<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
<url>
<loc>https://sefcom.asu.edu/T0.html</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/archiveooo_study.html</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/contact.html</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/ghidra-amp-achievements</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/people.html</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/publications.html</loc>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/10-years-ictf-3gse2014.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/CAaaS-usenix21.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/CoC-SoK-tps2024.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/Dypoldroid_IF2023.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/MuTent-Dynamic-Android-Intent-Protection-HICSS2021.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/Policy-driven-security-management-iri2014.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/Role-based-cryptosystem-IFS2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/Secure-Distributed-Ledger(EVE)-Blockchain-AE2021.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/Simulacrum-usenix-2022.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/a-game-theoretic-approach-in-strategy-generation-for-mtd-aamas2017.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/access-control-collaborative-computing2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/access-control-iaas-passat2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/access-control-online-security2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/achieving-security-assurance-collaboratecom2014.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/achieving-security-assurance-eai2015.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/active-automation-ditscap-springer2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/aim-sdn-attacking-ccs2018.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/analyzing-managing-role-tkde2008.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/anomaly-discovery-resolution-sacmat2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/application-directory-service-csac2002.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ar-abac-new-attribute-based-access-control-model-cic2015.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/arbiter-usenix22.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/articulating-enforcing-authoisation-sess2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/assured-resource-sharing-ics2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/authorization-framework-resource-gdc2009.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/authorization-management-role-smc2003.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/automatic-extraction-secrets-wcre2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/behind-closed-doors-ecrime2016.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/beyond-user-access-icics2008.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/beyondphish-oakland23.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/bintrimmer-dimva2019.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/black-box-scanners-dimva2010.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/blacksheep-detecting-compromised-hosts-in-homogeneous-crowds-ccs2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/boomerang-ndss2017.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/bootkeeper-2019.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/bootstomp-on-the-security-of-bootloaders-in-mobile-usenix2017.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/building-problem-domain-sess2006.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/cachelight-ashes18.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/certification-process-artifacts-ipjws2006.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/challenges-and-preparedness-of-sdn-based-firewalls-codaspy2018.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/challenges-multi-enterprise-ifip2002.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/checking-intent-based-communication-asiaccs2016.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/clears-cic2025.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/collaboration-multi-cloud-computer2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/collaborative%20-integrity-verification-collaboratecom2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/collaborative-framework-privacy-collaborate2010.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/collecting-analyzing-bots-isse2007.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/collegiate-cyber-game-icis2007.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/common-criteria-requirements-acmse2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/comparison-based-encryption-codaspy2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/comprehensive-two-level-elsevier2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/constrained-role-based-ifip2003.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/constructing-authorization-systems-tsmc2010.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/context-environmental-aware-cirp2003.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/conuga-constrained-user-nca2001.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/cooperative-provable-data-tpds2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/crawlphish-oakland21.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/cryptographic-role-based-asiaccs2010.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/danger-missing-instructions-chase2018.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dbling-Identifying-extensions-dfrws2016.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/de-obfuscation-and-detection-of-malicious-pdf-files-with-high-accuracy-hicss2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/decentralized-group-hierarchies-nissc1998.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/decentralized-user-group-elsevier2001.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dedacota-ccs2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/deep-android-malware-detection-codaspy2017.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/defeating-internet-attacks-iwia2004.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/design-implementation-access-science2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/detecting-and-resolving-acsac2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/detecting-resolving-firewall-tdsc2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dex-mon-access18.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/difuze-interface-aware-fuzzing-for-kernel-drivers-ccs2017.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/discovering-analyzing-deviant-col2014.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/discovery-resolution-anomalies-tdsc2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/do-you-feel-lucky-sac2014.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dojo-sigcse24.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/draft-efficient-remote-esorics2010.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/driller-augmenting-fuzzing-through-selective-symbolic-execution-ndss2016.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dynamic-audit-services-sac2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dynamic-audit-services-tsc2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dynamic-audit-services-tsc2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/dynamic-risk-aware-sacmat2003.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ears-in-the-wild-sac2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/edsguard-enforcing-requirements-smartgridcomm2018.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/efficient-audit-service-elsevier2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enabling-collaborative-data-globecom2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enabling-role-based-iscc2007.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enabling-verification-conformance-sacmat2008.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enemy-of-the-state-usenix2012.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enforcing-role-based-acsac2008.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/enforcing-space-sensitive-sacmat2019.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/engineering-information-assurance-incose2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ensuring-information-assurance-ipccc2004.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/establishing-trustworthiness-services-sess2005.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/everyone-different-client-side-diversification-2019.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/examining-social-dynamics-globecom2011.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/exsol-collaborately-assessing-mscpes2019.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/extensible-policy-framework-ics2013.pdf</loc>
<lastmod>2026-05-12T20:44:18+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/fame-firewall-anomaly-safeconfig2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/favocado-ndss21.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/fear-the-ear-ccs2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/federated-access-management-sacmat2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/firmalice-automatic-detection-of-authentication-bypass-vulnerabilities-ndss15.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/flakjack-ccs24.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/flowguard-building-robust-hotsdn2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/formail-specification-role-sac2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/formal-specification-role-sac2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/framework-enabling-user-compsac2009.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/frankenstein-sp2025.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/game-theoretic-analysis-sacmat2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/going-native-ndss2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/goldenhour_usenix_2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/group-hierarchies-constrained-iceis2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/group-hierarchies-decentralized-se1998.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/heaphopper-usenix2018.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/hit-em-where-it-hurts-acsac2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/honeyPLC-next-generation-ccs2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/honeymix-toward-honeynet-sdnnfvsec2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/honeyproxy-design-and-implementation-of-next-generation-honeynet-cns2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/how-shall-we-play-a-game-csf2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/how-the-elf-ruined-christmas-usenix2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/icore-sac2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/information-assurance-federated-spinger2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/information-flow-control-collaboratecom2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/injecting-rbac-secure-acm2000.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/inside-a-phishers-mind-ecrime2018.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/interactive-exploration-large-spie2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/intrusion-detection-force-iwia2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/jaejong-dsn23.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/jaejong-sactmat23.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/karonte-oakland2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/large-scale-study-of-mobile-web-app-security-most2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/leak-kptr-woot20.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/locale-based-access-smc2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/lpm-layered-policy-dbsec2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/managing-heterogeneous-network-asiaccs2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/managing-privacy-preferences-dim2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/mango-usenix24.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/masterblaster-identifying-influential-compsac2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/matched-and-mismatched-socs-ccs2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/mechanical-phish-2018.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/model-based-conformance-iwsec2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/modeling-system-centric-sacmat2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/morpheus-acsac2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/moving-target-defense-web-applications-using-bayesian-aamas2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/mules-seals-and-attacking-tools-ieee2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/multiparty-access-control-tkde2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/multiparty-authorization-framework-dbsec2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/mutated-policies-towards-mtd2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/on-the-safety-and-efficiency-of-virtual-firewall-elasticity-control-ndss2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/onlyfans-creators-usenix24.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ontoeds-protecting-eds-cic2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ontology-based-policy-collaboratecom2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ontology-based-risk-communications2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/patient-centric-authorization-elsevier2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/patient-centric-authorization-sacmat2009.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/pemu-ccs2025.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/pexy-the-other-side-of-exploit-kits-dimva2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/phishfarm-oakland2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/phishtime_usenix_2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/picture-gesture-authentication-tissec2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/piston-uncooperative-remote-runtime-patching-acsac2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/policy-driven-access-pim2006.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/policy-driven-role-security2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/portable-user-centric-sec2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/portrait-of-privacy-invasion-pets2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/prime+count-acsac18.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/privacy-enhanced-user-communications2009.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/protecting-web-based-single-sign-on-protocols-against-relying-party-impersonation-attacks-raid2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/provably-secure-role-springer2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/pwn-sigcse24.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/radsim-sp2025.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/ramblr-making-reassembly-great-again-ndss2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rbac-web-using-das2001.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/reasoning-xacml-policy-nmr2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/reconstructing-formal-security-elsevier2002.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/remote-attestation-domain-tdsc2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/representing-reasoning-web-compsac2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rept-osdi18.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/responsible-disclosure-tay-ieee2026.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/revolver:detection-of-evasive-web-based-malware-usenix2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rise-of-the-hacrs-ccs2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rise-of-the-hacrs-css2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/risk-aware-mitigation-tdsc2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/risk-aware-response-globecom2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/risk-evaluation-personal-er2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/riskmon-continuous-automated-codaspy2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/riskpol-assessing-risks-sacmat2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/riskpol-risk-management-abac2018.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-access-elsevier2000.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-access-sacmat2006.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-authorization-sac2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-authorization-tissec2000.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-authorization-wetice2001.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-cryptosystem-tifs2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-delegation-sacmat2002.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-eam-das2002.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-infrastructure-ccpe2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-privilege-engineering2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-based-privilege-springer2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/role-control-center-sacmat2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rsl99-language-role-acm1999.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rule-based-framework-sacmat2001.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/rule-based-framework-tissec2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sbxbrk-ccs2025.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/scam-pandemic-ecrime2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sdnsoc-object-oriented-sdn-nfvsec2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secore-codaspy2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secure-attribute-services-tissec2000.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secure-collaborative-integrity-cis2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secure-efficient-constructions-globecom2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secure-information-sharing-elsevier2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/secure-information-sharing-itcc2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/securecloud-towards-comprehensive-compsac2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-enhanced-osgi-tsmc2009.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-picture-gesture-security2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-privacy-challenges-privacy2010.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-privacy-social-ic2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-requirements-driven-reis2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/security-review-process-oakland22.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sensai-sigcse25.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/shell-we-play-a-game-ctf-as-a-service-for-security-education-usenix2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/simulation-based-validation-aisc2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/simulation-based-validation-iri2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sleak-acsac2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/smokebomb-mobisys20.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/socialimpact-systematic-analysis-esorics2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sok-a-survey-of-techniques-against-telephony-spam-oakland2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/sok-the-art-of-war-offensive-techniques-in-binary-analysis-oakland2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/specification-classification-role-wetice2003.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/specification-validation-authorisation-esorics2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/state-aware-sdn-sacmat2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/steal-this-movie-automatically-bypassing-drm-protection-usenix2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/supporting-access-control-southeast2005.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/supporting-secure-collaborations-collaboratecom2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/systematic-policy-analysis-policy2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/target-fragmentation-in-android-apps-most2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/taveren-ndss2026.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/tfuzz-oakland2018.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/tortoise-ndss-2020.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/toward-access-control-collaboratecom2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/toward-authenticated-caller-id-transmission-comsoc2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/toward-authenticated-caller-id-transmission-itu2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-automated-risk-tdsc2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-automated-threat-intelligence-fusion-cic2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-collaborative-forensics-iri2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-collaborative-forensics-iri2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-comprehensive-collaborative-collaboratecom2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-effective-security-policy2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-effective-verification-sacmat2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-hipaa-compliant-cmam-2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-hippa-compliant-ihi2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-mtd-abac-abac2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-practical-framework-iri2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-realizing-formal-sacmat2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-reliable-sdn-ons2014.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-role-based-ftdcs2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-role-based-nca1999.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-scalable-authentication-wetice2002.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-secure-information-collaboratecom2006.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-specification-access-ias2004.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-system-integrity-das2009.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-temporal-access-infocom2012.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/towards-trust-aware-collaboratecom2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/triplemon-multi-layer-security-framework-jcs2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/trustzone-explained-cic2016.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/uml-based-representation-wetice2000.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/understanding-and-detecting-private-interactions-in-underground-forums-codaspy2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/usenixsecurity23-tay-greenhouse.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/user-centric-privacy-collaboratecom2007.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/users-really-do-answer-phone-scams-usenix2019.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/using-instruction-sequence-cns2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/utilizing-network-science-hicss2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/varbert-oakland24.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/verifying-access-control-compsac2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/visualization-based-policy-sacmat2008.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/visualization-based-policy-security2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/vnguard-nfvsdn-combination-framework-nfvsdn2015.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/wi_not_calling-acsac18.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/witcher-oakland2023.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/writing-groups-in-computer-science-research-labs-fie2013.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/your-exploit-is-mine-oakland2017.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
<url>
<loc>https://sefcom.asu.edu/publications/zero-knowledge-proofs-springer2011.pdf</loc>
<lastmod>2026-05-12T20:44:19+00:00</lastmod>
</url>
</urlset>
