| 2008 | A New Approach to Secure Logging. Di Ma, Gene Tsudik |
| 2008 | A Privacy-Preserving Ticketing System. Kristof Verslype, Bart De Decker, Vincent Naessens, Girma Nigusse, Jorn Lapon, Pieter Verhaeghe |
| 2008 | A Unified Audit Expression Model for Auditing SQL Queries. Vikram Goyal, Shyam K. Gupta, Anand Gupta |
| 2008 | An Attack Graph-Based Probabilistic Security Metric. Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia |
| 2008 | An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. Indrajit Ray, Nayot Poolsappasit, Rinku Dewri |
| 2008 | DIWeDa - Detecting Intrusions in Web Databases. Alex Roichman, Ehud Gudes |
| 2008 | Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings Vijay Atluri |
| 2008 | Dynamic Meta-level Access Control in SQL. Steve Barker |
| 2008 | Empirical Analysis of Certificate Revocation Lists. Daryl Walleck, Yingjiu Li, Shouhuai Xu |
| 2008 | Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure. Lei Zhang, Lingyu Wang, Sushil Jajodia, Alexander Brodsky |
| 2008 | On the Applicability of Trusted Computing in Distributed Authorization Using Web Services. Aarthi Nagarajan, Vijay Varadharajan, Michael Hitchens, Saurabh Arora |
| 2008 | On the Formal Analysis of a Spatio-temporal Role-Based Access Control Model. Manachai Toahchoodee, Indrakshi Ray |
| 2008 | P4A: A New Privacy Model for XML. Angela Cristina Duta, Ken Barker |
| 2008 | Panel Session: What Are the Key Challenges in Distributed Security?. Steve Barker, David W. Chadwick, Jason Crampton, Emil Lupu, Bhavani Thuraisingham |
| 2008 | Privacy-Aware Collaborative Access Control in Web-Based Social Networks. Barbara Carminati, Elena Ferrari |
| 2008 | Protecting the Publishing Identity in Multiple Tuples. Youdong Tao, Yunhai Tong, Shaohua Tan, Shiwei Tang, Dongqing Yang |
| 2008 | Regulating Exceptions in Healthcare Using Policy Spaces. Claudio Agostino Ardagna, Sabrina De Capitani di Vimercati, Tyrone Grandison, Sushil Jajodia, Pierangela Samarati |
| 2008 | Secure Construction of Contingency Tables from Distributed Data. Haibing Lu, Xiaoyun He, Jaideep Vaidya, Nabil R. Adam |
| 2008 | Securing Workflows with XACML, RDF and BPEL. Vijayant Dhankhar, Saket Kaushik, Duminda Wijesekera |
| 2008 | Security, Functionality and Scale? Ross J. Anderson |
| 2008 | Shared and Searchable Encrypted Data for Untrusted Servers. Changyu Dong, Giovanni Russello, Naranker Dulay |
| 2008 | Sharing but Protecting Content Against Internal Leakage for Organisations. Muntaha Alawneh, Imad M. Abbadi |
| 2008 | The Analysis of Windows Vista Disk Encryption Algorithm. Mohamed Abo El-Fotouh, Klaus Diepold |
| 2008 | Towards Automation of Testing High-Level Security Properties. Aiman Hanna, Hai Zhou Ling, Jason Furlong, Mourad Debbabi |
| 2008 | Using New Tools for Certificate Repositories Generation in MANETs. Candelaria Hernández-Goya, Pino Caballero-Gil, Oscar Delgado-Mohatar, Jezabel Molina-Gil, Cándido Caballero-Gil |
| 2008 | Web Services Security: Techniques and Challenges (Extended Abstract). Anoop Singhal |