| 2010 | A Labelling System for Derived Data Control. Enrico Scalavino, Vaibhav Gowadia, Emil C. Lupu |
| 2010 | A Logic of Privacy. Steve Barker, Valerio Genovese |
| 2010 | A Secure RFID Ticket System for Public Transport. Kun Peng, Feng Bao |
| 2010 | An Access Control Model for Web Databases. Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene Ayachi |
| 2010 | Authentication Assurance Level Taxonomies for Smart Identity Token Deployments - A New Approach. Ramaswamy Chandramouli |
| 2010 | Constructing Key Assignment Schemes from Chain Partitions. Jason Crampton, Rosli Daud, Keith M. Martin |
| 2010 | Data and Applications Security and Privacy XXIV, 24th Annual IFIP WG 11.3 Working Conference, Rome, Italy, June 21-23, 2010. Proceedings Sara Foresti, Sushil Jajodia |
| 2010 | Detecting Spam Bots in Online Social Networking Sites: A Machine Learning Approach. Alex Hai Wang |
| 2010 | Distributed and Secure Access Control in P2P Databases. Angela Bonifati, Ruilin Liu, Wendy Hui Wang |
| 2010 | Efficient Inference Control for Open Relational Queries. Joachim Biskup, Sven Hartmann, Sebastian Link, Jan-Hendrik Lochner |
| 2010 | Enforcing Request Integrity in Web Applications. Karthick Jayaraman, Grzegorz Lewandowski, Paul G. Talaga, Steve J. Chapin |
| 2010 | Evaluating the Risk of Adopting RBAC Roles. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
| 2010 | Generalizing PIR for Practical Private Retrieval of Public Data. Shiyuan Wang, Divyakant Agrawal, Amr El Abbadi |
| 2010 | Mining Likely Properties of Access Control Policies via Association Rule Mining. Jeehyun Hwang, Tao Xie, Vincent C. Hu, Mine Altunay |
| 2010 | Modelling Dynamic Access Control Policies for Web-Based Collaborative Systems. Hasan Qunoo, Mark Ryan |
| 2010 | Modelling Dynamic Trust with Property Based Attestation in Trusted Platforms. Aarthi Nagarajan, Vijay Varadharajan |
| 2010 | On the Identification of Property Based Generalizations in Microdata Anonymization. Rinku Dewri, Indrajit Ray, Indrakshi Ray, L. Darrell Whitley |
| 2010 | Performance Evaluation of Non-parallelizable Client Puzzles for Defeating DoS Attacks in Authentication Protocols. Suratose Tritilanunt |
| 2010 | Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. Amril Syalim, Takashi Nishide, Kouichi Sakurai |
| 2010 | Query Racing: Fast Completeness Certification of Query Results. Bernardo Palazzi, Maurizio Pizzonia, Stefano Pucacco |
| 2010 | Role Mining in the Presence of Noise. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Haibing Lu |
| 2010 | Scalable and Efficient Reasoning for Enforcing Role-Based Access Control. Tyrone Cadenhead, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2010 | Secure Location Verification - A Security Analysis of GPS Signal Authentication. Georg T. Becker, Sherman C. Lo, David S. De Lorenzo, Per K. Enge, Christof Paar |
| 2010 | Secure Outsourcing of DNA Searching via Finite Automata. Marina Blanton, Mehrdad Aliasgari |
| 2010 | Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms. Jan Zibuschka, Matthias Herbert, Heiko Rossnagel |
| 2010 | Understanding Privacy Risk of Publishing Decision Trees. Zutao Zhu, Wenliang Du |
| 2010 | Using Trust-Based Information Aggregation for Predicting Security Level of Systems. Siv Hilde Houmb, Sudip Chakraborty, Indrakshi Ray, Indrajit Ray |
| 2010 | When ABE Meets RSS. Yu Chen, Hyun Sung Kim, Jian-bin Hu, Zhong Chen |