| 1993 | Database Security, VI: Status and Prospects. Results of the IFIP WG 11.3 Workshop on Database Security, Vancouver, Canada, 19-21 August 1992 Bhavani Thuraisingham, Carl E. Landwehr |
| 1992 | A Practical Transaction Model and Untrusted Transaction Manager for a Multilevel-Secure Database System. Myong H. Kang, Oliver Costich, Judith N. Froscher |
| 1992 | Aerie: An Inference Modeling and Detection Approach for Databases. Thomas H. Hinke, Harry S. Delugach |
| 1992 | Disclosure Limitation using Autocorrelated Noise. George T. Duncan, Sumitra Mukherjee |
| 1992 | Extending Access Control with Duties - Realized by Active Mechanisms. Dirk Jonscher |
| 1992 | Formalizing and Validating Complex Security Requirements. Philip Morris, John A. McDermid |
| 1992 | IFIP WG 11.3 Database Security: Research Questions of Current Significance. Carl E. Landwehr |
| 1992 | Implementing the Message Filter Object-Oriented Security Model without Trusted Subjects. Roshan K. Thomas, Ravi S. Sandhu |
| 1992 | Inference Secure Multilevel Databases. Tsau Young Lin |
| 1992 | Inference Through Secondary Path Analysis. Leonard J. Binns |
| 1992 | Inference and Cover Stories. Leonard J. Binns |
| 1992 | Integrity and the Audit of Trusted Database Management Systems. Jarrellann Filsinger |
| 1992 | Maintaining Multilevel Transaction Atomicity in MLS Database Systems with Kernelized Architecture. Oliver Costich, Sushil Jajodia |
| 1992 | Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models. Kenneth P. Smith, Marianne Winslett |
| 1992 | On the Axiomatization of Security Policy: Some Tentative Observations about Logic Representation. James Bret Michael, Edgar H. Sibley, Richard F. Baum, Fu Li |
| 1992 | Orange Locking: Channel-Free Database Concurrency Control Via Locking. John P. McDermott, Sushil Jajodia |
| 1992 | Panel Discussion: Security for Distributed Database Management Systems. Catherine D. McCollum |
| 1992 | Protecting Sensitive Medical Information. Jeffrey G. Kaplan |
| 1992 | Recovery Management for Multilevel Secure Database Systems. Iwen E. Kang, Thomas F. Keefe |
| 1992 | Support for Security Modeling in Information Systems Design. Gerhard Steinke, Matthias Jarke |
| 1992 | The SPEAR Data Design Method. Peter J. Sell |
| 1992 | Toward a Tool to Detect and Eliminate Inference Problems in the Design of Multilevel Databases. Thomas D. Garvey, Teresa F. Lunt, Xiaolei Qian, Mark E. Stickel |
| 1992 | Tuple-level vs Element-level Classification. Xiaolei Qian, Teresa F. Lunt |
| 1992 | User-Role Based Security Profiles for an Object-Oriented Design Model. M.-Y. Hu, Steven A. Demurjian, T. C. Ting |
| 1992 | Using SWORD for the Military Aircraft Command Example Database. Simon R. Wiseman |
| 1992 | Workshop Summary. Teresa F. Lunt |