Proceedings of the 24th ACM Symposium on Access Control Models and Technologies