1145 | -- | 1146 | Teresa F. Lunt, Deborah M. Cooper. Introduction: Security and Privacy |
1147 | -- | 1165 | Paul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn. A Retrospective on the VAX VMM Security Kernel |
1166 | -- | 1185 | Richard A. Kemmerer, Phillip A. Porras. Covert Flow Trees: A Visual Approach to Analyzing Covert Storage Channels |
1186 | -- | 1194 | Jeremy Jacob. A Uniform Presentation of Confidentiality Properties |
1195 | -- | 1203 | Gary W. Smith. Modeling Security-Relevant Data Semantics |
1204 | -- | 1222 | George S. Avrunin, Ugo A. Buy, James C. Corbett, Laura K. Dillon, Jack C. Wileden. Automated Analysis of Concurrent Systems With the Constrained Expression Toolset |