| 2010 | 15th ACM Symposium on Access Control Models and Technologies, SACMAT 2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings James B. D. Joshi, Barbara Carminati |
| 2010 | A card requirements language enabling privacy-preserving access control. Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer |
| 2010 | A model of triangulating environments for policy authoring. Kathi Fisler, Shriram Krishnamurthi |
| 2010 | Access control in practice: pain points. Mahesh V. Tripunitara, Praerit Garg, Bob Bocchino, Fred Frye, Divya Sundaram |
| 2010 | Access control policy translation and verification within heterogeneous data federations. Gregory Leighton, Denilson Barbosa |
| 2010 | An access control model for mobile physical objects. Florian Kerschbaum |
| 2010 | An architecture for enforcing end-to-end access control over web applications. Boniface Hicks, Sandra Julieta Rueda, Dave King, Thomas Moyer, Joshua Schiffman, Yogesh Sreenivasan, Patrick D. McDaniel, Trent Jaeger |
| 2010 | Architectures for practical security. Virgil D. Gligor |
| 2010 | Automated management of network access control from design to enforcement. Ehab Al-Shaer |
| 2010 | Capability-based delegation model in RBAC. Koji Hasebe, Mitsuhiro Mabuchi, Akira Matsushita |
| 2010 | Data protection models for service provisioning in the cloud. Dan Lin, Anna Cinzia Squicciarini |
| 2010 | Enforcing spatial constraints for mobile RBAC systems. Michael S. Kirkpatrick, Elisa Bertino |
| 2010 | Mining roles with noisy data. Ian M. Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo, Luke Dickens |
| 2010 | Modular context-aware access control for medical sensor networks. Oscar García Morchon, Klaus Wehrle |
| 2010 | Monitoring security policies with metric first-order temporal logic. David A. Basin, Felix Klaedtke, Samuel Müller |
| 2010 | New access models for healthcare. Tyrone Grandison |
| 2010 | On the definition of role mining. Mario Frank, Joachim M. Buhmann, David A. Basin |
| 2010 | Personalizing access control by generalizing access control. Steve Barker |
| 2010 | Privacy-preserving trust verification. Jaideep Vaidya, Vijayalakshmi Atluri, Basit Shafiq, Nabil R. Adam |
| 2010 | Role mining based on weights. Xiaopu Ma, Ruixuan Li, Zhengding Lu |
| 2010 | Role updating for assignments. Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu |
| 2010 | Role-based access control (RBAC) in Java via proxy objects using annotations. Jeff Zarnett, Mahesh V. Tripunitara, Patrick Lam |
| 2010 | Solving the access-control puzzle: finding the pieces and putting them together. Lujo Bauer, Adam J. Lee |
| 2010 | StateMiner: an efficient similarity-based approach for optimal mining of role hierarchy. Hassan Takabi, James B. D. Joshi |
| 2010 | Towards analyzing complex operating system access control configurations. Hong Chen, Ninghui Li, Christopher S. Gates, Ziqing Mao |