| 1992 | Database Security, V: Status and Prospects, Results of the IFIP WG 11.3 Workshop on Database Security, Shepherdstown, West Virginia, USA, 4-7 November, 1991 Carl E. Landwehr, Sushil Jajodia |
| 1991 | A Modal Logic Framework to Solve Aggregation Problems. Frédéric Cuppens |
| 1991 | A Timestamp Ordering Algorithm for Secure, Single-Version, Multi-Level Databases. Paul Ammann, Sushil Jajodia |
| 1991 | Abstract and Concrete Models for Secure Database Applications. Simon R. Wiseman |
| 1991 | Cover Stories for Database Security. Thomas D. Garvey, Teresa F. Lunt |
| 1991 | Current Issues in Statistical Database Security. Teresa F. Lunt |
| 1991 | Discussion Summary. Catherine Meadows |
| 1991 | Distributed Concurrency Control with Optional Data Replication. Catherine D. McCollum, LouAnna Notargiacomo |
| 1991 | Effects of SeaView Decomposition of Multilevel Relations on Database Performance. Sushil Jajodia, Ravi Mukkamala |
| 1991 | Information and Denial of Service. John E. Dobson |
| 1991 | Logic Hints and Security in Relational Databases. Frédéric Cuppens, Kioumars Yazdanian |
| 1991 | Requirements, Capabilities, and Functionalities of User-Role Based Security for an Object-Oriented Design Model. T. C. Ting, Steven A. Demurjian, M.-Y. Hu |
| 1991 | Rights in an Object-Oriented Environment. Hans Hermann Brüggemann |
| 1991 | Security Issues in Federated Database Systems: Panel Contributions. Matthew Morgenstern, Teresa F. Lunt, Bhavani Thuraisingham, David L. Spooner |
| 1991 | Supporting Range Queries in Multilevel-Secure Databases. Gottfried Luef, Günther Pernul |
| 1991 | Supporting Timing-Channel Free Computations in Multilevel Secure Object-Oriented Databases. Ravi S. Sandhu, Roshan K. Thomas, Sushil Jajodia |
| 1991 | The Computer-Based Patient Record: Issues of Organization, Security and Confidentiality. Thomas L. Lincoln, Daniel J. Essin |
| 1991 | The Structure of Permissions: A Normative Framework for Access Rights. Philip Morris, John A. McDermid |
| 1991 | The Use of Conceptual Structures for Handling the Inference Problem. Bhavani Thuraisingham |
| 1991 | Transaction Processing Using an Untrusted Scheduler in a Multilevel Database with Replicated Architecture. Oliver Costich |
| 1991 | Use of an Experimental Policy Workbench: Description and Preliminary Results. Edgar H. Sibley, James Bret Michael, Richard L. Wexelblat |