Abstract is missing.
- Professional certification for security practitionersHal Tipton. [doi]
- ICCP Systems Security specialty examRobert T. Vitter. [doi]
- Extending the creation operation in the Schematic Protection ModelPaul Ammann, Ravi S. Sandhu. [doi]
- Professional certification for computer security professionalsLynn McNulty. [doi]
- A solution to the cascade problem for dynamic networkEric S. Maiwald. 2 [doi]
- An example application of the trusted network interpretationPatrick W. Mallett. 9-19 [doi]
- A security analysis of the NTP protocol version 2Matt Bishop. 20-29 [doi]
- Formal specification and verification of control software for cryptographic equipmentD. Richard Kuhn, James F. Dray. 32-43 [doi]
- Hierarchical group oriented key management method HGKHidenori Nakamura, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita. 44-49 [doi]
- Integrating cryptography in the trusted computing baseMichael Roe, Tom Casey. 50-56 [doi]
- On models for a trusted application systemChristian N. Payne, Judith N. Froscher, John P. McDermott. 58-67 [doi]
- A multilevel security model for a distributed object-oriented systemVijay Varadharajan, Stewart Black. 68-78 [doi]
- Entropy as a measure of database informationElizabeth A. Unger, Lein Harn, Vijay Kumar. 80-87 [doi]
- Secure query processing in distributed database management systems-design and performance studiesBhavani M. Thuraisingham, Ammiel Kamon. 88-102 [doi]
- Update semantics for multilevel relationsSushil Jajodia, Ravi S. Sandhu, Edgar H. Sibley. 103-112 [doi]
- Natural change in dynamic databases as a deterrent to compromise by trackersElizabeth Unger, Sallie Keller-McNulty, Paul Connelly. 116-124 [doi]
- Architecture for an embedded secure data base management systemCynthia E. Irvine, Roger R. Schell, Linda L. Vetter. 125-136 [doi]
- Single-level multiversion schedulers for multilevel secure database systemsWilliam T. Maimone, Ira B. Greenberg. 137-147 [doi]
- Multilevel security for knowledge based systemsThomas D. Garvey, Teresa F. Lunt. 148-159 [doi]
- ODA and POSIX: label liaisonsKevin V. Murphy, Gunnar Soberg. 162-172 [doi]
- Network management securityR. Ward, P. Skeffington. 173-180 [doi]
- The lowdown on lower layer security protocolsPaul A. Lambert. 181-187 [doi]
- The Canadian trusted computer product evaluation criteriaEugen M. Bacic. 188-196 [doi]
- MLS and trust issues at the user interface in MLS AISsWilliam Wilson, Joel Sachs, David Wichers, Peter K. Boucher. 204-208 [doi]
- An advanced process model's application to trusted X Window system developmentBonnie P. Danner, Ann B. Marmor-Squires. 209-220 [doi]
- A prototype for Trusted X labeling policiesJeremy Epstein. 221-230 [doi]
- An evaluation system for the physical security of computing systemsSteve H. Weingart, Steve R. White, William C. Arnold, Glen P. Double. 232-243 [doi]
- A brief comparison of two different environmental guidelines for determining `levels of trust' [computer security]Frank L. Mayer. 244-250 [doi]
- CERTS: a comparative evaluation method for risk management methodologies and toolsWilliam M. Garrabrants, Alfred W. Ellis III, Lance J. Hoffman, Magdi N. Kamel. 251-257 [doi]
- Is your computer being misused? A survey of current intrusion detection system technologyJ. Noelle McAuliffe, Dawn Wolcott, Lorrayne J. Schaefer, Nancy L. Kelem, Brian Hubbard, Theresa K. Haley. 260-272 [doi]
- IDES: a progress report [Intrusion-Detection Expert System]Teresa F. Lunt, Ann Tamaru, Fred Gilham, R. Jagannathan, Peter G. Neumann, Caveh Jalali. 273-285 [doi]
- Probabilistic measure on aggregations [data security]Tsau Young Lin. 286-294 [doi]
- Software checking with the Auditor's AidRussell J. Davis. 298-303 [doi]
- A comparison of type enforcement and Unix setuid implementation of well-formed transactionsDan J. Thomsen, J. Thomas Haigh. 304-312 [doi]
- Software safety and securityArchibald McKinlay. 313-320 [doi]
- A comparison of secure UNIX operating systemsRaymond M. Wong. 322-333 [doi]
- Process Execution Controls: revisitedEugen M. Bacic. 334-339 [doi]
- Security pipeline interface (SPI)Lance Hoffman, Russell J. Davis. 349-355 [doi]
- An authorization plan for commercial service systemsChe-Fn Yu. 376-383 [doi]
- An n-grid model for group authorizationWen-Gong Shieh, Bob P. Weems, Krishna M. Kavi. 384-392 [doi]
- Model of access control policy for civil agenciesKristina C. Rogers. 393-404 [doi]
- A multilevel-mode system for space applications: lessons learnedDeborah J. Bodeau, Mary Jo Reece. 406-413 [doi]
- Successful acquisition of certifiable application systems (or: How not to shake hands with the tar baby)Judith N. Froscher, John P. McDermott, Christian N. Payne, Herman Otto Lubbes. 414-422 [doi]
- Informal top-level specifications for trusted application systemsJohn P. McDermott, Judith N. Froscher, Christian N. Payne, Herman Otto Lubbes. 423-433 [doi]
- Rehosting existing command and control systems into a multilevel secure environmentSamuel Doncaster, Michael Endsley, Greg Factor. 434-445 [doi]