| 1996 | Database Security IX: Status and Prospects, Proceedings of the Ninth Annual IFIP WG11 Working Conference on Database Security, Rensselaerville, New York, USA, 13-16 August 1995 David L. Spooner, Steven A. Demurjian, John E. Dobson |
| 1995 | A Formal Security Design Approach for Information Exchange in Organisations. Ralph Holbein, Stephanie Teufel, Kurt Bauknecht |
| 1995 | A Formal Specification of an Authorization Model for Object-Oriented Databases. Eduardo B. Fernández, Robert B. France, D. Wei |
| 1995 | A Locking Protocol for MLS Databases Providing Support For Long Transactions. Shankar Pal |
| 1995 | A Secure Concurrency Control Protocol for Real-Time Databases. Ravi Mukkamala, Sang Hyuk Son |
| 1995 | A Tool for Inference Detection and Knowledge Discovery in Databases. Surath Rath, Dominic Jones, John Hale, Sujeet Shenoi |
| 1995 | An Adaptive Policy for Improved Timeliness in Secure Database Systems. Sang Hyuk Son, Rasikan David, Bhavani Thuraisingham |
| 1995 | Argos - A Configurable Access Control System for Interoperable Environments. Dirk Jonscher, Klaus R. Dittrich |
| 1995 | Assured Discretionary Access Control for Trusted RDBMS. Marvin Schaefer, Gary W. Smith |
| 1995 | Customer Requirements for Security in Relational Database Management. Marvin Schaefer, Ronda R. Henning, Roger L. Miller, Thomas J. Parenty, Jesse C. Worthington |
| 1995 | How Secure is Secure: Some Thoughts on Security Metrics. T. C. Ting |
| 1995 | ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf |
| 1995 | Inference Analysis During Multilevel Database Design. Rae K. Burns |
| 1995 | Messages, Communication, Information Security: Protecting the User from the Data. John E. Dobson, Mike Martin |
| 1995 | Modeling Mandatory Access Control in Role-Based Security Systems. Matunda Nyanchama, Sylvia L. Osborn |
| 1995 | Modelling a Multilevel Database with Temporal Downgrading Functionalities. Frédéric Cuppens, Alban Gabillon |
| 1995 | Multilevel Data Model for the Trusted ONTOS Prototype. Marvin Schaefer, P. Martel, T. Kanawati, V. Lyons |
| 1995 | Panel Discussion: Role-Based Access Control and Next-Generation Security Models. Roshan K. Thomas, Elisa Bertino, Pierangela Samarati, Hans Hermann Brüggemann, Bret Hartman, Ravi S. Sandhu, T. C. Ting |
| 1995 | Providing Different Degrees of Recency Options to Transactions in Multilevel Secure Databases. Vijayalakshmi Atluri, Elisa Bertino, Sushil Jajodia |
| 1995 | Report of Discussion Sessions Following Presentations. John E. Dobson |
| 1995 | Security and Data Mining. Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani Thuraisingham |
| 1995 | Self-protecting Objects in a Secure Federated Database. Martin S. Olivier |
| 1995 | Storage Jamming. John P. McDermott, David M. Goldschlag |
| 1995 | The Modulated-Input Modulated-Output Model. Ira S. Moskowitz, Myong H. Kang |
| 1995 | Towards a MAC Policy Framework. Xiaolei Qian, Teresa F. Lunt |
| 1995 | URBS Enforcement Mechanisms for Object-Oriented Systems. Steven A. Demurjian, T. A. Daggett, T. C. Ting, M.-Y. Hu |