecode.
Proceedings of the Third Annual Conference on Privacy, 2005

2004
Access Control By Tracking Shallow Execution History.
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004

Pluggable verification modules: an extensible protection mechanism for the JVM.
Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004

2001
Proof Linking: Distributed Verification of Java Classfiles in the Presence of Multiple Classloaders.
Proceedings of the 1st Java Virtual Machine Research and Technology Symposium, 2001

2000
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking.
ACM Trans. Softw. Eng. Methodol., 2000

1998
Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code.
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998

Techniques for Trusted Software Engineering.
Proceedings of the Forging New Links, 1998

1995
A Quantitative Study of Hypothesis Selection.
Proceedings of the Machine Learning, 1995


  Loading...