| 2011 | A New Leakage-Resilient IBE Scheme in the Relative Leakage Model. Yu Chen, Song Luo, Zhong Chen |
| 2011 | A Robust Remote User Authentication Scheme against Smart Card Security Breach. Chun-Ta Li, Cheng-Chi Lee, Chen-Ju Liu, Chin-Wen Lee |
| 2011 | Accurate Accident Reconstruction in VANET. Yuliya Kopylova, Csilla Farkas, Wenyuan Xu |
| 2011 | An Index Structure for Private Data Outsourcing. Aaron Steele, Keith B. Frikken |
| 2011 | An Optimization Model for the Extended Role Mining Problem. Emre Uzun, Vijayalakshmi Atluri, Haibing Lu, Jaideep Vaidya |
| 2011 | Cooperative Data Access in Multi-cloud Environments. Meixing Le, Krishna Kant, Sushil Jajodia |
| 2011 | Cyber Situation Awareness: Modeling the Security Analyst in a Cyber-Attack Scenario through Instance-Based Learning. Varun Dutt, Young-Suk Ahn, Cleotilde Gonzalez |
| 2011 | Data and Applications Security and Privacy XXV - 25th Annual IFIP WG 11.3 Conference, DBSec 2011, Richmond, VA, USA, July 11-13, 2011. Proceedings Yingjiu Li |
| 2011 | Dynamics in Delegation and Revocation Schemes: A Logical Approach. Guillaume Aucher, Steve Barker, Guido Boella, Valerio Genovese, Leendert W. N. van der Torre |
| 2011 | Efficient Distributed Linear Programming with Limited Disclosure. Yuan Hong, Jaideep Vaidya, Haibing Lu |
| 2011 | Enforcing Confidentiality and Data Visibility Constraints: An OBDD Approach. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati |
| 2011 | Enhancing CardSpace Authentication Using a Mobile Device. Haitham S. Al-Sinani, Chris J. Mitchell |
| 2011 | History-Dependent Inference Control of Queries by Dynamic Policy Adaption. Joachim Biskup |
| 2011 | Information Flow Containment: A Practical Basis for Malware Defense. R. Sekar |
| 2011 | Integrated Management of Security Policies. Stefano Paraboschi |
| 2011 | Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC. Solomon Berhe, Steven A. Demurjian, Swapna S. Gokhale, Jaime A. Pavlich-Mariscal, Rishi Saripalle |
| 2011 | Multilevel Secure Data Stream Processing. Raman Adaikkalavan, Indrakshi Ray, Xing Xie |
| 2011 | Multiparty Authorization Framework for Data Sharing in Online Social Networks. Hongxin Hu, Gail-Joon Ahn |
| 2011 | N-Gram Based Secure Similar Document Detection. Wei Jiang, Bharath K. Samanthula |
| 2011 | Preserving Privacy in Structural Neuroimages. Nakeisha Schimke, Mary Kuehler, John Hale |
| 2011 | Privacy-Preserving Data Mining: A Game-Theoretic Approach. Atsuko Miyaji, Mohammad Shahriar Rahman |
| 2011 | Private Database Search with Sublinear Query Time. Keith B. Frikken, Boyang Li |
| 2011 | Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. Florian Kerschbaum |
| 2011 | Query Processing in Private Data Outsourcing Using Anonymization. Ahmet Erhan Nergiz, Chris Clifton |
| 2011 | Re-designing the Web's Access Control System - (Extended Abstract). Wenliang Du, Xi Tan, Tongbo Luo, Karthick Jayaraman, Zutao Zhu |
| 2011 | Selective Disclosure on Encrypted Documents. Hao Lei, Dengguo Feng |
| 2011 | Verifiable Secret Sharing with Comprehensive and Efficient Public Verification. Kun Peng |