| 1998 | Database Securty XI: Status and Prospects, IFIP TC11 WG11.3 Eleventh International Conference on Database Security, 10-13 August 1997, Lake Tahoe, California, USA Tsau Young Lin, Shelly Qian |
| 1997 | A Principled Approach to Object Deletion and Garbage Collection in a Multi-Level Secure Object Bases. Elisa Bertino, Elena Ferrari |
| 1997 | A Two-tier Coarse Indexing Scheme for MLS Database Systems. Sushil Jajodia, Ravi Mukkamala, Indrajit Ray |
| 1997 | Access Controls by Object-Oriented Concepts. Wolfgang Eßmayr, Günther Pernul, A Min Tjoa |
| 1997 | Administration Policies in a Multipolicy Autorization System. Elisa Bertino, Elena Ferrari |
| 1997 | Alter-egos and Roles: Supporting Workflow Security in Cyberspaces. Ehud Gudes, Reind P. van de Riet, J. F. M. Burg, Martin S. Olivier |
| 1997 | An Environment for Developing Securely Interoperable Heterogeneous Distributed Objects. M. Berryman, C. Rummel, Mauricio Papa, John Hale, Jody Threet, Sujeet Shenoi |
| 1997 | An Execution Model for Multilevel Seccure Workflows. Vijayalakshmi Atluri, Wei-kuang Huang, Elisa Bertino |
| 1997 | Capability-Based Primitives for Access Control in Object-Oriented Systems. John Hale, Jody Threet, Sujeet Shenoi |
| 1997 | Compile-Time Flow Analysis of Transactions and Methods in Object-Oriented Databases. Masha Gendler-Fishman, Ehud Gudes |
| 1997 | Datafly: A System for Providing Anonymity in Medical Data. Latanya Sweeney |
| 1997 | Designing Security Agents for the DOK Federated System. Zahir Tari |
| 1997 | Distributed Object Technologies, Databases and Security. Catherine D. McCollum, Donald B. Faatz, William R. Herndon, E. John Sebes, Roshan K. Thomas |
| 1997 | IRI: A Quantitative Approach to Inference Analysis in Relational Databases. Kan Zhang |
| 1997 | Implementing Advanced Internet Search Engines. Gary Lorentz, S. Dangi, Dominic Jones, Paul Carpenter, Sujeet Shenoi |
| 1997 | Multilevel Decision Logic: A Formalism for Rules Mining. Tsau Young Lin, Xiaoling Zuo |
| 1997 | Priority-Driven Secure Multiversion Locking Protocol for Real-Time Secure Database Systems. Chanjung Park, Seog Park, Sang Hyuk Son |
| 1997 | Replication Does Survive Information Warfare Attacks. John P. McDermott |
| 1997 | Security Issues in Data Warehousing and Data Mining: Panel Discussion. Bhavani Thuraisingham, Linda Schlipper, Pierangela Samarati, Tsau Young Lin, Sushil Jajodia, Chris Clifton |
| 1997 | Software Architectural Alternatives for User Role-Based Security Policies. Steven A. Demurjian, T. C. Ting, John A. Reisner |
| 1997 | Structured Name-Spaces in Secure Databases. Adrian Spalka, Armin B. Cremers |
| 1997 | Supporting the Requirements for Multilevel Secure and Real-Time Databases in Distributed Environments. Sang Hyuk Son, Craig Chaney |
| 1997 | Task-Based Authorization Controls (TBAC): A Family of Models for Active and Enterprise-Oriented Autorization Management. Roshan K. Thomas, Ravi S. Sandhu |
| 1997 | The URA97 Model for Role-Based User-Role Assignment. Ravi S. Sandhu, Venkata Bhamidipati |
| 1997 | Web Implementation of a Security Mediator for Medical Databases. Gio Wiederhold, Michel Bilello, Chris Donahue |