Proceedings of the sixth ACM symposium on Access control models and technologies