- Access Controls Part 1: Computer Security Lectures 2014/15 S2
- Access Controls Part 2: Computer Security Lectures 2014/15 S2
- Isolation Sandboxes and Application-oriented Access Controls: Computer Security Lectures 2014/15 S2
- Rule-based Sandboxes and Application-oriented Access Controls: Computer Security Lectures 2014/15 S2