| 2015 | A Logic of Trust for Reasoning about Delegation and Revocation. Marcos Cramer, Diego Agustín Ambrossio, Pieter Van Hertum |
| 2015 | A Logical Approach to Restricting Access in Online Social Networks. Marcos Cramer, Jun Pang, Yang Zhang |
| 2015 | A Prototype to Reduce the Amount of Accessible Information. Rainer Fischer |
| 2015 | A SMT-based Tool for the Analysis and Enforcement of NATO Content-based Protection and Release Policies. Alessandro Armando, Silvio Ranise, Riccardo Traverso, Konrad S. Wrona |
| 2015 | Automated Inference of Access Control Policies for Web Applications. Ha-Thanh Le, Cu Duy Nguyen, Lionel C. Briand, Benjamin Hourte |
| 2015 | Challenges in Making Access Control Sensitive to the "Right" Contexts. Trent Jaeger |
| 2015 | Commune: Shared Ownership in an Agnostic Cloud. Claudio Soriente, Ghassan O. Karame, Hubert Ritzdorf, Srdjan Marinovic, Srdjan Capkun |
| 2015 | Federated Access Management for Collaborative Network Environments: Framework and Case Study. Carlos E. Rubio-Medrano, Ziming Zhao, Adam Doupé, Gail-Joon Ahn |
| 2015 | Fine-Grained Business Data Confidentiality Control in Cross-Organizational Tracking. Weili Han, Yin Zhang, Zeqing Guo, Elisa Bertino |
| 2015 | Generating Secure Images for CAPTCHAs through Noise Addition. David Lorenzi, Pratik Chattopadhyay, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri |
| 2015 | Hard Instances for Verification Problems in Access Control. Nima Mousavi, Mahesh V. Tripunitara |
| 2015 | Initial Encryption of large Searchable Data Sets using Hadoop. Feng Wang, Mathias Kohler, Andreas Schaad |
| 2015 | Mitigating Access Control Vulnerabilities through Interactive Static Analysis. Jun Zhu, Bill Chu, Heather Richter Lipford, Tyler Thomas |
| 2015 | Mitigating Multi-Tenancy Risks in IaaS Cloud Through Constraints-Driven Virtual Resource Scheduling. Khalid Zaman Bijon, Ram Krishnan, Ravi S. Sandhu |
| 2015 | Mohawk+T: Efficient Analysis of Administrative Temporal Role-Based Access Control (ATRBAC) Policies. Jonathan Shahen, Jianwei Niu, Mahesh V. Tripunitara |
| 2015 | On Missing Attributes in Access Control: Non-deterministic and Probabilistic Attribute Retrieval. Jason Crampton, Charles Morisset, Nicola Zannone |
| 2015 | Post-Snowden Threat Models. Bart Preneel |
| 2015 | Preventing Information Inference in Access Control. Federica Paci, Nicola Zannone |
| 2015 | Privacy and Access Control: How are These Two concepts Related? Anna Cinzia Squicciarini, Ting Yu |
| 2015 | Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, Vienna, Austria, June 1-3, 2015 Edgar R. Weippl, Florian Kerschbaum, Adam J. Lee |
| 2015 | Relationship-Based Access Control for an Open-Source Medical Records System. Syed Zain R. Rizvi, Philip W. L. Fong, Jason Crampton, James Sellwood |
| 2015 | SPA: Inviting Your Friends to Help Set Android Apps. Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Ruiqi Bu, Minyue Ni |
| 2015 | SecLoc: Securing Location-Sensitive Storage in the Cloud. Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Shuang Liang, Chunfu Jia |
| 2015 | Towards Attribute-Based Authorisation for Bidirectional Programming. Lionel Montrieux, Zhenjiang Hu |
| 2015 | Towards a General Framework for Optimal Role Mining: A Constraint Satisfaction Approach. Jafar Haadi Jafarian, Hassan Takabi, Hakim Touati, Ehsan Hesamifard, Mohamed Shehab |
| 2015 | Towards an Automatic Top-down Role Engineering Approach Using Natural Language Processing Techniques. Masoud Narouei, Hassan Takabi |
| 2015 | Valued Workflow Satisfiability Problem. Jason Crampton, Gregory Z. Gutin, Daniel Karapetyan |