| 2007 | A Pan Wang, Peng Ning, Douglas S. Reeves |
| 2007 | A dynamic information flow model of secure systems. Jianjun Shen, Sihan Qing |
| 2007 | A framework for decentralized access control. Meenakshi Balasubramanian, Abhishek Bhatnagar, Namit Chaturvedi, Atish Datta Chowdhury, Arul Ganesh |
| 2007 | A framework for diversifying windows native APIs to tolerate code injection attacks. Lynette Qu Nguyen, Tufan Demir, Jeff Rowe, Francis Hsu, Karl N. Levitt |
| 2007 | A novel approach for a file-system integrity monitor tool of Xen virtual machine. Anh-Quynh Nguyen, Yoshiyasu Takefuji |
| 2007 | Addressing interoperability issues in access control models. Vishwas Patil, Alessandro Mei, Luigi V. Mancini |
| 2007 | Administration in role-based access control. Ninghui Li, Ziqing Mao |
| 2007 | An extended model of security policy for multi-applicative smart cards. Matthias Schwan |
| 2007 | Analyzing network traffic to detect self-decrypting exploit code. Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Purushothaman Iyer |
| 2007 | BASE: an incrementally deployable mechanism for viable IP spoofing prevention. Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig |
| 2007 | Bluetooth worm propagation: mobility pattern matters! Guanhua Yan, Hector D. Flores, Leticia Cuellar, Nicolas W. Hengartner, Stephan J. Eidenbenz, Vincent Q. Vu |
| 2007 | Combinatorial characterizations of authentication codes in verification oracle model. Dongvu Tonien, Reihaneh Safavi-Naini, Peter R. Wild |
| 2007 | Compact FPGA implementations of QUAD. David Arditti, Côme Berbain, Olivier Billet, Henri Gilbert |
| 2007 | Concurrently-secure credential ownership proofs. Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Joonsang Baek |
| 2007 | Crocus: a steganographic filesystem manager. Hioki Hirohisa |
| 2007 | DRETA: distributed routing evidence tracing and authentication intrusion detection model for MANET. Chinyang Henry Tseng, Shiau-Huey Wang, Karl N. Levitt |
| 2007 | Detecting relay attacks with timing-based protocols. Jason Reid, Juan Manuel González Nieto, Tee Tang, Bouchra Senadji |
| 2007 | Direct static enforcement of high-level security policies. Qihua Wang, Ninghui Li |
| 2007 | Efficient techniques for realizing geo-spatial access control. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
| 2007 | Elastic block ciphers: the basic design. Debra L. Cook, Angelos D. Keromytis, Moti Yung |
| 2007 | Extended privilege inheritance in RBAC. M. A. C. Dekker, J. G. Cederquist, Jason Crampton, Sandro Etalle |
| 2007 | Fuzzy extractors for continuous distributions. Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Raymond N. J. Veldhuis |
| 2007 | History-based access control for XML documents. Patrick Röder, Omid Tafreschi, Claudia Eckert |
| 2007 | Incremental adaptation of XPath access control views. Padmapriya Ayyagari, Prasenjit Mitra, Dongwon Lee, Peng Liu, Wang-Chien Lee |
| 2007 | Invisible designated confirmer signatures without random oracles. Victor K. Wei |
| 2007 | Keynote speech. Mark Bregman |
| 2007 | Keystroke statistical learning model for web authentication. Cheng-Huang Jiang, Shiuhpyng Shieh, Jen-Chien Liu |
| 2007 | Kleptographic attacks on a cascade of mix servers. Przemyslaw Kubiak, Miroslaw Kutylowski, Filip Zagórski |
| 2007 | Managing RBAC states with transitive relations. Chaoyi Pang, David P. Hansen, Anthony J. Maeder |
| 2007 | Managing heterogeneous network environments using an extensible policy framework. Lawrence Teo, Gail-Joon Ahn |
| 2007 | Masquerade detection based on SVM and sequence-based user commands profile. Jeongseok Seo, Sung Deok Cha |
| 2007 | Mitigating denial-of-service attacks in MANET by distributed packet filtering: a game-theoretic approach. Xiaoxin Wu, David K. Y. Yau |
| 2007 | Network anomaly detection based on TCM-KNN algorithm. Yang Li, Binxing Fang, Li Guo, You Chen |
| 2007 | New constructions of fuzzy identity-based encryption. Joonsang Baek, Willy Susilo, Jianying Zhou |
| 2007 | Non-intrusive IP traceback for DDoS attacks. Vrizlynn L. L. Thing, Morris Sloman, Naranker Dulay |
| 2007 | On the evolution of adversary models in security protocols: from the beginning to sensor networks. Virgil D. Gligor |
| 2007 | Private stateful circuits secure against probing attacks. Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar |
| 2007 | Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007 Feng Bao, Steven Miller |
| 2007 | Protecting RFID communications in supply chains. Yingjiu Li, Xuhua Ding |
| 2007 | Ring signatures: universally composable definitions and constructions. Kazuki Yoneyama, Kazuo Ohta |
| 2007 | SPECS: smart partial enciphering service for accessing encrypted files with efficient and transparent. Tae-Kyou Park, Ilkyeun Ra |
| 2007 | SecureBus: towards application-transparent trusted computing with mandatory access control. Xinwen Zhang, Michael J. Covington, Songqing Chen, Ravi S. Sandhu |
| 2007 | Specifying and analyzing security automata using CSP-OZ. David A. Basin, Ernst-Rüdiger Olderog, Paul E. Sevinç |
| 2007 | The energy cost of cryptographic key establishment in wireless sensor networks. Johann Großschädl, Alexander Szekely, Stefan Tillich |
| 2007 | Topological analysis of network attack vulnerability. Sushil Jajodia |
| 2007 | Trust management services in relational databases. Sabrina De Capitani di Vimercati, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
| 2007 | Unconditionally secure ring authentication. Reihaneh Safavi-Naini, Shuhong Wang, Yvo Desmedt |
| 2007 | Universally composable and forward-secure RFID authentication and authenticated key exchange. Tri Van Le, Mike Burmester, Breno de Medeiros |