| 2005 | 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings Elena Ferrari, Gail-Joon Ahn |
| 2005 | A fine-grained, controllable, user-to-user delegation method in RBAC. Jacques Wainer, Akhil Kumar |
| 2005 | A reference monitor for workflow systems with constrained task execution. Jason Crampton |
| 2005 | AC-XML documents: improving the performance of a web access control module. Barbara Carminati, Elena Ferrari |
| 2005 | Adaptive trust negotiation and access control. Tatyana Ryutov, Li Zhou, B. Clifford Neuman, Travis Leithead, Kent E. Seamons |
| 2005 | Composing and combining policies under the policy machine. David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
| 2005 | Context sensitive access control. R. J. Hulsebosch, Alfons H. Salden, Mortaza S. Bargh, P. W. G. Ebben, J. Reitsma |
| 2005 | Declaration and enforcement of fine-grained access restrictions for a service-based geospatial data infrastructure. Andreas Matheus |
| 2005 | Future direction of access control models, architectures, and technologies. Konstantin Beznosov |
| 2005 | GEO-RBAC: a spatially aware RBAC. Elisa Bertino, Barbara Catania, Maria Luisa Damiani, Paolo Perlasca |
| 2005 | Generalized XML security views. Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadko |
| 2005 | Integrity constraints in trust management. Sandro Etalle, William H. Winsborough |
| 2005 | Peer-to-peer access control architecture using trusted computing technology. Ravi S. Sandhu, Xinwen Zhang |
| 2005 | Provable bounds for portable and flexible privacy-preserving access. Marina Blanton, Mikhail J. Atallah |
| 2005 | Purpose based access control of complex data for privacy protection. Ji-Won Byun, Elisa Bertino, Ninghui Li |
| 2005 | Relevancy based access control of versioned XML documents. Mizuho Iwaihara, Somchai Chatvichienchai, Chutiporn Anutariya, Vilas Wuwongse |
| 2005 | Role mining with ORCA. Jürgen Schlegelmilch, Ulrike Steffens |
| 2005 | Rule support for role-based access control. Axel Kern, Claudia Walhorn |
| 2005 | SERAT: SEcure role mApping technique for decentralized secure interoperability. Mohamed Shehab, Elisa Bertino, Arif Ghafoor |
| 2005 | Supporting conditional delegation in secure workflow management systems. Vijayalakshmi Atluri, Janice Warner |
| 2005 | Verifiable composition of access control and application features. Eunjee Song, Raghu Reddy, Robert B. France, Indrakshi Ray, Geri Georg, Roger T. Alexander |