| 2016 | A Context-Aware System to Secure Enterprise Content. Oyindamola Oluwatimi, Daniele Midi, Elisa Bertino |
| 2016 | A Framework of Multi-Authority Attribute-Based Encryption with Outsourcing and Revocation. Sherman S. M. Chow |
| 2016 | A Space-Efficient Data Structure for Fast Access Control in ECM Systems. Garfield Zhiping Wu, Frank Wm. Tompa |
| 2016 | An Application Restriction System for Bring-Your-Own-Device Scenarios. Oyindamola Oluwatimi, Elisa Bertino |
| 2016 | An Empirical Study on User Access Control in Online Social Networks. Minyue Ni, Yang Zhang, Weili Han, Jun Pang |
| 2016 | Automated Fault Localization of XACML Policies. Dianxiang Xu, Zhenyu Wang, Shuai Peng, Ning Shen |
| 2016 | Boosting GSHADE Capabilities: New Applications and Security in Malicious Setting. Julien Bringer, Othmane El Omri, Constance Morel, Hervé Chabanne |
| 2016 | Data-Centric Access Control for Cloud Computing. Thomas F. J.-M. Pasquier, Jean Bacon, Jatinder Singh, David M. Eyers |
| 2016 | Detecting Privilege Escalation Attacks through Instrumenting Web Application Source Code. Jun Zhu, Bill Chu, Heather Richter Lipford |
| 2016 | Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks. Hitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang |
| 2016 | Extended ReBAC Administrative Models with Cascading Revocation and Provenance Support. Yuan Cheng, Khalid Zaman Bijon, Ravi S. Sandhu |
| 2016 | Formal Comparison of an Attribute Based Access Control Language for RESTful Services with XACML. Marc Hüffmeyer, Ulf Schreier |
| 2016 | GemRBAC-DSL: A High-level Specification Language for Role-based Access Control Policies. Ameni Ben Fadhel, Domenico Bianculli, Lionel C. Briand |
| 2016 | Modular Synthesis of Enforcement Mechanisms for the Workflow Satisfiability Problem: Scalability and Reusability. Daniel Ricardo dos Santos, Serena Elisa Ponta, Silvio Ranise |
| 2016 | On Completeness in Languages for Attribute-Based Access Control. Jason Crampton, Conrad Williams |
| 2016 | Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges. Jianwei Niu, Yier Jin, Adam J. Lee, Ravi S. Sandhu, Wenyuan Xu, Xiaoguang Zhang |
| 2016 | Policy Negotiation for Co-owned Resources in Relationship-Based Access Control. Pooya Mehregan, Philip W. L. Fong |
| 2016 | PolyStream: Cryptographically Enforced Access Controls for Outsourced Data Stream Processing. Cory Thoma, Adam J. Lee, Alexandros Labrinidis |
| 2016 | Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, SACMAT 2016, Shanghai, China, June 5-8, 2016 X. Sean Wang, Lujo Bauer, Florian Kerschbaum |
| 2016 | Resiliency Policies in Access Control Revisited. Jason Crampton, Gregory Z. Gutin, Rémi Watrigant |
| 2016 | Start Here: Engineering Scalable Access Control Systems. Aaron Elliott, Scott Knight |
| 2016 | State-aware Network Access Management for Software-Defined Networks. Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng |
| 2016 | Tri-Modularization of Firewall Policies. Haining Chen, Omar Chowdhury, Ninghui Li, Warut Khern-am-nuai, Suresh Chari, Ian M. Molloy, Youngja Park |