| 2012 | 17th ACM Symposium on Access Control Models and Technologies, SACMAT '12, Newark, NJ, USA - June 20 - 22, 2012 Vijay Atluri, Jaideep Vaidya, Axel Kern, Murat Kantarcioglu |
| 2012 | A calculus for privacy-friendly authentication. Patrik Bichsel, Jan Camenisch, Dieter Sommer |
| 2012 | A cloud-based RDF policy engine for assured information sharing. Tyrone Cadenhead, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2012 | A framework for verification and optimal reconfiguration of event-driven role based access control policies. Basit Shafiq, Jaideep Vaidya, Arif Ghafoor, Elisa Bertino |
| 2012 | A framework integrating attribute-based policies into role-based access control. Jingwei Huang, David M. Nicol, Rakesh Bobba, Jun Ho Huh |
| 2012 | A model-based approach to automated testing of access control policies. Dianxiang Xu, Lijo Thomas, Michael Kent, Tejeddine Mouelhi, Yves Le Traon |
| 2012 | A trust-and-risk aware RBAC framework: tackling insider threat. Nathalie Baracaldo, James Joshi |
| 2012 | Access control for RDF graphs using abstract models. Vassilis Papakonstantinou, Maria Michou, Irini Fundulaki, Giorgos Flouris, Grigoris Antoniou |
| 2012 | Algorithms for mining meaningful roles. Zhongyuan Xu, Scott D. Stoller |
| 2012 | Analyzing temporal role based access control models. Emre Uzun, Vijayalakshmi Atluri, Shamik Sural, Jaideep Vaidya, Gennaro Parlato, Anna Lisa Ferrara, Parthasarathy Madhusudan |
| 2012 | Android permissions: a perspective combining risks and benefits. Bhaskar Pratim Sarma, Ninghui Li, Christopher S. Gates, Rahul Potharaju, Cristina Nita-Rotaru, Ian M. Molloy |
| 2012 | Automating architectural security analysis. Andreas Schaad, Alexandr Garaga |
| 2012 | Efficient privacy preserving content based publish subscribe systems. Mohamed Nabeel, Ning Shang, Elisa Bertino |
| 2012 | Emerging trends around big data analytics and security: panel. Rafae Bhatti, Ryan LaSalle, Rob Bird, Tim Grance, Elisa Bertino |
| 2012 | Encryption-enforced access control for an RFID discovery service. Florian Kerschbaum, Leonardo Weiss Ferreira Chaves |
| 2012 | Ensuring authorization privileges for cascading user obligations. Omar Chowdhury, Murillo Pontual, William H. Winsborough, Ting Yu, Keith Irwin, Jianwei Niu |
| 2012 | Fine-grained access control of personal data. Ting Wang, Mudhakar Srivatsa, Ling Liu |
| 2012 | Generative models for access control policies: applications to role mining over logs with attribution. Ian M. Molloy, Youngja Park, Suresh Chari |
| 2012 | Graph-based XACML evaluation. Santiago Pina Ros, Mario Lischka, Félix Gómez Mármol |
| 2012 | Hardware-enhanced access control for cloud computing. Ruby B. Lee |
| 2012 | MOSES: supporting operation modes on smartphones. Giovanni Russello, Mauro Conti, Bruno Crispo, Earlence Fernandes |
| 2012 | Optimal workflow-aware authorizations. David A. Basin, Samuel J. Burri, Günter Karjoth |
| 2012 | PlexC: a policy language for exposure control. Yann Le Gall, Adam J. Lee, Apu Kapadia |
| 2012 | Policy-by-example for online social networks. Gorrell P. Cheek, Mohamed Shehab |
| 2012 | Practical risk aggregation in RBAC models. Suresh Chari, Jorge Lobo, Ian M. Molloy |
| 2012 | SCUTA: a server-side access control system for web applications. Xi Tan, Wenliang Du, Tongbo Luo, Karthick Duraisamy Soundararaj |
| 2012 | SecureBPMN: modeling and enforcing access control requirements in business processes. Achim D. Brucker, Isabelle Hang, Gero Lückemeyer, Raj Ruparel |
| 2012 | The authorization leap from rights to attributes: maturation or chaos? Ravi S. Sandhu |
| 2012 | Towards a policy enforcement infrastructure for distributed usage control. Florian Kelbert, Alexander Pretschner |