| 2000 | Research Advances in Database and Information Systems Security, IFIP WG 11.3 Thirteenth International Conference on Database Security, July 26-28, 1999, Seattle, Washington, USA Vijayalakshmi Atluri, John Hale |
| 1999 | A Logical Formalization for Specifying Authorizations in Object-Oriented Databases. Yun Bai, Vijay Varadharajan |
| 1999 | A Secret Splitting Method for Assuring the Confidentiality of Electronic Records. Andrew Po-Jung Ho |
| 1999 | A Strategy for an MLS Workflow Management System. Myong H. Kang, Judith N. Froscher, Brian J. Eppinger, Ira S. Moskowitz |
| 1999 | Analyzing the Performance of Program Behavior Profiling for Intrusion Detection. Anup K. Ghosh, Aaron Schwartzbard |
| 1999 | Enforcing Integrity While Maintaining Secrecy. Donald G. Marks |
| 1999 | Extending The BFA Workflow Authorization Model to Express Weighted Voting. Savith Kandala, Ravi S. Sandhu |
| 1999 | For Unknown Secrecies Refusal is Better than Lying. Joachim Biskup |
| 1999 | Impact of Decision-Region Based Classification Mining Algorithms on Database Security. Tom Johnsten, Vijay V. Raghavan |
| 1999 | Integrating Data Mining Techniques with Intrusion Detection Methods. Ravi Mukkamala, Jason Gagnon, Sushil Jajodia |
| 1999 | Intrusion Confinement by Isolation in Information Systems. Peng Liu, Sushil Jajodia, Catherine D. McCollum |
| 1999 | Panel on Intrusion Detection. T. C. Ting, Ming-Yuh Huang, D. Shayne Pitcock, Chris Clifton, Tsau Young Lin |
| 1999 | Protecting Against Data Mining through Samples. Chris Clifton |
| 1999 | RBAC on the Web by Secure Cookies. Joon S. Park, Ravi S. Sandhu, SreeLatha Ghanta |
| 1999 | Security Administration for Federations, Warehouses, and other Derived Data. Arnon Rosenthal, Edward Sciore, Vinti Doshi |
| 1999 | Selected Topics in Infrastructure and Information Assurance (Panel). William V. Maconachy, Thomas Harper, Donald G. Marks, Terry Mayfield |
| 1999 | Software Agents for Role Based Security. Steven A. Demurjian, Y. He, T. C. Ting, M. Saba |
| 1999 | Specifying and Computing Hierarchies of Temporal Authorizations. Elisa Bertino, Piero A. Bonatti, Elena Ferrari, Maria Luisa Sapino |
| 1999 | Temporal Authorization in the Simplified Event Calculus. Steve Barker |
| 1999 | The Effect of Confidentiality on the Structure of Databases. Adrian Spalka, Armin B. Cremers |
| 1999 | The Security Problem against Inference Attacks on Object-Oriented Databases. Yasunori Ishihara, Toshiyuki Morita, Minoru Ito |
| 1999 | eMEDAC: Role-based Access Control Supporting Discretionary and Mandatory Features. Ioannis Mavridis, George Pangalos, Marie Khair |