| 1991 | Database Security, IV: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Halifax, UK, September 18-21, 1990 Sushil Jajodia, Carl E. Landwehr |
| 1990 | A General Framework for Database Security (Abstract). Joachim Biskup |
| 1990 | A Generalized Framework for Database Access Controls. Marshall D. Abrams, Gary W. Smith |
| 1990 | A Multilevel Formal Specification of a Mental Health Care Database. Richard A. Kemmerer |
| 1990 | A Research and Development Program for Trusted Distributed Database Systems. John R. Campbell |
| 1990 | A Security Model for Multilevel Objects with Bidirectional Relationships. Matthew Morgenstern |
| 1990 | Computer Security in a Clinical Environment. Bruce I. Blum |
| 1990 | Database Architectonics and Inferential Security. Barry Sowerbutts, Shanda Cordingley |
| 1990 | Discretionary Access Control in Object-Oriented Engineering Database Systems. Donald B. Faatz, David L. Spooner |
| 1990 | Discussion Summary. Catherine Meadows |
| 1990 | Enterprise Modeling and Security Policies. Mike Martin, John E. Dobson |
| 1990 | Evolution of Negative, Predicate, and Instance-based Authorization in Object-Oriented Databases. Ehud Gudes, Haiyan Song, Eduardo B. Fernández |
| 1990 | Health Delivery: The Problem solved? LouAnna Notargiacomo, Richard D. Graubart |
| 1990 | Multilevel Database and Aggregated Security Algebra. Tsau Young Lin |
| 1990 | Multilevel Security for Multimedia Database Systems. Bhavani Thuraisingham |
| 1990 | On the Behavior of Multilevel Database Systems. Edgar H. Sibley, Gary W. Smith |
| 1990 | Policies for Dynamic Upgrading. Catherine Meadows |
| 1990 | Polyinstantiation Integrity in Multilevel Relations Revisited. Sushil Jajodia, Ravi S. Sandhu |
| 1990 | Query Modifications as a Means of Controlling Access to Multilevel Secure Databases. David K. Hsiao, Matthew J. Kohler, Shawn W. Stround |
| 1990 | Reflexions on Current Issues in Trusted DBMS. Marvin Schaefer |
| 1990 | Research Question List. Carl E. Landwehr |
| 1990 | Role-Based Application Design and Enforcement. D. J. Thomsen |
| 1990 | Separation of Duties in Computerized Information Systems. Ravi S. Sandhu |
| 1990 | Shared Sensitivity Labels. Hilary H. Hosmer |
| 1990 | The Control of Integrity in Databases. Simon R. Wiseman |
| 1990 | The LDV Secure Relational DBMS Model. J. Thomas Haigh, Richard C. O'Brien, D. J. Thomsen |
| 1990 | The Third Stream: Long-Term Prospects for Secure Database Management. David A. Bonyum |
| 1990 | Update Semantics for a Multilevel Relational Database System. Teresa F. Lunt, Donovan Hsieh |