| 1994 | A Contemporary Survey of Discretion Access Control Policy Assurance in Commercial Trusted Relational DBMS. Marvin Schaefer |
| 1994 | A Fine-grained Access Control Model for Object-Oriented DBMSs. Arnon Rosenthal, James G. Williams, William R. Herndon, Bhavani Thuraisingham |
| 1994 | A Multilevel Secure Federated Database. Martin S. Olivier |
| 1994 | A Practical Formalism for Imprecise Inference Control. John Hale, Jody Threet, Sujeet Shenoi |
| 1994 | A new Authorization Model for Object-Oriented Databases. Elisa Bertino, Fabio Origgi, Pierangela Samarati |
| 1994 | Access Rights Administration in Role-Based Security Systems. Matunda Nyanchama, Sylvia L. Osborn |
| 1994 | Creating Abstract Discretation Modification Policies with Reconfigurable Data Objects. Todd Gross |
| 1994 | Current Trends in Database Technology and Their Impact on Security Concepts. Klaus R. Dittrich, Dirk Jonscher |
| 1994 | Database Security, VIII: Status and Prospects, Proceedings of the IFIP WG11.3 Working Conference on Database Security, Bad Salzdetfurth, Germany, 23-26 August, 1994 Joachim Biskup, Matthew Morgenstern, Carl E. Landwehr |
| 1994 | Degrees of Isolation, Concurrency Control Protocols, and Commit Protocols. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia |
| 1994 | Enforcement of State Dependent Security Specifications. Joachim Biskup, Christian Eckert |
| 1994 | Field Level Classification and SQL. Simon R. Wiseman |
| 1994 | Hypersemantic Data Modeling for Inference Analysis. Donald G. Marks, Leonard J. Binns, Bhavani Thuraisingham |
| 1994 | Perspectives on Database Security - Panel Summary. Matthew Morgenstern, Joachim Biskup, Klaus R. Dittrich, Carl E. Landwehr, Marvin Schaefer |
| 1994 | Providing Consistent Views in a Polyinstantiated Database. Laurence Cholvy, Frédéric Cuppens |
| 1994 | Secure Logic Databases Allowed to Reveal Indefinite Information on Secrets. Adrian Spalka |
| 1994 | Security Guidelines for Database Systems Development. George Pangalos |
| 1994 | Security Object Modelling for Level-Based Policies. Günther Pernul |
| 1994 | Special Care Needed for the Heart of Medical Information Systems. A. R. Bakker |
| 1994 | Summary of Conference Discussions. Matthew Morgenstern |
| 1994 | The Integration of Security and Integrity Constraints in MOKUM. Reind P. van de Riet, Jack Beukering |
| 1994 | The SINTRA Data Model: Structure and Operations. Oliver Costich, Myong H. Kang, Judith N. Froscher |
| 1994 | The b²/c³ Problem: How Big Buffers Overcome Convert Channel Cynicism in Trusted Database Systems. John P. McDermott |
| 1994 | Trusted ONTOS Prototype: Preliminary Considerations. Marvin Schaefer, Sandra Wade |
| 1994 | Trusted RUBIX: A Multilevel Secure Client-Server DBMS. James P. O'Connor |
| 1994 | Unifying Structural and Security Modeling and Analyses in the ADAM Object-Oriented Design Environment. M.-Y. Hu, Steven A. Demurjian, T. C. Ting |
| 1994 | User Group Structures in Object-Oriented Database Authorization. Eduardo B. Fernández, Jie Wu, Minjie H. Fernandez |