| 2008 | 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings Indrakshi Ray, Ninghui Li |
| 2008 | A general obligation model and continuity: enhanced policy enforcement engine for usage control. Basel Katt, Xinwen Zhang, Ruth Breu, Michael Hafner, Jean-Pierre Seifert |
| 2008 | A meta model for access control: why is it needed and is it even possible to achieve? David F. Ferraiolo, Vijay Atluri |
| 2008 | Access control by action control. Steve Barker |
| 2008 | An obligation model bridging access control policies and privacy policies. Qun Ni, Elisa Bertino, Jorge Lobo |
| 2008 | Authorization recycling in RBAC systems. Qiang Wei, Jason Crampton, Konstantin Beznosov, Matei Ripeanu |
| 2008 | Context-aware role-based access control in pervasive computing systems. Devdatta Kulkarni, Anand Tripathi |
| 2008 | Delegation and satisfiability in workflow systems. Jason Crampton, Hemanth Khambhammettu |
| 2008 | Detecting and resolving policy misconfigurations in access-control systems. Lujo Bauer, Scott Garriss, Michael K. Reiter |
| 2008 | Enabling verification and conformance testing for access control model. Hongxin Hu, Gail-Joon Ahn |
| 2008 | Enforcing security properties in task-based systems. Keith Irwin, Ting Yu, William H. Winsborough |
| 2008 | Fast exact and heuristic methods for role minimization problems. Alina Ene, William G. Horne, Nikola Milosavljevic, Prasad Rao, Robert Schreiber, Robert Endre Tarjan |
| 2008 | Measuring integrity on mobile phone systems. Divya Muthukumaran, Anuj Sawani, Joshua Schiffman, Brian M. Jung, Trent Jaeger |
| 2008 | Migrating to optimal RBAC with minimal perturbation. Jaideep Vaidya, Vijayalakshmi Atluri, Qi Guo, Nabil R. Adam |
| 2008 | Mining roles with semantic meanings. Ian M. Molloy, Hong Chen, Tiancheng Li, Qihua Wang, Ninghui Li, Elisa Bertino, Seraphin B. Calo, Jorge Lobo |
| 2008 | Model-based behavioral attestation. Masoom Alam, Xinwen Zhang, Mohammad Nauman, Tamleek Ali, Jean-Pierre Seifert |
| 2008 | Panel on role engineering. Vijay Atluri |
| 2008 | Policy decomposition for collaborative access control. Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo |
| 2008 | R Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham |
| 2008 | RBAC administration in distributed systems. M. A. C. Dekker, Jason Crampton, Sandro Etalle |
| 2008 | Task-based entailment constraints for basic workflow patterns. Christian Wolter, Andreas Schaad, Christoph Meinel |
| 2008 | UAQ: a framework for user authorization query processing in RBAC extended with hybrid hierarchy and constraints. Yue Zhang, James B. D. Joshi |
| 2008 | Visualization based policy analysis: case study in SELinux. Wenjuan Xu, Mohamed Shehab, Gail-Joon Ahn |