| 1990 | A brief comparison of two different environmental guidelines for determining 'levels of trust' [computer security]. Frank L. Mayer |
| 1990 | A comparison of secure UNIX operating systems. Raymond M. Wong |
| 1990 | A comparison of type enforcement and Unix setuid implementation of well-formed transactions. Dan J. Thomsen, J. Thomas Haigh |
| 1990 | A multilevel security model for a distributed object-oriented system. Vijay Varadharajan, Stewart Black |
| 1990 | A multilevel-mode system for space applications: lessons learned. Deborah J. Bodeau, Mary Jo Reece |
| 1990 | A prototype for Trusted X labeling policies. Jeremy Epstein |
| 1990 | A security analysis of the NTP protocol version 2. Matt Bishop |
| 1990 | A solution to the cascade problem for dynamic network. Eric S. Maiwald |
| 1990 | An advanced process model's application to trusted X Window system development. Bonnie P. Danner, Ann B. Marmor-Squires |
| 1990 | An authorization plan for commercial service systems. Che-Fn Yu |
| 1990 | An evaluation system for the physical security of computing systems. Steve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double |
| 1990 | An example application of the trusted network interpretation. Patrick W. Mallett |
| 1990 | An n-grid model for group authorization. Wen-Gong Shieh, Bob P. Weems, Krishna M. Kavi |
| 1990 | Architecture for an embedded secure data base management system. Cynthia E. Irvine, Roger R. Schell, Linda L. Vetter |
| 1990 | CERTS: a comparative evaluation method for risk management methodologies and tools. William M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel |
| 1990 | Entropy as a measure of database information. Elizabeth A. Unger, Lein Harn, Vijay Kumar |
| 1990 | Extending the creation operation in the Schematic Protection Model. Paul Ammann, Ravi S. Sandhu |
| 1990 | Formal specification and verification of control software for cryptographic equipment. D. Richard Kuhn, James F. Dray |
| 1990 | Hierarchical group oriented key management method HGK. Hidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita |
| 1990 | ICCP Systems Security specialty exam. Robert T. Vitter |
| 1990 | IDES: a progress report [Intrusion-Detection Expert System]. Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali |
| 1990 | Informal top-level specifications for trusted application systems. John P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes |
| 1990 | Integrating cryptography in the trusted computing base. Michael Roe, Tom Casey |
| 1990 | Is your computer being misused? A survey of current intrusion detection system technology. J. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley |
| 1990 | MLS and trust issues at the user interface in MLS AISs. William Wilson, Joel Sachs, David Wichers, Peter K. Boucher |
| 1990 | Model of access control policy for civil agencies. Kristina C. Rogers |
| 1990 | Multilevel security for knowledge based systems. Thomas D. Garvey, Teresa F. Lunt |
| 1990 | Natural change in dynamic databases as a deterrent to compromise by trackers. Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly |
| 1990 | Network management security. R. Ward, P. Skeffington |
| 1990 | ODA and POSIX: label liaisons. Kevin V. Murphy, Gunnar Soberg |
| 1990 | On models for a trusted application system. Christian N. Payne, Judith N. Froscher, John P. McDermott |
| 1990 | Probabilistic measure on aggregations [data security]. Tsau Young Lin |
| 1990 | Process Execution Controls: revisited. Eugen M. Bacic |
| 1990 | Professional certification for computer security professionals. Lynn McNulty |
| 1990 | Professional certification for security practitioners. Hal Tipton |
| 1990 | Rehosting existing command and control systems into a multilevel secure environment. Samuel Doncaster, Michael Endsley, Greg Factor |
| 1990 | Secure query processing in distributed database management systems-design and performance studies. Bhavani Thuraisingham, Ammiel Kamon |
| 1990 | Security pipeline interface (SPI). Lance J. Hoffman, Russell J. Davis |
| 1990 | Single-level multiversion schedulers for multilevel secure database systems. William T. Maimone, Ira B. Greenberg |
| 1990 | Sixth Annual Computer Security Applications Conference, ACSAC 1990, 3-7 December, 1990, Tucson, Arizona, USA |
| 1990 | Software checking with the Auditor's Aid. Russell J. Davis |
| 1990 | Software safety and security. Archibald McKinlay |
| 1990 | Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby). Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes |
| 1990 | The Canadian trusted computer product evaluation criteria. Eugen M. Bacic |
| 1990 | The lowdown on lower layer security protocols. Paul A. Lambert |
| 1990 | Update semantics for multilevel relations. Sushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley |