| 1999 | Database Security XII: Status and Prospects, IFIP TC11 WG 11.3 Twelfth International Working Conference on Database Security, July 15-17, 1998, Chalkidiki, Greece Sushil Jajodia |
| 1998 | An Information-Flow for Privacy (InfoPriv). Lucas C. J. Dreyer, Martin S. Olivier |
| 1998 | Analysing the Safety of Workflow Authorization Models. Wei-kuang Huang, Vijayalakshmi Atluri |
| 1998 | Bayesian Methods to the Database Inference Problem. Liwu Chang, Ira S. Moskowitz |
| 1998 | E-Commerce Security: No Silver Bullet. Anup K. Ghosh |
| 1998 | Programmable Security for Object-Oriented Systems. John Hale, Mauricio Papa, Sujeet Shenoi |
| 1998 | Reconstructing the Database after Electronic Attacks. Brajendra Panda, Joseph Giordano |
| 1998 | Role Based Security and Java. Debra L. Smarkusky, Steven A. Demurjian, M. Cecilia Bastarrica, T. C. Ting |
| 1998 | Rules and Patterns for Security in Workflow Systems. Silvana Castano, Maria Grazia Fugini |
| 1998 | SACADDOS: A Support Tool to Manage Multilevel Documents. Jérôme Carrère, Frédéric Cuppens, Claire Saurel |
| 1998 | Secure Mediation: Requirements and Design. Joachim Biskup, Ulrich Flegel, Yücel Karabulut |
| 1998 | Security Issues in Mobile Database Access. Astrid Lubinski |
| 1998 | Security Policies in Replicated and Autonomous Databases. Ehud Gudes, Martin S. Olivier |
| 1998 | Security and Privacy Issues for the World Wide Web: Panel Discussion. Bhavani Thuraisingham, Sushil Jajodia, Pierangela Samarati, John E. Dobson, Martin S. Olivier |
| 1998 | Technical Enforcement of Informational Assurances. Joachim Biskup |
| 1998 | The Design and Implementation of a Data Level Database Inference Detection System. Raymond W. Yip, Karl N. Levitt |
| 1998 | Using Role-Templates for Handling Recurring Role Structures. Wolfgang Eßmayr, Elisabeth Kapsammer, Roland R. Wagner, A Min Tjoa |
| 1998 | Version Management in the STAR MLS Database System. Ramprasad Sripada, Thomas F. Keefe |
| 1998 | Workshop Summary. Vijayalakshmi Atluri, David L. Spooner |