| 2004 | 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings Trent Jaeger, Elena Ferrari |
| 2004 | A composite rbac approach for large, complex organizations. Joon S. Park, Keith P. Costello, Teresa M. Neven, Josh A. Diosomito |
| 2004 | A logical specification for usage control. Xinwen Zhang, Jaehong Park, Francesco Parisi-Presicce, Ravi S. Sandhu |
| 2004 | A meta model for authorisations in application security systems and their integration into RBAC administration. Axel Kern, Martin Kuhlmann, Rainer Kuropka, Andreas Ruthert |
| 2004 | A role-based approach to access control for XML databases. Jingzhu Wang, Sylvia L. Osborn |
| 2004 | Administrative scope in the graph-based framework. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce |
| 2004 | Implementing access control to people location information. Urs Hengartner, Peter Steenkiste |
| 2004 | On the role of roles: from role-based to role-sensitive access control. Xuhui Ao, Naftaly H. Minsky |
| 2004 | Resolving constraint conflicts. Trent Jaeger, Reiner Sailer, Xiaolan Zhang |
| 2004 | Role-based access control in ambient and remote space. Horst F. Wedde, Mario Lischka |
| 2004 | Role-based cascaded delegation. Roberto Tamassia, Danfeng Yao, William H. Winsborough |
| 2004 | Security analysis in role-based access control. Ninghui Li, Mahesh V. Tripunitara |
| 2004 | Security for grid-based computing systems issues and challenges. Elisa Bertino, Bruno Crispo, James Joshi, Wengliang (Kevin) Du, Ravi S. Sandhu |
| 2004 | Specifying access control policies for XML documents with XPath. Irini Fundulaki, Maarten Marx |
| 2004 | Succinct specifications of portable document access policies. Marina Bykova, Mikhail J. Atallah |
| 2004 | Towards a credential-based implementation of compound access control policies. Joachim Biskup, Sandra Wortmann |
| 2004 | Towards a formal model for security policies specification and validation in the selinux system. Giorgio Zanin, Luigi V. Mancini |
| 2004 | Using trust and risk in role-based access control policies. Nathan Dimmock, András Belokosztolszki, David M. Eyers, Jean Bacon, Ken Moody |
| 2004 | Using uml to visualize role-based access control constraints. Indrakshi Ray, Na Li, Robert B. France, Dae-Kyoo Kim |
| 2004 | X-GTRBAC admin: a decentralized administration model for enterprise wide access control. Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor |