| 1988 | Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, Annapolis, Maryland, USA, October 1987 Carl E. Landwehr |
| 1987 | A Personal View of DBMS Security. Frank Manola |
| 1987 | A User-Role Based Data Security Approach. T. C. Ting |
| 1987 | DBMS Technology vs. Threats. Thomas H. Hinke |
| 1987 | Database Security Course Module. David K. Hsiao |
| 1987 | Database Security: Where are We? Carl E. Landwehr |
| 1987 | Discussion Notes and Revised Question List. David K. Hsiao |
| 1987 | Effects of Distributed System Technology on Database Security: A Survey. Glenn H. MacEwen |
| 1987 | Formal Specification and Verification Techniques for Secure Database Systems. Richard A. Kemmerer |
| 1987 | Inference Control Via Query Restriction Vs. Data Modification: A Perspective. Norman S. Matloff |
| 1987 | Integrity Versus Security in Multi-Level Secure Databases. Catherine Meadows, Sushil Jajodia |
| 1987 | Lessons Learned from Modeling a Secure Multilevel Relational Database System. Dorothy E. Denning |
| 1987 | Logging and Accountability in Database Management Systems. David A. Bonyun |
| 1987 | Modeling Datbase Security Requirements. J. Thomas Haigh |
| 1987 | Modelling and Controlling User Inference. Lawrence H. Cox |
| 1987 | Operational Assurance for a Trusted DBMS. Rae K. Burns |
| 1987 | Privacy Respecting Permissions and Rights. Joachim Biskup |
| 1987 | Relationships between database System and Operating System Security. David L. Spooner |
| 1987 | Role-Based Security in Data Base Management Systems. Frederick H. Lochovsky, Carson C. Woo |
| 1987 | Secure Database Development Methodologies. Maria Grazia Fugini |
| 1987 | Security and Databases: A Personal View. John E. Dobson |
| 1987 | Status of Trusted DBMS Implementations. Michael W. Hale |
| 1987 | The Allocation of Database Management System Security Responsibilities. Ronda R. Henning |