| 2003 | Research Directions in Data and Applications Security, IFIP WG 11.3 Sixteenth International Conference on Data and Applications Security, July 28-31, 2002, Kings College, Cambridge, UK Ehud Gudes, Sujeet Shenoi |
| 2002 | A Hybrid PKI Model: Application to Secure Mediation. Joachim Biskup, Yücel Karabulut |
| 2002 | A Process Algebraic Approach to Security Policies. Peter Ryan, Ragni Ryvold Arnesen |
| 2002 | A Study of Inference Problems in Distributed Databases. Liwu Chang, Ira S. Moskowitz |
| 2002 | Access Control of SVG Documents. Ernesto Damiani, Sabrina De Capitani di Vimercati, Eduardo Fernández-Medina, Pierangela Samarati |
| 2002 | Analyzing Transaction Logs for Effective Damage Assessment. Prahalad Ragothaman, Brajendra Panda |
| 2002 | Anonymous and Secure Multicast Subscription. Indrajit Ray, Indrakshi Ray |
| 2002 | Deductive Database Security. Steve Barker |
| 2002 | Distributed Cooperative Updates of XML Documents. Elisa Bertino, Elena Ferrari, Giovanni Mella |
| 2002 | Implementation and Verification of Programmable Security. Stephen Magill, Bradley Skaggs, Mauricio Papa, John Hale |
| 2002 | Implementing RBAC Policies. Steve Barker, Paul Douglas, Terry Fanning |
| 2002 | Implementing Workflow Systems. Lucas C. J. Dreyer, Martin S. Olivier |
| 2002 | Mining Malicious Corruption of Data with Hidden Markov Models. Daniel Barbará, Rajni Goel, Sushil Jajodia |
| 2002 | Multiphase Damage Confinement System for Databases. Peng Liu, Ying Wang |
| 2002 | On Modeling Computer Networks for Vulnerability Analysis. Clinton Campbell, Jerald Dawkins, Brandon Pollet, Kenneth Fitch, John Hale, Mauricio Papa |
| 2002 | On Security and Privacy Risks in Association Mining Algorithms. Tom Johnsten, Vijay V. Raghavan, Kevin Hill |
| 2002 | On-line Intrusion Protection by Detecting Attacks with Diversity. James C. Reynolds, James E. Just, Ed Lawson, Larry A. Clough, Ryan Maglich |
| 2002 | Privacy and Civil Liberties. David W. Chadwick, Martin S. Olivier, Pierangela Samarati, Eleanor Sharpston, Bhavani Thuraisingham |
| 2002 | Privilege Administration for the Role Graph Model. Cecilia Ionita, Sylvia L. Osborn |
| 2002 | Recertification: A Technique to Improve Services in PKI. Ravi Mukkamala, Satyam Das, Mahantesh Halappanavar |
| 2002 | Role Delegation for a Resource-Based Security Model. M. Liebrand, Heidi J. C. Ellis, Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
| 2002 | Secure XML Views. Andrei Stoica, Csilla Farkas |
| 2002 | Shielding RBAC Infrastructures from Cyberterrorism. András Belokosztolszki, David M. Eyers |
| 2002 | Towards Secure XML Federations. Lingyu Wang, Duminda Wijesekera, Sushil Jajodia |
| 2002 | Uniform Indexing for Geospatial Data and Authorizations. Vijayalakshmi Atluri, Pietro Mazzoleni |
| 2002 | Using X.509 Attribute Certificates for Role-Based EAM. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho |