| 2006 | 11th ACM Symposium on Access Control Models and Technologies, SACMAT 2006, Lake Tahoe, California, USA, June 7-9, 2006, Proceedings David F. Ferraiolo, Indrakshi Ray |
| 2006 | A model-checking approach to analysing organisational controls in a loan origination process. Andreas Schaad, Volkmar Lotz, Karsten Sohr |
| 2006 | A usage-based authorization framework for collaborative computing systems. Xinwen Zhang, Masayuki Nakae, Michael J. Covington, Ravi S. Sandhu |
| 2006 | Access control, confidentiality and privacy for video surveillance databases. Bhavani Thuraisingham, Gal Lavee, Elisa Bertino, Jianping Fan, Latifur Khan |
| 2006 | Constraint generation for separation of duty. Hong Chen, Ninghui Li |
| 2006 | Data-centric security: role analysis and role typestates. Vugranam C. Sreedhar |
| 2006 | Delegation in the role graph model. He Wang, Sylvia L. Osborn |
| 2006 | Fine-grained role-based delegation in presence of the hybrid role hierarchy. James B. D. Joshi, Elisa Bertino |
| 2006 | Information flow property preserving transformation of UML interaction diagrams. Fredrik Seehusen, Ketil Stølen |
| 2006 | Integrating presence inference into trust management for ubiquitous systems. Jun Noda, Mie Takahashi, Itaru Hosomi, Hisashi Mouri, Yoshiaki Takata, Hiroyuki Seki |
| 2006 | Inter-instance authorization constraints for secure workflow management. Janice Warner, Vijayalakshmi Atluri |
| 2006 | Key management for non-tree access hierarchies. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
| 2006 | On classifying access control implementations for distributed systems. Kevin Kane, James C. Browne |
| 2006 | PRIMA: policy-reduced integrity measurement architecture. Trent Jaeger, Reiner Sailer, Umesh Shankar |
| 2006 | Redirection policies for mission-based information sharing. David R. Keppler, Vipin Swarup, Sushil Jajodia |
| 2006 | Role-based access management for ad-hoc collaborative sharing. Jing Jin, Gail-Joon Ahn |
| 2006 | Secure resource description framework: an access control model. Amit Jain, Csilla Farkas |
| 2006 | Security in enterprise resource planning systems and service-oriented architectures. Andreas Schaad |
| 2006 | Semantic access control for information interoperation. Chi-Chun Pan, Prasenjit Mitra, Peng Liu |
| 2006 | Supporting authorization query and inter-domain role mapping in presence of hybrid role hierarchy. Siqing Du, James B. D. Joshi |
| 2006 | Systematic control and management of data integrity. Ji-Won Byun, Yonglak Sohn, Elisa Bertino |
| 2006 | The secondary and approximate authorization model and its application to Bell-LaPadula policies. Jason Crampton, Wing Leung, Konstantin Beznosov |
| 2006 | Towards reasonability properties for access-control policy languages. Michael Carl Tschantz, Shriram Krishnamurthi |
| 2006 | Traust: a trust negotiation-based authorization service for open systems. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch |
| 2006 | Trust management with delegation in grouped peer-to-peer communities. Ajay Ravichandran, Jongpil Yoon |
| 2006 | TrustBAC: integrating trust relationships into the RBAC model for access control in open systems. Sudip Chakraborty, Indrajit Ray |
| 2006 | XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! Pietro Mazzoleni, Elisa Bertino, Bruno Crispo |