T. C. Ting Application Information Security Semantics: A Case of Mental Health Delivery. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:1-12 [Conf]
Joachim Biskup Protection of Privacy and Confidentiality in Medical Information Systems: Problems and Guidelines. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:13-23 [Conf]
Richard D. Graubart Comparing DBMS and Operating System Security Requirements - The Need for a Separate DBMS Security Criteria. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:109-114 [Conf]
Gary W. Smith Solving Multilevel Database Security Problems: Technology Is Not Enough. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:115-125 [Conf]
John R. Campbell An Interim Report on the Development of Secure Database Prototypes at the National Computer Security Center. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:191-197 [Conf]
Marvin Schaefer, Brian Hubbard Report From IFIP Working Group 11.3, Database Management Security, Task Force on Technical Issues Relating to the TDI. [Citation Graph (0, 0)][DBLP] DBSec, 1989, pp:367-376 [Conf]