| 2009 | A Trust-Based Access Control Model for Pervasive Computing Applications. Manachai Toahchoodee, Ramadan Abdunabi, Indrakshi Ray, Indrajit Ray |
| 2009 | An Approach to Security Policy Configuration Using Semantic Threat Graphs. Simon N. Foley, William M. Fitzgerald |
| 2009 | Analysis of Data Dependency Based Intrusion Detection System. Yermek Nugmanov, Brajendra Panda, Yi Hu |
| 2009 | Building an Application Data Behavior Model for Intrusion Detection. Olivier Sarrouy, Eric Totel, Bernard Jouga |
| 2009 | Controlled Query Evaluation and Inference-Free View Updates. Joachim Biskup, Jens Seiler, Torben Weibert |
| 2009 | Data Is Key: Introducing the Data-Based Access Control Paradigm. Wolter Pieters, Qiang Tang |
| 2009 | Data and Applications Security XXIII, 23rd Annual IFIP WG 11.3 Working Conference, Montreal, Canada, July 12-15, 2009. Proceedings Ehud Gudes, Jaideep Vaidya |
| 2009 | Detecting Inference Channels in Private Multimedia Data via Social Networks. Bechara al Bouna, Richard Chbeir |
| 2009 | Distributed Anonymization: Achieving Privacy for Both Data Subjects and Data Providers. Pawel Jurczyk, Li Xiong |
| 2009 | Distributed Privilege Enforcement in PACS. Christoph Sturm, Ela Hunt, Marc H. Scholl |
| 2009 | Emerging Trends in Health Care Delivery: Towards Collaborative Security for NIST RBAC. Solomon Berhe, Steven A. Demurjian, Thomas Agresta |
| 2009 | Enforcing Confidentiality Constraints on Sensitive Databases with Lightweight Trusted Clients. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati |
| 2009 | Implementing Reflective Access Control in SQL. Lars E. Olson, Carl A. Gunter, William R. Cook, Marianne Winslett |
| 2009 | Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols Using Trusted Computing Technology. Stephen R. Tate, Roopa Vishwanathan |
| 2009 | Methods for Computing Trust and Reputation While Preserving Privacy. Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein |
| 2009 | PAES: Policy-Based Authority Evaluation Scheme. Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu |
| 2009 | Practical Private DNA String Searching and Matching through Efficient Oblivious Automata Evaluation. Keith B. Frikken |
| 2009 | Privacy-Preserving Telemonitoring for eHealth. Mohamed Layouni, Kristof Verslype, Mehmet Tahir Sandikkaya, Bart De Decker, Hans Vangheluwe |
| 2009 | Reaction Policy Model Based on Dynamic Organizations and Threat Context. Fabien Autrel, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2009 | Secure Method Calls by Instrumenting Bytecode with Aspects. Xiaofeng Yang, Mohammad Zulkernine |
| 2009 | Spatiotemporal Access Control Enforcement under Uncertain Location Estimates. Heechang Shin, Vijayalakshmi Atluri |
| 2009 | Towards System Integrity Protection with Graph-Based Policy Analysis. Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn |
| 2009 | Using Edit Automata for Rewriting-Based Security Enforcement. Hakima Ould-Slimane, Mohamed Mejri, Kamel Adi |