| 2002 | 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002 Ravi S. Sandhu, Elisa Bertino |
| 2002 | A context-related authorization and access control method based on RBAC. Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
| 2002 | A cryptographic solution to implement access control in a hierarchy and more. Indrakshi Ray, Indrajit Ray, Natu Narasimhamurthi |
| 2002 | A lightweight approach to specification and analysis of role-based access control extensions. Andreas Schaad, Jonathan D. Moffett |
| 2002 | A model for role administration using organization structure. Sejong Oh, Ravi S. Sandhu |
| 2002 | A role-based delegation framework for healthcare information systems. Longhua Zhang, Gail-Joon Ahn, Bei-Tseng Chu |
| 2002 | A scenario-driven role engineering process for functional RBAC roles. Gustaf Neumann, Mark Strembeck |
| 2002 | Administrative scope and role hierarchy operations. Jason Crampton |
| 2002 | An access control language for web services. Emin Gün Sirer, Ke Wang |
| 2002 | An authorization infrastructure for nomadic computing. Kan Zhang, Tim Kindberg |
| 2002 | Cool security trends. Dawson R. Engler, Cynthia E. Irvine, Trent Jaeger, David A. Wagner |
| 2002 | Information flow analysis of an RBAC system. Sylvia L. Osborn |
| 2002 | Information sharing and security in dynamic coalitions. Charles E. Phillips, T. C. Ting, Steven A. Demurjian |
| 2002 | Making access control more usable. Elisa Bertino, Trent Jaeger, Jonathan D. Moffett, Sylvia L. Osborn, Ravi S. Sandhu |
| 2002 | Managing access control policies using access control spaces. Trent Jaeger, Antony Edwards, Xiaolan Zhang |
| 2002 | Models for coalition-based access control (CBAC). Eve Cohen, Roshan K. Thomas, William H. Winsborough, Deborah Shands |
| 2002 | Observations on the role life-cycle in the context of enterprise security management. Axel Kern, Martin Kuhlmann, Andreas Schaad, Jonathan D. Moffett |
| 2002 | Temporal hierarchies and inheritance semantics for GTRBAC. James Joshi, Elisa Bertino, Arif Ghafoor |
| 2002 | The PERMIS X.509 role based privilege management infrastructure. David W. Chadwick, Alexander Otenko |
| 2002 | Towards usage control models: beyond traditional access control. Jaehong Park, Ravi S. Sandhu |