| 1989 | A model of security monitoring. Matt Bishop |
| 1989 | A perspective on integrity mechanisms. Ravi S. Sandhu |
| 1989 | A risk driven process model for the development of trusted systems. Ann B. Marmor-Squires, John McHugh, Martha A. Branstad, Bonnie P. Danner, Lou Nagy, Pat Rougeau, Daniel F. Sterne |
| 1989 | A security standard for LANs. Kimberly E. Kirkpatrick |
| 1989 | A structured risk analysis approach to resolve the data protection and integrity issues for computer-aided acquisition logistics support (CALS). R. A. Gove, Arthur R. Friedman |
| 1989 | A summary of the LDV solution to the homework problem. Paul D. Stachour, Dan J. Thomsen |
| 1989 | A summary of the Unisys experience with GEMSOS. Doug Paul |
| 1989 | A survey of commercially available secure LAN products. Greg King |
| 1989 | ADP security within the Customs Service. William Green |
| 1989 | Access control by Boolean expression evaluation. Donald V. Miller, Robert W. Baldwin |
| 1989 | An approach for evaluating the security of an Air Force type network. Nancy K. Woodfield |
| 1989 | An extended cryptographic key generation scheme for multilevel data security. Lein Harn, Yaw-Ruey Chien, Thomas Kiesler |
| 1989 | Applying the TNI to system certification and accreditation. Robert E. Niemeyer |
| 1989 | Architectural support of fine-grained secure computing. James O. Bondi, Martha A. Branstad |
| 1989 | Assessment of security requirements for sensitive systems. Nander Brown |
| 1989 | Auditing: a relevant contribution to trusted database management systems. Marvin Schaefer, Brian Hubbard, Daniel F. Sterne, Theresa K. Haley, J. Noelle McAuliffe, Dawn Wolcott |
| 1989 | Challenges faced today by computer security practitioners. Lloyd F. Reese |
| 1989 | Chinese wall security policy-an aggressive model. Tsau Young Lin |
| 1989 | Computer security and air traffic automation. Steven D. Smith |
| 1989 | Considerations on TCB subsetting. Helena B. Winkler-Parenty |
| 1989 | Data protection requirements in computer-aided acquisition and logistic support. William C. Gorham Jr. |
| 1989 | Designing a trusted client-server distributed network. Sammy Migues, Russell Housley |
| 1989 | Developing trusted systems using DOD-STD-2167A. Terry C. Vickers Benzel |
| 1989 | Development of a multi level data generation application for GEMSOS. E. R. Schallenmüller, Rich P. Cramer, Bruce Aldridge |
| 1989 | Does TCB subsetting enhance trust? Richard J. Feiertag |
| 1989 | Electronic information security in a digital environment. Ruth M. Davis |
| 1989 | Electronic messaging security: a comparison of three approaches. Russell Housley |
| 1989 | End-to-end encryption at the network layer. Ruth R. Nelson |
| 1989 | Evaluation issues for an integrated 'INFOSEC' product. Frank L. Mayer, William Curtis Barker, Theresa K. Haley, J. Noelle McAuliffe, Daniel F. Sterne, Lynne S. Vidmar |
| 1989 | Fifth Annual Computer Security Applications Conference, ACSAC 1989, 4-8 December, 1989, Westward Look Resort, Tucson, Arizona, USA |
| 1989 | Gemini developers: facts, myths, and war stories. Dan Gambel |
| 1989 | Human issues. Steven J. Reynolds, T. P. Grove Jr., John N. Parringin |
| 1989 | Implementing sensitive but unclassified security, today-a workshop proposal. Rolf Lang |
| 1989 | Integrity panel position paper. Howard L. Johnson |
| 1989 | Intrusion and anomaly detection in trusted systems. J. R. Winkler, W. J. Page |
| 1989 | Issues in distributed database security. Alan R. Downing, Ira B. Greenberg, Teresa F. Lunt |
| 1989 | Multi-party conflict: the problem and its solutions. Thomas F. Keefe, Dan Thomsen, Wei-Tek Tsai, M. R. Hansch |
| 1989 | Multilevel secure database design: a practical application. Gary W. Smith |
| 1989 | Network authentication tokens. Russell J. Davis |
| 1989 | Process execution controls as a mechanism to ensure consistency. Eugen M. Bacic |
| 1989 | Protection of call detail records data in federal telecommunications. Santosh Chokhani |
| 1989 | RADC database security workshop oracle corporation homework problem solution. Bill Maimone |
| 1989 | Report from the second RADC database security workshop. Teresa F. Lunt |
| 1989 | Secure automated document delivery. Tom Casey, Michael Roe, Bill Tuck, Steve R. Wilbur |
| 1989 | Secure database design panel. Thomas H. Hinke |
| 1989 | Secure database design: an implementation using a secure DBMS. Edward D. Sturms |
| 1989 | Secure query processing in intelligent database management systems. Bhavani M. Thuraisingham |
| 1989 | Security approach for rapid prototyping in multilevel secure systems. Victoria Ashby, Thomas Gregg, Annabelle Lee |
| 1989 | Security audit for embedded avionics systems. K. N. Rao |
| 1989 | Security issues and Ada runtime support. Linda J. Harrison |
| 1989 | Security model consistency in secure object-oriented systems. Thomas F. Keefe, Wei-Tek Tsai |
| 1989 | Security model development environment. Jody Heaney, Marc Adkins, Gary Dolsen, John Page |
| 1989 | Security standards for open systems. Edward Humphreys, Warwick Ford, M. Stirland, Thomas Parker |
| 1989 | Software methodology for development of a trusted BMS: identification of critical problems. Stephen D. Crocker, Emilie J. Siarkiewicz |
| 1989 | TCB subset architecture. Linda L. Vetter |
| 1989 | TCB subsets: the next step. Linda L. Vetter, Gordon Smith, Teresa F. Lunt |
| 1989 | The CALS Data Protection and Integrity Industry Working Group. Bennett C. Karp |
| 1989 | The role of vulnerability in risk management. Ken Otwell, Bruce Aldridge |
| 1989 | The security policy of the secure distributed operating system prototype. Norman Proctor, Raymond Wong |
| 1989 | The trusted server approach to multilevel security. Thomas H. Hinke |
| 1989 | Two new efficient cryptosystems based on Rabin's scheme: alternatives to RSA cryptosystem. Lein Harn, Thomas Kiesler |
| 1989 | Use of privacy-enhanced mail for software distribution. William Curtis Barker |