| 1994 | 10th Annual Computer Security Applications Conference, ACSAC 1994, 5-9 December, 1994 Orlando, FL, USA |
| 1994 | A practical approach to high assurance multilevel secure computing service. Judith N. Froscher, Myong H. Kang, John P. McDermott, Oliver Costich, Carl E. Landwehr |
| 1994 | A practical approach to user authentication. Marcus Brown, Samuel Joe Rogers |
| 1994 | A prototype multilevel-secure DoD directory. Peter K. Boucher, Teresa F. Lunt |
| 1994 | A secure Email gateway (building an RCAS external interface). Randall E. Smith |
| 1994 | A validated security policy modeling approach. James W. Freeman, Richard B. Neely, M. A. Heckard |
| 1994 | AOS: an avionics operating system for multi-level secure real-time environments. Mary M. Bernstein, Chulsoo Kim |
| 1994 | Applying the Abadi-Lamport composition theorem in real-world secure system integration environments. Judith A. Hemenway, Jonathan Fellows |
| 1994 | Architectural impact on performance of a multilevel database system. Myong H. Kang, Judith N. Froscher, Ravi Mukkamala |
| 1994 | Audit reduction and misuse detection in heterogeneous environments: framework and application. Paul Proctor |
| 1994 | Automated detection of vulnerabilities in privileged programs by execution monitoring. Calvin Ko, George Fink, Karl N. Levitt |
| 1994 | Availability: theory and fundamentals for practical evaluation and use. Klaus J. Keus, Markus Ullmann |
| 1994 | Benchmarking multilevel secure database systems using the MITRE benchmark. Vinti Doshi, William R. Herndon, Sushil Jajodia, Catherine D. McCollum |
| 1994 | Composing system integrity using I/O automata. Edward Amoroso, Michael Merritt |
| 1994 | EINet: a secure, open network for electronic commerce. Doug Rosenthal |
| 1994 | Editorial: a view of cryptography in TCSEC products. Jeremy Epstein |
| 1994 | Editorial: why bad things happen to good systems, and what to do about it. Jay J. Kahn, Marshall D. Abrams |
| 1994 | Networked information discovery and retrieval tools: security capabilities and needs. Lorrayne J. Schaefer, Brian W. McKenney |
| 1994 | Ops/Intel interface lessons learned: the integrator's perspective. Kate Arndt, Michael Burgoon, Jeanne Firey, Keith Rodenhausen |
| 1994 | Organizing MLS databases from a data modelling point of view. Günther Pernul, Gerald Quirchmayr |
| 1994 | Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. Balaji R. Venkatraman, Richard E. Newman-Wolfe |
| 1994 | Property-based testing of privileged programs. George Fink, Karl N. Levitt |
| 1994 | Role-based access control: a multi-dimensional view. Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, Charles E. Youman |
| 1994 | STU-III-multilevel secure computer interface. Eugene D. Myers |
| 1994 | Secure system composition: five practical initiatives. Greg King |
| 1994 | Security concerns for distributed systems. Rob Dobry, Mary Schanken |
| 1994 | Security for the Common Object Request Broker Architecture (CORBA). Susan L. Chapin, William R. Herndon, LouAnna Notargiacomo, Melonyi L. Katz, Thomas J. Mowbray |
| 1994 | System-of-systems security engineering. Deborah J. Bodeau |
| 1994 | The MITRE security perimeter. David S. Goldberg |
| 1994 | The design of an audit trail analysis tool. Eric A. Fisch, Gregory B. White, Udo W. Pooch |
| 1994 | The effects of trusted technology on distributed applications. Michael V. Joyce |
| 1994 | Using security models to investigate CMW design and implementation. C. L. Robinson, Simon R. Wiseman |
| 1994 | Where we stand in multilevel security (MLS): requirements, approaches, issues, and lessons learned. Bill Neugent |