| 2007 | A Privacy-Enhanced Attribute-Based Access Control System. Jan Paul Kolter, Rolf Schillinger, Günther Pernul |
| 2007 | A Scalable and Secure Cryptographic Service. Shouhuai Xu, Ravi S. Sandhu |
| 2007 | A Spatio-temporal Role-Based Access Control Model. Indrakshi Ray, Manachai Toahchoodee |
| 2007 | Authenticated Relational Tables and Authenticated Skip Lists. Giuseppe Di Battista, Bernardo Palazzi |
| 2007 | Confidentiality Policies for Controlled Query Evaluation. Joachim Biskup, Torben Weibert |
| 2007 | Data and Applications Security XXI, 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Redondo Beach, CA, USA, July 8-11, 2007, Proceedings Steve Barker, Gail-Joon Ahn |
| 2007 | Design and Analysis of Querying Encrypted Data in Relational Databases. Mustafa Canim, Murat Kantarcioglu |
| 2007 | Dynamic Event-Based Access Control as Term Rewriting. Clara Bertolissi, Maribel Fernández, Steve Barker |
| 2007 | Efficient Security Policy Enforcement in a Location Based Service Environment. Vijayalakshmi Atluri, Heechang Shin |
| 2007 | Enforcing Honesty in Assured Information Sharing Within a Distributed System. Ryan Layfield, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2007 | Location Privacy Protection Through Obfuscation-Based Techniques. Claudio A. Ardagna, Marco Cremonini, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati |
| 2007 | Measuring the Overall Security of Network Configurations Using Attack Graphs. Lingyu Wang, Anoop Singhal, Sushil Jajodia |
| 2007 | New Paradigm of Inference Control with Trusted Computing. Yanjiang Yang, Yingjiu Li, Robert H. Deng |
| 2007 | Privacy-Preserving Schema Matching Using Mutual Information. Isabel F. Cruz, Roberto Tamassia, Danfeng Yao |
| 2007 | Provably-Secure Schemes for Basic Query Support in Outsourced Databases. Georgios Amanatidis, Alexandra Boldyreva, Adam O'Neill |
| 2007 | Reliable Delivery of Event Data from Sensors to Actuators in Pervasive Computing Environments. Sudip Chakraborty, Nayot Poolsappasit, Indrajit Ray |
| 2007 | Security Patterns for Physical Access Control Systems. Eduardo B. Fernández, Jose Ballesteros, Ana C. Desouza-Doucet, Maria M. Larrondo-Petrie |
| 2007 | The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. Anna Zych, Milan Petkovic, Willem Jonker |
| 2007 | Towards a Times-Based Usage Control Model. Baoxian Zhao, Ravi S. Sandhu, Xinwen Zhang, Xiaolin Qin |
| 2007 | XACML Policies for Exclusive Resource Usage. Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
| 2007 | gVault: A Gmail Based Cryptographic Network File System. Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian |