| 2014 | 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, London, ON, Canada - June 25 - 27, 2014 Sylvia L. Osborn, Mahesh V. Tripunitara, Ian M. Molloy |
| 2014 | A bodyguard of lies: the use of honey objects in information security. Ari Juels |
| 2014 | A system for risk awareness during role mining. Sharmin Ahmed, Sylvia L. Osborn |
| 2014 | Access control models for geo-social computing systems. Ebrahim Tarameshloo, Philip W. L. Fong |
| 2014 | An access control concept for novel automotive HMI systems. Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer |
| 2014 | An actor-based, application-aware access control evaluation framework. William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs |
| 2014 | Anomaly detection and visualization in generative RBAC models. Maria Leitner, Stefanie Rinderle-Ma |
| 2014 | Attribute based access control for APIs in spring security. Alessandro Armando, Roberto Carbone, Eyasu Getahun Chekole, Silvio Ranise |
| 2014 | Comprehensive integrity protection for desktop linux. Wai-Kit Sze, R. Sekar |
| 2014 | Game theoretic analysis of multiparty access control in online social networks. Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang |
| 2014 | Hardware-enhanced distributed access enforcement for role-based access control. Gedare Bloom, Rahul Simha |
| 2014 | Limiting access to unintentionally leaked sensitive documents using malware signatures. Mordechai Guri, Gabi Kedma, Buky Carmeli, Yuval Elovici |
| 2014 | Monitor placement for large-scale systems. Nirupama Talele, Jason Teutsch, Robert F. Erbacher, Trent Jaeger |
| 2014 | Optimized and controlled provisioning of encrypted outsourced data. Andreas Schaad, Anis Bkakria, Florian Kerschbaum, Frédéric Cuppens, Nora Cuppens-Boulahia, David Gross-Amblard |
| 2014 | Path conditions and principal matching: a new approach to access control. Jason Crampton, James Sellwood |
| 2014 | Policy models to protect resource retrieval. Hayawardh Vijayakumar, Xinyang Ge, Trent Jaeger |
| 2014 | Re-thinking networked privacy, security, identity and access control in our surveillance states. Andrew Clement |
| 2014 | Redaction based RDF access control language. Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2014 | Reduction of access control decisions. Charles Morisset, Nicola Zannone |
| 2014 | Scalable and precise automated analysis of administrative temporal role-based access control. Silvio Ranise, Anh Tuan Truong, Alessandro Armando |
| 2014 | Sorting out role based access control. Wouter Kuijper, Victor Ermolaev |
| 2014 | Towards fine grained RDF access control. Jyothsna Rachapalli, Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham |
| 2014 | Towards more usable information flow policies for contemporary operating systems. Wai-Kit Sze, Bhuvan Mital, R. Sekar |
| 2014 | User-centric identity as a service-architecture for eIDs with selective attribute disclosure. Daniel Slamanig, Klaus Stranacher, Bernd Zwattendorfer |
| 2014 | What are the most important challenges for access control in new computing domains, such as mobile, cloud and cyber-physical systems? Lujo Bauer, Florian Kerschbaum |