Abstract is missing.
- Computer security myths mythtakes or `The real security problem is. . .'James P. Anderson. [doi]
- Secure system architectures and integrationAmy Wu, Eric R. Anderson, Cristi Garvey. 2-9 [doi]
- Trustable computing in next-generation avionic architecturesJames O. Bondi. 10-19 [doi]
- Security Products (Security Pro) Transition Analysis Facility (STAF): Pragmatic concepts for MLS technology transitionChristine Arangio, Tom Chen, Steve Neidhardt. 20-27 [doi]
- Integrating cryptography into trusted systems: A criteria approachWilliam Brierley. 30-36 [doi]
- Security test and evaluation for multilevel-mode accreditation: Lessons learnedDeborah J. Bodeau, Nancy R. Brusil, Irene N. Chang, Mary Jo Reece. 37-45 [doi]
- An overview of the AMC WWMCCS CAT GuardRicki Andrew Vick. 46-54 [doi]
- A conceptual model for computer security risk analysisDeborah J. Bodeau. 56-63 [doi]
- An application of qualitative risk analysis to computer security for the commercial sectorS. P. Bennett, Muninder P. Kailay. 64-73 [doi]
- Security constraint processing during multilevel secure database designGünther Pernul. 75-84 [doi]
- Providing security in a phone book database using triggersSharon R. Lewis, Simon R. Wiseman, Neil D. Poulter. 85-96 [doi]
- Trusted RUBIX architecture and policy model interpretationC. J. Testa, B. D. Wilner, Virgil D. Gligor. 97-110 [doi]
- Secure composition of systemsJohn A. McDermid, Qi Shi. 112-122 [doi]
- Performance analysis of a method for high level prevention of traffic analysisRichard E. Newman-Wolfe, Balaji R. Venkatraman. 123-130 [doi]
- Implementing transaction control expressions by checking for absence of access rightsPaul Ammann, Ravi S. Sandhu. 131-140 [doi]
- A comparison of trusted X security policies, architectures, and interoperabilityJeffrey Picciotto, Jeremy Epstein. 142-152 [doi]
- A cautionary note on image downgradingCharles W. Kurak Jr., John McHugh. 153-159 [doi]
- Access control and applications on trusted systemsMichael V. Joyce. 160-167 [doi]
- SNPP: A simple network payment protocolSemyon Dukach. 173-179 [doi]
- Dealing with the dynamics of security: Flexibility with utility in an MLS LANPeter Loscocco, William R. Kutz, Dale M. Johnson, Ronald J. Watro. 180-192 [doi]
- Standards for computer systems security: An interoperability analysis of SDNS SP3 and ISO NLSPW. Douglas Maughan. 193-201 [doi]
- Paradigms for verification of authorization at source of electronic documents in an integrated environmentSelwyn Russell. 203-209 [doi]
- A generic virus scanner for C++Sandeep Kumar, Eugene H. Spafford. 210-219 [doi]
- Penetration state transition analysis: A rule-based intrusion detection approachPhillip A. Porras, Richard A. Kemmerer. 220-229 [doi]