| 2006 | A Distributed Coalition Service Registry for Ad-Hoc Dynamic Coalitions: A Service-Oriented Approach. Ravi Mukkamala, Vijayalakshmi Atluri, Janice Warner, Ranjit Abbadasari |
| 2006 | A Framework for Flexible Access Control in Digital Library Systems. Indrajit Ray, Sudip Chakraborty |
| 2006 | Aggregation Queries in the Database-As-a-Service Model. Einar Mykletun, Gene Tsudik |
| 2006 | Aspect-Oriented Risk Driven Development of Secure Applications. Geri Georg, Siv Hilde Houmb, Indrakshi Ray |
| 2006 | Authenticating Multi-dimensional Query Results in Data Publishing. Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan |
| 2006 | Authrule: A Generic Rule-Based Authorization Module. Sönke Busch, Björn Muschall, Günther Pernul, Torsten Priebe |
| 2006 | Consolidating the Access Control of Composite Applications and Workflows. Martin Wimmer, Alfons Kemper, Maarten Rits, Volkmar Lotz |
| 2006 | Creating Objects in the Flexible Authorization Framework. Nicola Zannone, Sushil Jajodia, Duminda Wijesekera |
| 2006 | Data and Applications Security XX, 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Sophia Antipolis, France, July 31-August 2, 2006, Proceedings Ernesto Damiani, Peng Liu |
| 2006 | Detection and Resolution of Anomalies in Firewall Policy Rules. Muhammad Abedin, Syeda Nessa, Latifur Khan, Bhavani Thuraisingham |
| 2006 | Discretionary and Mandatory Controls for Role-Based Administration. Jason Crampton |
| 2006 | Efficient Enforcement of Security Policies Based on Tracking of Mobile Users. Vijayalakshmi Atluri, Heechang Shin |
| 2006 | Enhancing User Privacy Through Data Handling Policies. Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2006 | From Business Process Choreography to Authorization Policies. Philip Robinson, Florian Kerschbaum, Andreas Schaad |
| 2006 | Information Theoretical Analysis of Two-Party Secret Computation. Da-Wei Wang, Churn-Jung Liau, Yi-Ting Chiang, Tsan-sheng Hsu |
| 2006 | Interactive Analysis of Attack Graphs Using Relational Queries. Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajodia |
| 2006 | Notarized Federated Identity Management for Web Services. Michael T. Goodrich, Roberto Tamassia, Danfeng Yao |
| 2006 | On Finding an Inference-Proof Complete Database for Controlled Query Evaluation. Joachim Biskup, Lena Wiese |
| 2006 | Policy Classes and Query Rewriting Algorithm for XML Security Views. Nataliya Rassadko |
| 2006 | Policy Transformations for Preventing Leakage of Sensitive Information in Email Systems. Saket Kaushik, William H. Winsborough, Duminda Wijesekera, Paul Ammann |
| 2006 | Resolving Information Flow Conflicts in RBAC Systems. Noa Tuval, Ehud Gudes |
| 2006 | Term Rewriting for Access Control. Steve Barker, Maribel Fernández |
| 2006 | XML Streams Watermarking. Julien Lafaye, David Gross-Amblard |