Proceedings of the seventh ACM symposium on Access control models and technologies