| 2002 | Database and Application Security XV, IFIP TC11/WG11.3 Fifteenth Annual Working Conference on Database and Application Security, July 15-18, 2001, Niagara on the Lake, Ontario, Canada Martin S. Olivier, David L. Spooner |
| 2001 | A Comparison Between ConSA and Current Linux Security Implementations. Alexandre Hardy, Martin S. Olivier |
| 2001 | A Novel Approach to Certificate Revocation Management. Ravi Mukkamala, Sushil Jajodia |
| 2001 | Administering Permissions for Distributed Data: Factoring and Automated Inference. Arnon Rosenthal, Edward Sciore |
| 2001 | An Extended Transaction Model Approach for Multilevel Secure Transaction Processing. Vijayalakshmi Atluri, Ravi Mukkamala |
| 2001 | Constraints-based Access Control. Wee-Yeh Tan |
| 2001 | Efficient Damage Assessment and Repair in Resilient Distributed Database Systems. Liu Peng, Hao Xu |
| 2001 | Flexible Security Policies in SQL. Steve Barker, Arnon Rosenthal |
| 2001 | Maintaining the Confidentiality of Interoperable Databases with a Multilevel Federated Security System. Marta Oliva, Fèlix Saltor |
| 2001 | Managing Classified Documents in a Relational Database. Adrian Spalka |
| 2001 | ODAR: An On-the-fly Damage Assessment and Repair System for Commercial Database Applications. Pramote Luenam, Peng Liu |
| 2001 | Panel on XML and Security. Sylvia L. Osborn, Bhavani Thuraisingham, Pierangela Samarati |
| 2001 | Public Telephone Network Vulnerabilities. G. Lorenz, J. Keller, Gavin Manes, John Hale, Sujeet Shenoi |
| 2001 | Randomly roving agents for intrusion detection. Ira S. Moskowitz, Myong H. Kang, Liwu Chang, Garth E. Longdon |
| 2001 | Recent Advances in Access Control Models. Sushil Jajodia, Duminda Wijesekera |
| 2001 | Regulating Access to XML documents. Alban Gabillon, Emmanuel Bruno |
| 2001 | Reorganization of Database Log for Information Warfare Data Recovery. Rumman Sobhan, Brajendra Panda |
| 2001 | Role-based Access Control on the Web Using LDAP. Joon S. Park, Gail-Joon Ahn, Ravi S. Sandhu |
| 2001 | Secure Role-Based Workflow Models. Savith Kandala, Ravi S. Sandhu |
| 2001 | Security Procedures for Classification Mining Algorithms. Tom Johnsten, Vijay V. Raghavan |
| 2001 | Selected Summary of Discussions. David L. Spooner, Martin S. Olivier |
| 2001 | State-Dependent Security Decisions for Distributed Object-Systems. Joachim Biskup, Thomas Leineweber |
| 2001 | Subject Switching Algorithms for Access Control in Federated Databases. Jacqueline Yang, Duminda Wijesekera, Sushil Jajodia |
| 2001 | The Inference Problem and Updates in Relational Databases. Csilla Farkas, Tyrone S. Toland, Caroline M. Eastman |