| 1994 | "HIS-Treck - the next generation": an introduction to future hospital information systems. Thomas L. Lincoln |
| 1994 | A discretionary access control model with temporal authorizations. Elisa Bertino, Claudio Bettini, Pierangela Samarati |
| 1994 | A new approach to security system development. Silvana Castano, Giancarlo Martella, Pierangela Samarati |
| 1994 | Anomaly detection: a soft computing approach. T. Y. Lin |
| 1994 | Designing encryption algorithms for real people. Bruce Schneier |
| 1994 | Formal semantics of confidentiality in multilevel logic databases. Adrian Spalka |
| 1994 | Fuzzy sets and secure computer systems. Sergei Ovchinnikov |
| 1994 | Healthcare information architecture: elements of a new paradigm. Daniel J. Essin, Thomas L. Lincoln |
| 1994 | Messages, communication, information security and value. John Dobson |
| 1994 | Modeling the "multipolicy machine". David Elliott Bell |
| 1994 | New email security infrastructure. Martin Ferris |
| 1994 | Proceedings of the 1994 Workshop on New Security Paradigms, Little Compton, Rhode Island, USA, August 3-5,1994 Hilary H. Hosmer, John E. Dobson, Eric Leighninger |
| 1994 | Providing non-hierarchical security through interface mechanisms. Deborah Hamilton |
| 1994 | Versatile integrity and security environment (VISE) for computer systems. Charles G. Limoges, Ruth R. Nelson, John H. Heimann, David S. Becker |
| 1994 | What is a secret - and - what does that have to do with computer security? Ruth Nelson |