| 2011 | 16th ACM Symposium on Access Control Models and Technologies, SACMAT 2011, Innsbruck, Austria, June 15-17, 2011, Proceedings Ruth Breu, Jason Crampton, Jorge Lobo |
| 2011 | A decade of model-driven security. David A. Basin, Manuel Clavel, Marina Egea |
| 2011 | Access control for a federated police information system. Matthew Hudnall, Maury Mitchell, Allen S. Parrish |
| 2011 | An approach to modular and testable security models of real-world health-care applications. Achim D. Brucker, Lukas Brügger, Paul J. Kearney, Burkhart Wolff |
| 2011 | An authorization scheme for version control systems. Sitaram Chamarty, Hiren D. Patel, Mahesh V. Tripunitara |
| 2011 | An integrated approach for identity and access management in a SOA context. Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, Uwe Zdun, Schahram Dustdar |
| 2011 | Anomaly discovery and resolution in web access control policies. Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni |
| 2011 | Data leakage mitigation for discretionary access control in collaboration clouds. Qihua Wang, Hongxia Jin |
| 2011 | Data-centric multi-layer usage control enforcement: a social network example. Enrico Lovat, Alexander Pretschner |
| 2011 | Deriving role engineering artifacts from business processes and scenario models. Anne Baumgrass, Mark Strembeck, Stefanie Rinderle-Ma |
| 2011 | Modeling data flow in socio-information networks: a risk estimation approach. Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu |
| 2011 | On the management of user obligations. Murillo Pontual, Omar Chowdhury, William H. Winsborough, Ting Yu, Keith Irwin |
| 2011 | Program synthesis in administration of higher-order permissions. Glenn Bruns, Michael Huth, Kumar Avijit |
| 2011 | Relationship-based access control policies and their policy languages. Philip W. L. Fong, Ida Sri Rejeki Siahaan |
| 2011 | Rumpole: a flexible break-glass access control model. Srdjan Marinovic, Robert Craven, Jiefei Ma, Naranker Dulay |
| 2011 | SEAL: a logic programming framework for specifying and verifying access control models. Prasad Naldurg, K. R. Raghavendra |
| 2011 | Security validation tool for business processes. Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
| 2011 | System for automatic estimation of data sensitivity with applications to access control and other applications. Youngja Park, Stephen C. Gates, Wilfried Teiken, Suresh Chari |
| 2011 | Transforming provenance using redaction. Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2011 | Usable access control for all. Robert W. Reeder |
| 2011 | Validation of security policies by the animation of Z specifications. Yves Ledru, Nafees Qamar, Akram Idani, Jean-Luc Richier, Mohamed-Amine Labiadh |
| 2011 | Visualizing security in business processes. Ganna Monakova, Andreas Schaad |
| 2011 | xDAuth: a scalable and lightweight framework for cross domain access control and delegation. Masoom Alam, Xinwen Zhang, Kamran Khan, Gohar Ali |
| 2011 | xfACL: an extensible functional language for access control. Qun Ni, Elisa Bertino |