| 1993 | A new paradigm for trusted systems. Dorothy E. Denning |
| 1993 | A shift in security modeling paradigms. James G. Williams |
| 1993 | An outline of a taxonomy of computer security research and development. Catherine Meadows |
| 1993 | Application level security using an object-oriented graphical user interface. Terry Rooker |
| 1993 | Bell and LaPadula axioms: a "new" paradigm for an "old" model. T. Y. Lin |
| 1993 | Computer security by redefining what a computer is. Yvo Desmedt |
| 1993 | Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processing. T. Y. Lin |
| 1993 | Confidentiality, integrity, assured service: tying security all together. Grace L. Hammonds |
| 1993 | External consistency in a network environment. Leonard J. LaPadula, James G. Williams |
| 1993 | How responsibility modelling leads to security requirements. Ros Strens, John E. Dobson |
| 1993 | Identification and authentication when users have multiple accounts. W. R. Shockley |
| 1993 | Information system security engineering: a spiral approach to revolution. Donald M. Howe |
| 1993 | Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policy. James Bret Michael, Edgar H. Sibley, David C. Littman |
| 1993 | Managing complexity in secure networks. David Bailey |
| 1993 | Modelling multidomain security. José de J. Vázquez-Gómez |
| 1993 | Neighborhood data and database security. Kioumars Yazdanian, Frédéric Cuppens |
| 1993 | New paradigms for high assurance software. John McLean |
| 1993 | New security paradigms: what other concepts do we need as well? John Dobson |
| 1993 | Proceedings on the 1992-1993 Workshop on New Security Paradigms, Sept. 22-24, 1992; and Aug. 3-5, 1993, Little Compton, RI, USA James Bret Michael, Victoria Ashby, Catherine Meadows |
| 1993 | Prospect on security paradigms. Leonard J. LaPadula |
| 1993 | Secure computing with the actor paradigm. Bhavani Thuraisingham |
| 1993 | Security in an object-oriented database. James M. Slack |
| 1993 | Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigm. Hilary H. Hosmer |
| 1993 | The evolved threat paradigm: look who's wearing the black hats! Dixie B. Baker |
| 1993 | The multipolicy paradigm for trusted systems. Hilary H. Hosmer |
| 1993 | The no-policy paradigm: towards a policy-free protocol supporting a secure X Window System. Mark Smith |
| 1993 | The reference monitor: an idea whose time has come. Terry Rooker |
| 1993 | Towards a task-based paradigm for flexible and adaptable access control in distributed applications. Roshan K. Thomas, Ravi S. Sandhu |
| 1993 | We need to think about the foundations of computer security. Marvin Schaefer |