| 2001 | Data and Application Security, Development and Directions, IFIP TC11/ WG11.3 Fourteenth Annual Working Conference on Database Security, Schoorl, The Netherlands, August 21-23, 2000 Bhavani Thuraisingham, Reind P. van de Riet, Klaus R. Dittrich, Zahir Tari |
| 2000 | A Configurable Security Architecture Prototype. Alexandre Hardy, Martin S. Olivier |
| 2000 | A Fair-exchange E-commerce Protocol with Automated Dispute Resolution. Indrajit Ray, Indrakshi Ray, Natarajan Narasimhamurthy |
| 2000 | Access Control Model in Object-Oriented Systems. Keiji Izaki, Katsuya Tanaka, Makoto Takizawa |
| 2000 | Active Access Control as High-Level Control. Daniel Cvrcek |
| 2000 | Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. Marc Donner, David Nochin, Dennis E. Shasha, Wendy Walasek |
| 2000 | An Integrated Framework for Database Privacy Protection. Liwu Chang, Ira S. Moskowitz |
| 2000 | An Integration Model of Role-Based Access Control and Activity Based Access Control Using Task. Sejong Oh, Seog Park |
| 2000 | Authentic Third-party Data Publication. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine |
| 2000 | Author-X: A Java-Based System for XML Data Protection. Elisa Bertino, M. Braun, Silvana Castano, Elena Ferrari, Marco Mesiti |
| 2000 | Conference Key Agreement Protocol Using Oblivious Transfer. Ari Moesriami Barmawi, Shingo Takada, Norihisa Doi |
| 2000 | Confidentiality vs. Integrity in Secure Databases. Adrian Spalka, Armin B. Cremers |
| 2000 | Coordinating Policy for Federated Applications. Ken Moody |
| 2000 | Database Security 2000. John R. Campbell |
| 2000 | Database Security Integration using Role-Based Access Control. Sylvia L. Osborn |
| 2000 | Declarative Semantics of Belief Queries in MLS Deductive Databases. Hasan M. Jamil |
| 2000 | Discovery of Multi-Level Security Policies. Christina Yip Chung, Michael Gertz, Karl N. Levitt |
| 2000 | Distributed Policies for Data Management - Making Policies Mobile. Susan Chapin, Donald B. Faatz, Sushil Jajodia |
| 2000 | Extending SQL's Grant and Revoke Operations, to Limit and Reactivate Privileges. Arnon Rosenthal, Edward Sciore |
| 2000 | Identifying Security Holes in OLAP Applications. Jürgen Steger, Holger Günzel, Andreas Bauer |
| 2000 | Integrating Security Policies in Federated Database Systems. Marta Oliva, Fèlix Saltor |
| 2000 | Language Extensions for Programmable Security. John Hale, Rodrigo Chandia, Clinton Campbell, Sujeet Shenoi |
| 2000 | Panel. Reind P. van de Riet, Raban Serban, Sylvia L. Osborn, Arnon Rosenthal, Vijayalakshmi Atluri, Joachim Biskup, Gio Wiederhold |
| 2000 | Protecting Deductive Databases from Unauthorized Retrievals. Steve Barker |
| 2000 | Protecting File systems Against Corruption Using Checksums. Daniel Barbará, Rajni Goel, Sushil Jajodia |
| 2000 | Protecting Information when Access is Granted for Collaboration. Gio Wiederhold |
| 2000 | Protecting Privacy from Continuous High-resolution Satellite Surveillance. Soon Ae Chun, Vijayalakshmi Atluri |
| 2000 | Role-Based Security in a Distributed Resource Environment. Steven A. Demurjian, T. C. Ting, J. Balthazar, H. Ren, Charles E. Phillips, Paul Barr |
| 2000 | Security Architecture of the Multimedia Mediator. Christian Altenschmidt, Joachim Biskup, Yücel Karabulut |
| 2000 | Simulation and Analysis of Cryptographic Protocols. Mauricio Papa, Oliver Bremer, Stephen Magill, John Hale, Sujeet Shenoi |
| 2000 | Trust Management in Distributed Databases. James Bret Michael, Leonard T. Gaines |
| 2000 | Web Security and Privacy (Panel). Bhavani Thuraisingham |
| 2000 | WorkFlow Analyzed for Security and Privacy in using Databases. Wouter Teepe, Reind P. van de Riet, Martin S. Olivier |
| 2000 | Wrappers - a mechanism to support state-based authorisation in Web applications. Martin S. Olivier, Ehud Gudes |
| 2000 | XML Access Control Systems: A Component-Based Approach. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, Pierangela Samarati |