| 2007 | 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings Volkmar Lotz, Bhavani Thuraisingham |
| 2007 | A formal approach for testing security rules. Wissam Mallouli, Jean-Marie Orset, Ana R. Cavalli, Nora Cuppens-Boulahia, Frédéric Cuppens |
| 2007 | A logical specification and analysis for SELinux MLS policy. Boniface Hicks, Sandra Julieta Rueda, Luke St. Clair, Trent Jaeger, Patrick D. McDaniel |
| 2007 | A note on the formalisation of UCON. Helge Janicke, Antonio Cau, Hussein Zedan |
| 2007 | A posteriori compliance control. Sandro Etalle, William H. Winsborough |
| 2007 | A privacy preserving assertion based policy language for federation systems. Anna Cinzia Squicciarini, Ayça Azgin Hintoglu, Elisa Bertino, Yücel Saygin |
| 2007 | Action-status access control. Steve Barker |
| 2007 | An approach to evaluate policy similarity. Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo |
| 2007 | Chinese-wall process confinement for practical distributed coalitions. Yasuharu Katsuno, Yuji Watanabe, Sanehiro Furuichi, Michiharu Kudo |
| 2007 | Discretionary access control with the administrative role graph model. He Wang, Sylvia L. Osborn |
| 2007 | Distributed access control: a privacy-conscious approach. Bogdan Cautis |
| 2007 | Enforcing access control over data streams. Barbara Carminati, Elena Ferrari, Kian-Lee Tan |
| 2007 | Fine-grained access control to web databases. Alex Roichman, Ehud Gudes |
| 2007 | Formalizing XML access control for update operations. Irini Fundulaki, Sebastian Maneth |
| 2007 | Inter-domain role mapping and least privilege. Liang Chen, Jason Crampton |
| 2007 | Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. Adam J. Lee, Kazuhiro Minami, Marianne Winslett |
| 2007 | Managing the risk of covert information flows in virtual machine systems. Trent Jaeger, Reiner Sailer, Yogesh Sreenivasan |
| 2007 | Mesh: secure, lightweight grid middleware using existing SSH infrastructure. Paul Z. Kolano |
| 2007 | Multilevel filesystems in solaris trusted extensions. Glenn Faden |
| 2007 | New constructions for provably-secure time-bound hierarchical key assignment schemes. Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
| 2007 | PEI models towards scalable, usable and high-assurance information sharing. Ram Krishnan, Ravi S. Sandhu, Kumar Ranganathan |
| 2007 | PolicyMorph: interactive policy transformations for a logical attribute-based access control framework. Michael LeMay, Omid Fatemieh, Carl A. Gunter |
| 2007 | Privacy-aware role based access control. Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo |
| 2007 | Role engineering using graph optimisation. Dana Zhang, Kotagiri Ramamohanarao, Tim Ebringer |
| 2007 | Specifications of a high-level conflict-free firewall policy language for multi-domain networks. Bin Zhang, Ehab Al-Shaer, Radha Jagadeesan, James Riely, Corin Pitcher |
| 2007 | The role mining problem: finding a minimal descriptive set of roles. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo |
| 2007 | Towards a VMM-based usage control framework for OS kernel integrity protection. Min Xu, Xuxian Jiang, Ravi S. Sandhu, Xinwen Zhang |
| 2007 | Towards realizing a formal RBAC model in real systems. Gail-Joon Ahn, Hongxin Hu |
| 2007 | Using semantics for automatic enforcement of access control policies among dynamic coalitions. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala, Jaideep Vaidya |