Philip W. L. Fong
Orcid: 0000-0002-7974-3653Affiliations:
- University of Calgary, Canada
According to our database1,
Philip W. L. Fong
authored at least 52 papers
between 1995 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, 2024
2022
A Capability-based Distributed Authorization System to Enforce Context-aware Permission Sequences.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
Higher-Order Relationship-Based Access Control: A Temporal Instantiation with IoT Applications.
Proceedings of the SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies, New York, NY, USA, June 8, 2022
2020
Efficient Authorization of Graph-database Queries in an Attribute-supporting ReBAC Model.
ACM Trans. Priv. Secur., 2020
2019
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019
Proceedings of the Computer Security - ESORICS 2019, 2019
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
Proceedings of the 2018 Workshop on IoT Security and Privacy, 2018
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018
2017
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017
2016
Comput. Graph. Forum, 2016
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Privacy and Utility of Inference Control Mechanisms for Social Computing Applications.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
2015
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015
2014
ACM Trans. Inf. Syst. Secur., 2014
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems.
Comput. Secur., 2014
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014
2013
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
On the feasibility of inference attacks by third-party extensions to social network systems.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
A visualization tool for evaluating access control policies in facebook-style social network systems.
Proceedings of the ACM Symposium on Applied Computing, 2012
Proceedings of the Computer Security - ESORICS 2012, 2012
Relationship-based access control: its expression and enforcement through hybrid logic.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Preventing Sybil Attacks by Privilege Attenuation: A Design Principle for Social Network Systems.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the Ninth Annual IEEE International Conference on Pervasive Computing and Communications, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011
2010
Comput. Lang. Syst. Struct., 2010
2009
Proceedings of the Computer Security, 2009
Visualizing Privacy Implications of Access Control Policies in Social Network Systems.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009
Proceedings of the 2009 ACM Symposium on Information, 2009
2008
2007
Sci. Comput. Program., 2007
2006
Proceedings of the 22nd Annual Computer Security Applications Conference (ACSAC 2006), 2006
2005
Proceedings of the Third Annual Conference on Privacy, 2005
2004
Proceedings of the 2004 IEEE Symposium on Security and Privacy (S&P 2004), 2004
Proceedings of the 19th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2004
2001
Proof Linking: Distributed Verification of Java Classfiles in the Presence of Multiple Classloaders.
Proceedings of the 1st Java Virtual Machine Research and Technology Symposium, 2001
2000
Proof linking: modular verification of mobile programs in the presence of lazy, dynamic linking.
ACM Trans. Softw. Eng. Methodol., 2000
1998
Proof Linking: An Architecture for Modular Verification of Dynamically-Linked Mobile Code.
Proceedings of the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 1998
Proceedings of the Forging New Links, 1998
1995
Proceedings of the Machine Learning, 1995