| 1994 | "Mainstreaming" Automated Information Systems Security Engineering (a case study in security run amok). James W. Coyne, Norman C. Kluksdahl |
| 1994 | A Key Distribution Method for Object-Based Protection. Warwick Ford, Michael J. Wiener |
| 1994 | A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness. Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss |
| 1994 | A Temporal Authorization Model. Elisa Bertino, Claudio Bettini, Pierangela Samarati |
| 1994 | An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads. Paul Ammann, Sushil Jajodia |
| 1994 | An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis. Randy Browne |
| 1994 | Anonymous Credit Cards. Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk |
| 1994 | Application Access Control at Network Level. Refik Molva, Erich Rütsche |
| 1994 | Authentication Codes That Are Leonid M. Tombak, Reihaneh Safavi-Naini |
| 1994 | CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994. Dorothy E. Denning, Raymond Pyle, Ravi Ganesan, Ravi S. Sandhu |
| 1994 | Conditionally Secure Secret Sharing Schemes with Disenrollment Capability. Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini |
| 1994 | Endorsements, Licensing, and Insurance for Distributed System Services. Gennady Medvinsky, Charlie Lai, B. Clifford Neuman |
| 1994 | Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500. Marjan Jurecic, Herbert Bunz |
| 1994 | How to Break Gifford's Cipher (extended abstract). Thomas R. Cain, Alan T. Sherman |
| 1994 | How to Simultaneously Exchange Secrets by General Assumptions. Tatsuaki Okamoto, Kazuo Ohta |
| 1994 | Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria. M. Zhang, Stafford E. Tavares, L. Lorne Campbell |
| 1994 | Meta-ElGamal Signature Schemes. Patrick Horster, Holger Petersen, Markus Michels |
| 1994 | Network Security Probe. P. Rolin, Laurent Toutain, Sylvain Gombault |
| 1994 | New Protocols for Third-Party-Based Authentication and Secure Broadcast. Li Gong |
| 1994 | On Key Distribution via True Broadcasting. Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot |
| 1994 | Parallel Collision Search with Application to Hash Functions and Discrete Logarithms. Paul C. van Oorschot, Michael J. Wiener |
| 1994 | Prerequisite Confidentiality. John P. Nestor, E. S. Lee |
| 1994 | Propagation of Authorizations in Distributed Database Systems. Pierangela Samarati, Paul Ammann, Sushil Jajodia |
| 1994 | Protocol Failure in the Escrowed Encryption Standard. Matt Blaze |
| 1994 | Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart. Michael K. Reiter |
| 1994 | Secure Wireless LANs. Vaduvur Bharghavan |
| 1994 | Security Modelling for Organisations. Alison Anderson, Dennis Longley, Lam-for Kwok |
| 1994 | Support for the File System Security Requirements of Computational E-Mail Systems. Trent Jaeger, Atul Prakash |
| 1994 | The Compatibility of Policies. Heather M. Hinton, E. Stewart Lee |
| 1994 | The Design and Implementation of Tripwire: A File System Integrity Checker. Gene H. Kim, Eugene H. Spafford |
| 1994 | The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. Howard M. Heys, Stafford E. Tavares |
| 1994 | Towards Acceptable Key Escrow Systems. Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann |