| 1990 | A Calculus of Information Flow. Colin O'Halloran |
| 1990 | A Case Study in the Formal Refinement of a Distributed Secure System. Gill Randell |
| 1990 | A General Framework for Database Security. Joachim Biskup |
| 1990 | A General Mechanism for Access Control: Its Relationship to Secure System Concepts. R. W. Jones |
| 1990 | A Security Reclassifier for a Local Area Network. Ian F. Akyildiz, Glenn S. Benson |
| 1990 | An Architecture for a Trusted Network. E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm |
| 1990 | An Epistemic and Deontic Logic for Reasoning about Computer Security. Frédéric Cuppens |
| 1990 | An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. Marc Girault, Jean Claude Paillès |
| 1990 | An Intrusion-Tolerant Security Server for an Open Distributed System. Laurent Blain, Yves Deswarte |
| 1990 | An Object-Oriented Architecture to Support System Reliability and Security. Jörg Kaiser |
| 1990 | Authentication and Access Control in a Distributed System. Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner |
| 1990 | Better Login Protocols for Computer Networks. Dominique de Waleffe, Jean-Jacques Quisquater |
| 1990 | CHIMÆRA: A Network Security Model. Anas Tarah, Christian Huitema |
| 1990 | ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France |
| 1990 | Epistemic Verification of Cryptographic Protocols. Pierre Bieber |
| 1990 | Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. Udo Kelter |
| 1990 | Harmonised Criteria for the Security Evaluation of IT Systems and Products. P. Casey, A. Brouwer, David Herson, J.-F. Pacault, F. Taal, U. Van Essen |
| 1990 | Managing Computer Security: How Can Research Help? D. J. Bailey |
| 1990 | Methodology "Minerve Security" - Evaluation Process of Software Security. Eric Deberdt, Sylvain Martin |
| 1990 | Pseudorandom Permutations Based on the D.E.S. Scheme. Jacques Patarin |
| 1990 | Relational Database Granularity. Kioumars Yazdanian |
| 1990 | Security Kernel Design and Implementation in the IBM PC Environment. Zoran Savic, Mihajlo Komocar |
| 1990 | The SeaView Secure Database System: A Progress Report. Teresa F. Lunt, Donovan Hsieh |
| 1990 | Towards an Object Oriented Development Environment for Secure Applications. Ernest S. Hocking, John Alexander McDermid |
| 1990 | Using Deducibility in Secure Network Modelling. Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis |