| 2004 | Data and Applications Security XVII: Status and Prospects, IFIP TC-11 WG 11.3 Seventeenth Annual Working Conference on Data and Application Security, August4-6, 2003, Estes Park, Colorado, USA Sabrina De Capitani di Vimercati, Indrakshi Ray, Indrajit Ray |
| 2003 | A Decentralized Approach for Controlled Sharing of Resources in Virtual Communities. Elisa Bertino, Elena Ferrari, Anna Cinzia Squicciarini |
| 2003 | Adapting Query Optimization Techniques for Efficient Alert Correlation. Peng Ning, Dingbang Xu |
| 2003 | Administration Rights in the SDSD-System. Joachim Biskup, Thomas Leineweber, Joerg Parthe |
| 2003 | An Administrative Model for Role Graphs. He Wang, Sylvia L. Osborn |
| 2003 | Anti-Tamper Databases: Querying Encrypted Databases. Gultekin Özsoyoglu, David A. Singer, Sun S. Chung |
| 2003 | Certifying Data from Multiple Sources. Glen Nuckolls, Charles U. Martel, Stuart G. Stubblebine |
| 2003 | Chinese Wall Security Policy Models: Information Flows and Confining Trojan Horses. Tsau Young Lin |
| 2003 | Collaborative Privacy Preserving Frequent Item Set Mining in Vertically Partitioned Databases. Ehud Gudes, Boris Rozenberg |
| 2003 | Correlated Data Inference. Csilla Farkas, Andrei Stoica |
| 2003 | Data and Applications Security: Past, Present and the Future. Bhavani Thuraisingham |
| 2003 | Delivering Services with Integrity Guarantees in Survivable Database Systems. Jianyong Zhang, Peng Liu |
| 2003 | Digital Forensics: Operational, Legal, and Research Issues. Mark Pollitt, Michael A. Caloyannides, Jon Novotny, Sujeet Shenoi |
| 2003 | ECPV: Efficient Certificate Path Validation in Public-key Infrastructure. Mahantesh Halappanavar, Ravi Mukkamala |
| 2003 | Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model. Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra |
| 2003 | FlexFlow: A Flexible Flow Control Policy Specification Framework. Shiping Chen, Duminda Wijesekera, Sushil Jajodia |
| 2003 | High-speed Access Control for XML Documents. Jong P. Yoon |
| 2003 | Improving Damage Assessment Efficacy in case of Frequent Attacks on Databases. Prahalad Ragothaman, Brajendra Panda |
| 2003 | Modifying LDAP to Support PKI. David W. Chadwick, Edward Ball, M. V. Sahalayev |
| 2003 | Persistent versus Dynamic Role Membership. Jean Bacon, David W. Chadwick, Alexander Otenko, Ken Moody |
| 2003 | Privacy under Conditions of Concurrent Interaction with Multiple Parties. Martin S. Olivier |
| 2003 | RBAC Policy Implementation for SQL Databases. Steve Barker, Paul Douglas |
| 2003 | Remote Computer Fingerprinting for Cyber Crime Investigations. Jon Novotny, Dominic Schulte, Gavin Manes, Sujeet Shenoi |
| 2003 | Safety and Liveness for an RBAC/MAC Security Model. Charles E. Phillips, Steven A. Demurjian, T. C. Ting |
| 2003 | Schema Based XML Security: RBAC Approach. Xinwen Zhang, Jaehong Park, Ravi S. Sandhu |
| 2003 | Secure Authorisation for Web Services. Sarath Indrakanti, Vijay Varadharajan, Michael Hitchens, Rajat Kumar Todi |
| 2003 | Semantics-Aware Perimeter Protection. Marco Cremonini, Ernesto Damiani, Pierangela Samarati |
| 2003 | Supporting Delegation in Secure Workflow Management Systems. Vijayalakshmi Atluri, Elisa Bertino, Elena Ferrari, Pietro Mazzoleni |
| 2003 | Systematic Development of a Family of Fair Exchange Protocols. Paul D. Ezhilchelvan, Santosh K. Shrivastava |