Abstract is missing.
- A single-level scheduler for the replicated architecture for multilevel-secure databasesJohn P. McDermott, Sushil Jajodia, Ravi S. Sandhu. 2-11 [doi]
- Using polyinstantiation to develop an MLS applicationDoug Nelson, Chip Paradise. 12-22 [doi]
- Security constraint processing during the update operation in a multilevel secure database management systemMarie Collins, William R. Ford, Bhavani M. Thuraisingham. 23-32 [doi]
- Towards trusted cut and paste in the X Window SystemJeffrey Picciotto. 34-43 [doi]
- A prototype B3 trusted X Window SystemJeremy Epstein, John McHugh, Rita Pascale, Hilarie K. Orman, Glenn S. Benson, Charles R. Martin, Ann B. Marmor-Squires, Bonnie P. Danner, Martha A. Branstad. 44-55 [doi]
- An implementation of access control using a salient feature of primesDale A. Moir. 56-64 [doi]
- Network auditing: issues and recommendationsSamuel I. Schaen, Brian W. McKenney. 66-79 [doi]
- Real-time anomaly detection using a nonparametric pattern recognition approachLinda Lankewicz, Mark Benard. 80-89 [doi]
- An audit model for object-oriented databasesBoris Y. Kogan, Sushil Jajodia. 90-99 [doi]
- High level prevention of traffic analysisRichard E. Newman-Wolfe, Balaji R. Venkatraman. 102-109 [doi]
- Security modelling using hierarchical state machinesJohn P. Nestor. 110-119 [doi]
- Modeling internal controls of automated teller machine (ATM) systems: A computerized decision aid for design and evaluationJoseph C. Chao, Mahalakshmi Komaravolu, Carol Lin, Gavin Yiu. 120-129 [doi]
- Verification of the security of a secure network componentEdward A. Schneider. 132-142 [doi]
- 2 systemR. A. Gove, Lisa M. Jaworski, John G. Williams. 143-151 [doi]
- A distributed implementation of the extended schematic protection modelPaul Ammann, Ravi S. Sandhu, Gurpreet S. Suri. 152-164 [doi]
- A multilevel secure relational data model based on viewsGünther Pernul, Gottfried Luef. 166-177 [doi]
- Domain reduction dependencies: A new type of dependency for statistical database securityS. C. Hansen, Elizabeth A. Unger. 178-186 [doi]
- Complete containment sets and their application to the inference problemBob P. Weems, Wen-Gong Shieh, Muhammad Jaseemuddin. 187-200 [doi]
- Fielding multilevel security into command and control systemsDaniel Galik, Brian Tretick. 202-208 [doi]
- Proposed security for critical Air Force missionsHoward L. Johnson, Chuck Arvin, Earl Jenkinson, Bob Pierce. 209-217 [doi]
- Considerations for applying disk encryptors to environments subject to hostile overrunPatrick W. Mallet. 218-222 [doi]
- Security considerations in the acquisition of computer systemsCaptain Charles R. Pierce. 224-229 [doi]
- Observations on integrating multilevel secure components into system high distributed systemsRobert E. Niemeyer, V. A. Ashby. 230-238 [doi]
- Rebus passwordsMaria M. King. 239-243 [doi]