| 2013 | 18th ACM Symposium on Access Control Models and Technologies, SACMAT '13, Amsterdam, The Netherlands, June 12-14, 2013 Mauro Conti, Jaideep Vaidya, Andreas Schaad |
| 2013 | A bigData platform for analytics on access control policies and logs. Suresh Chari, Ted Habeck, Ian M. Molloy, Youngja Park, Wilfried Teiken |
| 2013 | A storage-efficient cryptography-based access control solution for subversion. Dominik Leibenger, Christoph Sorge |
| 2013 | A versatile access control implementation: secure box. Bruno Alves Pereira Botelho, Dennis Guimarães Pelluzi, Emilio Tissato Nakamura |
| 2013 | A white-box policy analysis and its efficient implementation. Jayalakshmi Balasubramaniam, Philip W. L. Fong |
| 2013 | An information flow control meta-model. Dennis G. Kafura, Denis Gracanin |
| 2013 | Beyond accountability: using obligations to reduce risk exposure and deter insider attacks. Nathalie Baracaldo, James Joshi |
| 2013 | Combining social authentication and untrusted clouds for private location sharing. Andrew K. Adams, Adam J. Lee |
| 2013 | Constraint expressions and workflow satisfiability. Jason Crampton, Gregory Z. Gutin |
| 2013 | Content-based information protection and release in NATO operations. Alessandro Armando, Matteo Grasso, Sander Oudkerk, Silvio Ranise, Konrad S. Wrona |
| 2013 | ERBAC: event-driven RBAC. Piero A. Bonatti, Clemente Galdi, Davide Torres |
| 2013 | Enabling intensional access control via preference-aware query optimization. Nicholas L. Farnan, Adam J. Lee, Panos K. Chrysanthis, Ting Yu |
| 2013 | Ensuring continuous compliance through reconciling policy with usage. Suresh Chari, Ian M. Molloy, Youngja Park, Wilfried Teiken |
| 2013 | Evolving role definitions through permission invocation patterns. Wen Zhang, You Chen, Carl A. Gunter, David M. Liebovitz, Bradley A. Malin |
| 2013 | Heuristic safety analysis of access control models. Peter Amthor, Winfried E. Kühnhauser, Anja Pölck |
| 2013 | HyXAC: a hybrid approach for XML access control. Manogna Thimma, Tsam Kai Tsui, Bo Luo |
| 2013 | Information flow control for stream processing in clouds. Xing Xie, Indrakshi Ray, Raman Adaikkalavan, Rose F. Gamble |
| 2013 | Least-restrictive enforcement of the Chinese wall security policy. Alireza Sharifi, Mahesh V. Tripunitara |
| 2013 | Mobile security and privacy: the quest for the mighty access control. Ahmad-Reza Sadeghi |
| 2013 | On the notion of redundancy in access control policies. Marco Guarnieri, Mario Arrigoni Neri, Eros Magri, Simone Mutti |
| 2013 | Panel on granularity in access control. Ian M. Molloy, Mahesh V. Tripunitara, Volkmar Lotz, Martin Kuhlmann, Casey Schaufler, Vijay Atluri |
| 2013 | Permission path analysis based on access intelligence. Detlef Sturm, Axel Kern |
| 2013 | Privacy promises that can be kept: a policy analysis method with application to the HIPAA privacy rule. Omar Chowdhury, Andreas Gampe, Jianwei Niu, Jeffery von Ronne, Jared Bennatt, Anupam Datta, Limin Jia, William H. Winsborough |
| 2013 | Private data warehouse queries. Xun Yi, Russell Paulet, Elisa Bertino, Guandong Xu |
| 2013 | Property-testing real-world authorization systems. Alireza Sharifi, Paul Bottinelli, Mahesh V. Tripunitara |
| 2013 | RMiner: a tool set for role mining. Ruixuan Li, Huaqing Li, Wei Wang, Xiaopu Ma, Xiwu Gu |
| 2013 | Searching over encrypted data in cloud systems. Florian Kerschbaum |
| 2013 | Secure benchmarking in the cloud. Axel Schröpfer, Andreas Schaad, Florian Kerschbaum, Heiko Boehm, Joerg Jooss |
| 2013 | Specification and analysis of access control policies for mobile applications. Ramadan Abdunabi, Indrakshi Ray, Robert B. France |
| 2013 | Sticky policies for mobile devices. Francesco Di Cerbo, Slim Trabelsi, Thomas Steingruber, Gabriella Dodero, Michele Bezzi |
| 2013 | User-centric management of distributed credential repositories: balancing availability and vulnerability. Jens Köhler, Jens Mittag, Hannes Hartenstein |