| 2004 | A Design for Parameterized Roles. Mei Ge, Sylvia L. Osborn |
| 2004 | A Framework for Trusted Wireless Sensor Networks. Joon S. Park, Abhishek Jain |
| 2004 | A Pattern System for Access Control. Torsten Priebe, Eduardo B. Fernández, Jens Ingo Mehlau, Günther Pernul |
| 2004 | An Experimental Study of Distortion-Based Techniques for Association Rule Hiding. Emmanuel D. Pontikakis, Achilleas A. Tsitsonis, Vassilios S. Verykios |
| 2004 | An Extended Analysis of Delegating Obligations. Andreas Schaad |
| 2004 | Attribute Mutability in Usage Control. Jaehong Park, Xinwen Zhang, Ravi S. Sandhu |
| 2004 | Configuring Storage Area Networks for Mandatory Security. Benjamin Aziz, Simon N. Foley, John Herbert, Garret Swart |
| 2004 | Damage Discovery in Distributed Database Systems. Yanjun Zuo, Brajendra Panda |
| 2004 | Defending Against Additive Attacks with Maximal Errors in Watermarking Relational Databases. Yingjiu Li, Vipin Swarup, Sushil Jajodia |
| 2004 | Efficient Verification of Delegation in Distributed Group Membership Management. Ladislav Huraj, Helmut Reiser |
| 2004 | Implementing Real-Time Update of Access Control Policies. Indrakshi Ray, Tai Xin |
| 2004 | Information Flow Analysis for File Systems and Databases Using Labels. Ehud Gudes, Luigi V. Mancini, Francesco Parisi-Presicce |
| 2004 | Invited Talk - Inference Control Problems in Statistical Database Query Systems. Lawrence H. Cox |
| 2004 | Invited Talk - Towards Semantics-Aware Access Control. Ernesto Damiani, Sabrina De Capitani di Vimercati |
| 2004 | On The Damage and Compensation of Privacy Leakage. Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu, Jeremy K.-P. Chen |
| 2004 | Performance-Conscious Key Management in Encrypted Databases. Hakan Hacigümüs, Sharad Mehrotra |
| 2004 | Policy-based Security Management for Enterprise Systems. Ravi Mukkamala, L. Chekuri, Mohammed A. Moharrum, S. Palley |
| 2004 | Privacy-Preserving Multi-Party Decision Tree Induction. Justin Zhijun Zhan, Liwu Chang, Stan Matwin |
| 2004 | RBAC/MAC Security Analysis and Design for UML. Thuong Doan, Steven A. Demurjian, Charles E. Phillips, T. C. Ting |
| 2004 | Refusal in Incomplete Databases. Joachim Biskup, Torben Weibert |
| 2004 | Research Directions in Data and Applications Security XVIII, IFIP TC11/WG 11.3 Eighteenth Annual Conference on Data and Applications Security, July 25-28, 2004, Sitges, Catalonia, Spain Csilla Farkas, Pierangela Samarati |
| 2004 | STAR-Tree: An Index Structure for Efficient Evaluation of Spatiotemporal Authorizations. Vijayalakshmi Atluri, Qi Guo |
| 2004 | Secure Bridges: A Means to Conduct Secure Teleconferences over Public Telephones. Inja Youn, Duminda Wijesekera |
| 2004 | Securely Distributing Centralized Multimedia Content Utilizing Peer-to-Peer Cooperation. Indrajit Ray, Tomas Hajek |
| 2004 | Web Resource Usage Control in RSCLP. Steve Barker |
| 2004 | Why Is this User Asking so Many Questions? Explaining Sequences of Queries. Aybar C. Acar, Amihai Motro |