| 1990 | Database Security, III: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Monterey, California, USA, September 5-7, 1989 David L. Spooner, Carl E. Landwehr |
| 1989 | A Comparison of Three Secure DBMS Architectures. Richard D. Graubart |
| 1989 | A Layered TCB Implementation versus the Hinke-Schaefer Approach. Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu |
| 1989 | An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. John R. Campbell |
| 1989 | Application Information Security Semantics: A Case of Mental Health Delivery. T. C. Ting |
| 1989 | Audit Trail Organization in Relational Databases. Sushil Jajodia, Shashi K. Gadia, Gautam Bhargava, Edgar H. Sibley |
| 1989 | Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. Richard D. Graubart |
| 1989 | Constructing Containers Using a Multilevel Relational Data Model. Catherine Meadows |
| 1989 | Conversation Structures as a Means of Specifying Security Policy. John E. Dobson |
| 1989 | DBMS Trusted Computing Base Taxonomy. Thomas H. Hinke |
| 1989 | Database Inference Controller. Leoan J. Buczkowski |
| 1989 | Discussion Summary. Ravi S. Sandhu |
| 1989 | Formal Specification of a Mental Health Delivery System. Richard A. Kemmerer |
| 1989 | Handling Security Violations within an Integrity Lock DBMS. Hilary H. Hosmer |
| 1989 | Mandatory Controls for Database Integrity. Ravi S. Sandhu |
| 1989 | Multilevel Security for Object-Oriented Database Systems. Teresa F. Lunt |
| 1989 | Multivalued Dependency Inferences in Multilevel Relational Database Systems. Tzong-An Su, Gultekin Özsoyoglu |
| 1989 | On the Problem of Security in Data Bases. Simon R. Wiseman |
| 1989 | Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. Joachim Biskup |
| 1989 | Prototyping the SODA Model. Thomas F. Keefe, Wei-Tek Tsai |
| 1989 | Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. Marvin Schaefer, Brian Hubbard |
| 1989 | Research Question List, Answers, and Revision. Carl E. Landwehr |
| 1989 | Security Algebras and Formal Models: Using Petri Net Theory. Tsau Young Lin, Larry Kerschberg, Robert P. Trueblood |
| 1989 | Security Policies for Integrated Project Support Environments. John Alexander McDermid, Ernest S. Hocking |
| 1989 | Security Policies in Object-Oriented Databases. María M. Larrondo-Petrie, Ehud Gudes, Haiyan Song, Eduardo B. Fernández |
| 1989 | Solving Multilevel Database Security Problems: Technology Is Not Enough. Gary W. Smith |
| 1989 | The LDV Approach to Database Security. J. Thomas Haigh, Richard C. O'Brien, Paul D. Stachour, Dana L. Toups |
| 1989 | Using Exess as a Framework for Secure DBMSs. David A. Bonyun |