| 2001 | 6th ACM Symposium on Access Control Models and Technologies, SACMAT 2001, Litton-TASC, Chantilly, Virginia, USA, May 3-4, 2001 Ravi S. Sandhu, Trent Jaeger |
| 2001 | A graphical definition of authorization schema in the DTAC model. Jonathon Tidswell, John Potter |
| 2001 | A logical framework for reasoning about access control models. Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca |
| 2001 | A model of OASIS role-based access control and its support for active security. Walt Yao, Ken Moody, Jean Bacon |
| 2001 | A rule-based framework for role based delegation. Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu |
| 2001 | Access control mechanisms for inter-organizational workflow. Myong H. Kang, Joon S. Park, Judith N. Froscher |
| 2001 | An argument for the role-based access control model. David F. Ferraiolo |
| 2001 | Flexible team-based access control using contexts. Christos K. Georgiadis, Ioannis Mavridis, George Pangalos, Roshan K. Thomas |
| 2001 | Improving the granularity of access control in Windows NT. Michael M. Swift, Peter Brundrett, Cliff Van Dyke, Praerit Garg, Anne Hopkins, Shannon Chan, Mario Goertzel, Gregory Jensenworth |
| 2001 | Managing access control complexity using metrices. Trent Jaeger |
| 2001 | Modular authorization. Horst F. Wedde, Mario Lischka |
| 2001 | On specifying security policies for web documents with an XML-based language. Elisa Bertino, Silvana Castano, Elena Ferrari |
| 2001 | On the specification and evolution of access control policies. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
| 2001 | Panel: The next generation of acess control models (panel session): do we need them and what should they be? Ravi S. Sandhu, Elisa Bertino, Trent Jaeger, D. Richard Kuhn, Carl E. Landwehr |
| 2001 | Panel: which access control technique will provide the greatest overall benefit-Abstract. Timothy Fraser, David F. Ferraiolo, Mikel L. Matthews, Casey Schaufler, Stephen Smalley, Robert Watson |
| 2001 | Position paper. Mikel L. Matthews |
| 2001 | Securing context-aware applications using environment roles. Michael J. Covington, Wende Long, Srividhya Srinivasan, Anind K. Dey, Mustaque Ahamad, Gregory D. Abowd |
| 2001 | Security verification of programs with stack inspection. Naoya Nitta, Hiroyuki Seki, Yoshiaki Takata |
| 2001 | Statement for SACMAT 2001 panel. Robert Watson |
| 2001 | Structured management of role-permission relationships. Najam Perwaiz |
| 2001 | The YGuard access control model: set-based access control. Ty van den Akker, Quinn Snell, Mark J. Clement |
| 2001 | The role-based access control system of a European bank: a case study and discussion. Andreas Schaad, Jonathan D. Moffett, Jeremy Jacob |
| 2001 | They want froot loops why industry will continue to deliver multi-level security. Casey Schaufler |
| 2001 | Which operating system access control technique will provide the greatest overall benefit to users?. Stephen Smalley |