| 2005 | A Comprehensive Approach to Anomaly Detection in Relational Databases. Adrian Spalka, Jan Lehnhardt |
| 2005 | A Credential-Based Approach for Facilitating Automatic Resource Sharing Among Ad-Hoc Dynamic Coalitions. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
| 2005 | An Authorization Architecture for Web Services. Sarath Indrakanti, Vijay Varadharajan |
| 2005 | Blind Custodians: A Database Service Architecture That Supports Privacy Without Encryption. Amihai Motro, Francesco Parisi-Presicce |
| 2005 | Complete Redundancy Detection in Firewalls. Alex X. Liu, Mohamed G. Gouda |
| 2005 | Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings Sushil Jajodia, Duminda Wijesekera |
| 2005 | Designing Secure Indexes for Encrypted Databases. Erez Shmueli, Ronen Waisenberg, Yuval Elovici, Ehud Gudes |
| 2005 | Efficiency and Security Trade-Off in Supporting Range Queries on Encrypted Databases. Jun Li, Edward Omiecinski |
| 2005 | Multilevel Secure Teleconferencing over Public Switched Telephone Network. Inja Youn, Csilla Farkas, Bhavani Thuraisingham |
| 2005 | Privacy-Preserving Collaborative Association Rule Mining. Justin Zhijun Zhan, Stan Matwin, Liwu Chang |
| 2005 | Privacy-Preserving Decision Trees over Vertically Partitioned Data. Jaideep Vaidya, Chris Clifton |
| 2005 | Privacy-Preserving Distributed k-Anonymity. Wei Jiang, Chris Clifton |
| 2005 | Reliable Scheduling of Advanced Transactions. Tai Xin, Yajie Zhu, Indrakshi Ray |
| 2005 | Revocation of Obligation and Authorisation Policy Objects. Andreas Schaad |
| 2005 | Role Slices: A Notation for RBAC Permission Assignment and Enforcement. Jaime A. Pavlich-Mariscal, Thuong Doan, Laurent Michel, Steven A. Demurjian, T. C. Ting |
| 2005 | Secrecy of Two-Party Secure Computation. Yi-Ting Chiang, Da-Wei Wang, Churn-Jung Liau, Tsan-sheng Hsu |
| 2005 | Secure Mediation with Mobile Code. Joachim Biskup, Barbara Sprick, Lena Wiese |
| 2005 | Secure Model Management Operations for the Web. Guang-Lei Song, Kang Zhang, Bhavani Thuraisingham, Jun Kong |
| 2005 | Security Issues in Querying Encrypted Data. Murat Kantarcioglu, Chris Clifton |
| 2005 | Security Vulnerabilities in Software Systems: A Quantitative Perspective. Omar Hussain Alhazmi, Yashwant K. Malaiya, Indrajit Ray |
| 2005 | Streams, Security and Scalability. Theodore Johnson, S. Muthukrishnan, Oliver Spatscheck, Divesh Srivastava |
| 2005 | Towards Database Firewalls. Kun Bai, Alex Hai Wang, Peng Liu |
| 2005 | Towards Privacy-Enhanced Authorization Policies and Languages. Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2005 | Trading Off Security in a Service Oriented Architecture. Garret Swart, Benjamin Aziz, Simon N. Foley, John Herbert |
| 2005 | Trusted Identity and Session Management Using Secure Cookies. Joon S. Park, Harish S. Krishnan |
| 2005 | Verified Query Results from Hybrid Authentication Trees. Glen Nuckolls |