| 2003 | 8th ACM Symposium on Access Control Models and Technologies, SACMAT 2003, Villa Gallia, Como, Italy, June 2-3, 2003, Proceedings Elena Ferrari, David F. Ferraiolo |
| 2003 | A methodology for managing roles in legacy systems. Sylvia L. Osborn, Yan Han, Jun Liu |
| 2003 | A stratification-based approach for handling conflicts in access control. Salem Benferhat, Rania El Baida, Frédéric Cuppens |
| 2003 | An access control model for dynamic client-side content. Adam Hess, Kent E. Seamons |
| 2003 | An administration concept for the enterprise role-based access control model. Axel Kern, Andreas Schaad, Jonathan D. Moffett |
| 2003 | An approach to engineer and enforce context constraints in an RBAC environment. Gustaf Neumann, Mark Strembeck |
| 2003 | An infrastructure for managing secure update operations on XML data. Elisa Bertino, Giovanni Mella, Gianluca Correndo, Elena Ferrari |
| 2003 | Cooperative role-based administration. Horst F. Wedde, Mario Lischka |
| 2003 | Cryptographic access control in a distributed file system. Anthony Harrington, Christian Damsgaard Jensen |
| 2003 | Dependencies and separation of duty constraints in GTRBAC. James Joshi, Basit Shafiq, Arif Ghafoor, Elisa Bertino |
| 2003 | Dynamic access control: preserving safety and trust for network defense operations. Prasad Naldurg, Roy H. Campbell |
| 2003 | Dynamic and risk-aware network access management. Lawrence Teo, Gail-Joon Ahn, Yuliang Zheng |
| 2003 | Induced role hierarchies with attribute-based RBAC. Mohammad A. Al-Kahtani, Ravi S. Sandhu |
| 2003 | Model driven security for process-oriented systems. David A. Basin, Jürgen Doser, Torsten Lodderstedt |
| 2003 | On context in authorization policy. Patrick D. McDaniel |
| 2003 | On modeling system-centric information for role engineering. Dongwan Shin, Gail-Joon Ahn, Sangrae Cho, Seunghun Jin |
| 2003 | PBDM: a flexible delegation model in RBAC. Xinwen Zhang, Sejong Oh, Ravi S. Sandhu |
| 2003 | Partial outsourcing: a new paradigm for access control. Joerg Abendroth, Christian Damsgaard Jensen |
| 2003 | Role mining - revealing business roles for security administration using data mining technology. Martin Kuhlmann, Dalia Shohat, Gerhard Schimpf |
| 2003 | Role-based access control for collaborative enterprise in peer-to-peer computing environments. Joon S. Park, Junseok Hwang |
| 2003 | Specifying and enforcing constraints in role-based access control. Jason Crampton |
| 2003 | Static verification of security requirements in role based CSCW systems. Tanvir Ahmed, Anand R. Tripathi |
| 2003 | The role control center: features and case studies. David F. Ferraiolo, Ramaswamy Chandramouli, Gail-Joon Ahn, Serban I. Gavrila |
| 2003 | The tees confidentiality model: an authorisation model for identities and roles. Jim J. Longstaff, Mike A. Lockyer, John Nicholas |