Part 1 Invited lectures: special care needed for the heart of medical information systems, A.R. Bakker; current trends in database technology and their impact on security concepts, K.R. Dittrich and D. Jonscher. Part 2 User groups and roles: access rights administration in role-based security systems, M. Nyanchama and S. Osborn; user group structures in object-oriented database authorization, E.B. Fernandez et al; unifying structural and security modelling and analyses in the ADAM object-oriented design and environment, M.-Y. Hu et al. Part 3 Database architecture: the SINTRA data model - structure and operations, O. Costich et al; the b2/c3 problem - how big buffers overcome covert channel cynicism in trusted database systems, J. McDermott; trusted RUBIX - a multilevel secure client-server dbms, J.P. O'Connor. Part 4 Inference analysis and control: a practical formalism for imprecise inference control, J. Hale et al; hypersemantic data modelling for inference analysis, D.G. Marks et al. Part 5 Database models: a multilevel secure federated database, M.S. Olivier; a new authorization model for object-oriented databases, E. Bertino et al; the integration of security and integrity constraints in MOKUM, R.P. van de Riet and J. Beukering. Part 6 Queries, updates and transactions: field level classification and SQL, S. Wiseman; degrees of isolation, concurrency control protocols and commit protocols, V. Atluri et al. Part 7 Policy modelling: providing consistent views in a polyinstantiated database, L. Cholvy and F. Cuppens; secure logic databases allowed to reveal indefinite information on secrets, A. Spalka. Part 8 Access control and application design: a fine grained access control model for object-oriented dbms, A. Rosenthal et al; creating abstract discretionary modification policies with reconfigurable data objects, T. Gross; security guidelines for database systems development, G. Pangalos. Part 9 Status reports on current projects and panel: trusted ONTOS prototype - preliminary considerations, M. Schaefer and S. Wade; security object modelling for level-based policies, G. Pernul; enforcement of state dependent security specifications, J. Biskup and Eckert; a contemporary survey of discretionary access control policy assurance in commercial trusted relational dbms, M. Schaefer; perspectives on database security - panel summary, panel chair - M. Morgenstern, panelists - J. Biskup et al. Part 10 Discussion summary: summary of the conference discussions - eighth IFIP WG11.3 conference on database security, M. Morgenstern; research question list (IFIP WG11.3 database security).