| 2009 | 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings Barbara Carminati, James Joshi |
| 2009 | A decision support system for secure information sharing. Achille Fokoue, Mudhakar Srivatsa, Pankaj Rohatgi, Peter Wrobel, John Yesberg |
| 2009 | A formal framework to elicit roles with business meaning in RBAC systems. Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello, Nino Vincenzo Verde |
| 2009 | A semantic web based framework for social network access control. Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2009 | Access control policy combining: theory meets practice. Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin |
| 2009 | An algebra for fine-grained integration of XACML policies. Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo |
| 2009 | An efficient framework for user authorization queries in RBAC systems. Guneshi T. Wickramaarachchi, Wahbeh H. Qardaji, Ninghui Li |
| 2009 | Analysis of virtual machine system policies. Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger |
| 2009 | Automating role-based provisioning by learning from examples. Qun Ni, Jorge Lobo, Seraphin B. Calo, Pankaj Rohatgi, Elisa Bertino |
| 2009 | Challenges and opportunities for virtualized security in the clouds. Frank Siebenlist |
| 2009 | Dynamic mandatory access control for multiple stakeholders. Vikhyath Rao, Trent Jaeger |
| 2009 | Efficient access enforcement in distributed role-based access control (RBAC) deployments. Mahesh V. Tripunitara, Bogdan Carbunar |
| 2009 | Ensuring spatio-temporal access control for real-world applications. Manachai Toahchoodee, Indrakshi Ray, Kyriakos Anastasakis, Geri Georg, Behzad Bordbar |
| 2009 | Evaluating role mining algorithms. Ian M. Molloy, Ninghui Li, Tiancheng Li, Ziqing Mao, Qihua Wang, Jorge Lobo |
| 2009 | Extending access control models with break-glass. Achim D. Brucker, Helmut Petritsch |
| 2009 | Foundations for group-centric secure information sharing models. Ram Krishnan, Ravi S. Sandhu, Jianwei Niu, William H. Winsborough |
| 2009 | Patient-centric authorization framework for sharing electronic health records. Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang |
| 2009 | Safety in discretionary access control for logic-based publish-subscribe systems. Kazuhiro Minami, Nikita Borisov, Carl A. Gunter |
| 2009 | Spatio-temporal access control: challenges and applications. Maria Luisa Damiani, Hervé Martin, Yücel Saygin, Maria Rita Spada, Cédric Ulmer |
| 2009 | Supporting RBAC with XACML+OWL. Rodolfo Ferrini, Elisa Bertino |
| 2009 | Symbolic reachability analysis for parameterized administrative role based access control. Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan |
| 2009 | The next 700 access control models or a unifying meta-model? Steve Barker |
| 2009 | Towards a dynamic and composable model of trust. Adam J. Lee, Ting Yu |
| 2009 | Towards formal security analysis of GTRBAC using timed automata. Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri |
| 2009 | Trojan horse resistant discretionary access control. Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang |
| 2009 | Usability meets access control: challenges and research opportunities. Konstantin Beznosov, Philip Inglesant, Jorge Lobo, Rob Reeder, Mary Ellen Zurko |
| 2009 | Working set-based access control for network file systems. Stephen Smaldone, Vinod Ganapathy, Liviu Iftode |
| 2009 | xDomain: cross-border proofs of access. Lujo Bauer, Limin Jia, Michael K. Reiter, David Swasey |