| 1992 | A cautionary note on image downgrading. Charles W. Kurak Jr., John McHugh |
| 1992 | A comparison of trusted X security policies, architectures, and interoperability. Jeffrey Picciotto, Jeremy Epstein |
| 1992 | A conceptual model for computer security risk analysis. Deborah J. Bodeau |
| 1992 | A generic virus scanner for C++. Sandeep Kumar, Eugene H. Spafford |
| 1992 | Access control and applications on trusted systems. Michael V. Joyce |
| 1992 | An application of qualitative risk analysis to computer security for the commercial sector. S. P. Bennett, Muninder P. Kailay |
| 1992 | An overview of the AMC WWMCCS CAT Guard. Ricki Andrew Vick |
| 1992 | Computer security myths mythtakes or 'The real security problem is...'. James P. Anderson |
| 1992 | Dealing with the dynamics of security: Flexibility with utility in an MLS LAN. Peter A. Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro |
| 1992 | Eighth Annual Computer Security Applications Conference, ACSAC 1992, November 30 - December 4, 1992, San Antonio, Texas, USA |
| 1992 | Implementing transaction control expressions by checking for absence of access rights. Paul Ammann, Ravi S. Sandhu |
| 1992 | Integrating cryptography into trusted systems: A criteria approach. William Brierley |
| 1992 | Paradigms for verification of authorization at source of electronic documents in an integrated environment. Selwyn Russell |
| 1992 | Penetration state transition analysis: A rule-based intrusion detection approach. Phillip A. Porras, Richard A. Kemmerer |
| 1992 | Performance analysis of a method for high level prevention of traffic analysis. Richard E. Newman-Wolfe, Balaji R. Venkatraman |
| 1992 | Providing security in a phone book database using triggers. Sharon R. Lewis, Simon R. Wiseman, Neil D. Poulter |
| 1992 | SNPP: A simple network payment protocol. Semyon Dukach |
| 1992 | Secure composition of systems. John A. McDermid, Qi Shi |
| 1992 | Secure system architectures and integration. Amy Wu, Eric R. Anderson, Cristi Garvey |
| 1992 | Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transition. Christine Arangio, Tom Chen, Steve Neidhardt |
| 1992 | Security constraint processing during multilevel secure database design. Günther Pernul |
| 1992 | Security test and evaluation for multilevel-mode accreditation: Lessons learned. Deborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece |
| 1992 | Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSP. W. Douglas Maughan |
| 1992 | Trustable computing in next-generation avionic architectures. James O. Bondi |
| 1992 | Trusted RUBIX architecture and policy model interpretation. C. J. Testa, B. D. Wilner, Virgil D. Gligor |