| 1993 | A methodology for the use of single level RDBMS software in a multi-level secured system. M. O. Aldrich |
| 1993 | A rigorous approach to determining objects. Daniel P. Faigin, Joseph Donndelinger, J. R. Jones |
| 1993 | A second look at the SDNS key management protocol. W. A. Jansen |
| 1993 | Applying noninterference to composition of systems: a more practical approach. Qi Shi, John A. McDermid, Jonathan D. Moffett |
| 1993 | C2 auditing in the X Display Manager. J. DeMeester |
| 1993 | COMPUSEC, a personal view. Herman Otto Lubbes |
| 1993 | Database design and MLS DBMSs: an unhappy alliance? Sharon R. Lewis, Simon R. Wiseman |
| 1993 | Effects of multilevel security on real-time applications. Raymond K. Clark, Ira B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen |
| 1993 | Expressive power of the single-object typed access matrix model. Ravi S. Sandhu, Srinivas Ganta |
| 1993 | Heterogeneous workstation to STU-III prototype. Eric M. Kayden, L. J. Schaefer |
| 1993 | Improved password mechanisms through expert system technology. Willem G. de Ru, Jan H. P. Eloff |
| 1993 | Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case study. Deborah J. Bodeau, Vipin Swarup |
| 1993 | MLS file service for network data sharing. Richard E. Smith |
| 1993 | Migrating a commercial-off-the-shelf application to a multilevel secure environment. Rick Schultz, Tim Ehrsam |
| 1993 | Modeling constructs for describing a complex system-of-systems. Deborah J. Bodeau, Frederick N. Chase |
| 1993 | MultiView model for object-oriented database. Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian |
| 1993 | Ninth Annual Computer Security Applications Conference, ACSAC 1993, 6-10 December, 1993, Orlando, Florida, USA |
| 1993 | On the shortest path to network security. John A. Fitch III, Lance J. Hoffman |
| 1993 | Operational requirements for multilevel security. Brian Tretick |
| 1993 | Real-time trust with 'System Build': lessons learned. Mary M. Bernstein, Terry C. Vickers Benzel |
| 1993 | Representation of mental health application access policy in a monotonic model. Claudio Calvelli, Vijay Varadharajan |
| 1993 | Security policy in a complex logistics procurement. Michael J. Nash, Ronald J. Kennett |
| 1993 | Specification issues of secure systems. Michael R. Sweezey |
| 1993 | The deductive filter approach to MLS database prototyping. Günther Pernul, Werner Winiwarter, A Min Tjoa |
| 1993 | The rationale behind the Canadian criteria. Eugen M. Bacic, A. Robison |
| 1993 | Transmission schedules to prevent traffic analysis. Balaji R. Venkatraman, Richard E. Newman-Wolfe |
| 1993 | Transparent cosignatures for electronic documents. Selwyn Russell |
| 1993 | User interface for a high assurance, windowing system. Jeremy Epstein, Rita Pascale |
| 1993 | Using logics to detect implementation-dependent flaws [cryptographic protocol design]. Ulf Carlsen |