| 1991 | A distributed implementation of the extended schematic protection model. Paul Ammann, Ravi S. Sandhu, Gurpreet S. Suri |
| 1991 | A multilevel secure relational data model based on views. Günther Pernul, Gottfried Luef |
| 1991 | A prototype B3 trusted X Window System. Jeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad |
| 1991 | A single-level scheduler for the replicated architecture for multilevel-secure databases. John P. McDermott, Sushil Jajodia, Ravi S. Sandhu |
| 1991 | An audit model for object-oriented databases. Boris Y. Kogan, Sushil Jajodia |
| 1991 | An implementation of access control using a salient feature of primes. Dale A. Moir |
| 1991 | Complete containment sets and their application to the inference problem. Bob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin |
| 1991 | Considerations for applying disk encryptors to environments subject to hostile overrun. Patrick W. Mallet |
| 1991 | Domain reduction dependencies: A new type of dependency for statistical database security. S. C. Hansen, Elizabeth A. Unger |
| 1991 | Fielding multilevel security into command and control systems. Daniel Galik, Brian Tretick |
| 1991 | High level prevention of traffic analysis. Richard E. Newman-Wolfe, Balaji R. Venkatraman |
| 1991 | Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluation. Joseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu |
| 1991 | Network auditing: issues and recommendations. Samuel I. Schaen, Brian W. McKenney |
| 1991 | Observations on integrating multilevel secure components into system high distributed systems. Robert E. Niemeyer, V. A. Ashby |
| 1991 | Proposed security for critical Air Force missions. Howard L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce |
| 1991 | Real-time anomaly detection using a nonparametric pattern recognition approach. Linda B. Lankewicz, Mark Benard |
| 1991 | Rebus passwords. Maria M. King |
| 1991 | Security considerations in the acquisition of computer systems. Charles R. Pierce |
| 1991 | Security constraint processing during the update operation in a multilevel secure database management system. Marie Collins, William R. Ford, Bhavani Thuraisingham |
| 1991 | Security modelling using hierarchical state machines. John P. Nestor |
| 1991 | Seventh Annual Computer Security Applications Conference, ACSAC 1991, 2-6 December, 1991, San Antonio, Texas, USA |
| 1991 | To Bell and back: developing a formal security policy model for a C R. A. Gove, Lisa M. Jaworski, John G. Williams |
| 1991 | Towards trusted cut and paste in the X Window System. Jeffrey Picciotto |
| 1991 | Using polyinstantiation to develop an MLS application. Doug Nelson, Chip Paradise |
| 1991 | Verification of the security of a secure network component. Edward A. Schneider |