| 1989 | Database Security, II: Status and Prospects. Result of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, October 5-7, 1988 Carl E. Landwehr |
| 1988 | A Generalized Information Flow Model and the Role of System Security Officer. Tsau Young Lin |
| 1988 | Access Control Policies for Database Systems. Teresa F. Lunt |
| 1988 | Achieving a Trusted Database Management System Using Parallelism. Judith N. Froscher, Catherine Meadows |
| 1988 | An Analysis of Database Security with Queries for High Order Statistical Information. Ion Tim Ieong, T. C. Ting |
| 1988 | Analysis of the Privacy Model for the Information System DORIS. Joachim Biskup, Hans-Werner Graf |
| 1988 | Database Inference Engine Design Approach. Thomas H. Hinke |
| 1988 | Designing Multilevel Secure Distributed Databases. Hilary H. Hosmer, Rae K. Burns |
| 1988 | Discretionary Access Control in Structurally Object-Oriented Database Systems. Klaus R. Dittrich, Martin Härtig, Heribert Pfefferle |
| 1988 | Discussion Notes and Research Question List. D. J. Thomsen, J. Thomas Haigh, Carl E. Landwehr |
| 1988 | Multilevel Database Systems: Meeting Class A1. Teresa F. Lunt |
| 1988 | Prototyping as a Research Tool for MLS/DBMS. D. J. Thomsen, Wei-Tek Tsai, Bhavani M. Thuraisingham |
| 1988 | Secure Access Control with High Access Precision: An Efficient Approach to Multilevel Security. Gregory S. Hoppenstand, David K. Hsiao |
| 1988 | Security Analysis of database Schema Information. Ronda R. Henning, Richard P. Simonian |
| 1988 | Security Models and Enterprise Models. John E. Dobson, John A. McDermid |
| 1988 | Security by Permission in Databases. Janice I. Glasgow, Glenn H. MacEwen, Prakash Panangaden |
| 1988 | System Security Officer Functions in the A1 Secure DBMS. Nancy R. Jensen |
| 1988 | The 'Curse of Dimensionality' in Database Security. Norman S. Matloff, Patrick Tendick |
| 1988 | The Advanced Secure DBMS: Making Secure DBMSs Usable. Cristi Garvey, Nancy R. Jensen, Jackson Wilson |
| 1988 | The Impact of Inheritance on Security in Object-Oriented Database Systems. David L. Spooner |