Abstract is missing.
- COMPUSEC, a personal viewHerman Otto Lubbes. [doi]
- Integration of security services into the NORAD/USSPACECOM technical infrastructure: a case studyDeborah J. Bodeau, Vipin Swarup. 2-10 [doi]
- A methodology for the use of single level RDBMS software in a multi-level secured systemM. O. Aldrich. 11-20 [doi]
- Migrating a commercial-off-the-shelf application to a multilevel secure environmentR. Schultz, T. Ehrsam. 21-28 [doi]
- Operational requirements for multilevel securityBrian Tretick. 30-35 [doi]
- Specification issues of secure systemsMichael R. Sweezey. 36-45 [doi]
- Security policy in a complex logistics procurementMichael J. Nash, Ronald J. Kennett. 46-53 [doi]
- Using logics to detect implementation-dependent flaws [cryptographic protocol design]Ulf Carlsen. 64-73 [doi]
- A second look at the SDNS key management protocolW. A. Jansen. 74-81 [doi]
- Transparent cosignatures for electronic documentsSelwyn Russell. 82-91 [doi]
- MLS file service for network data sharingRichard E. Smith. 94-99 [doi]
- Heterogeneous workstation to STU-III prototypeEric M. Kayden, L. J. Schaefer. 100-107 [doi]
- Transmission schedules to prevent traffic analysisBalaji R. Venkatraman, Richard E. Newman-Wolfe. 108-115 [doi]
- Effects of multilevel security on real-time applicationsRaymond K. Clark, I. B. Greenberg, Peter K. Boucher, Teresa F. Lunt, Peter G. Neumann, Douglas M. Wells, E. Douglas Jensen. 120-129 [doi]
- Real-time trust with 'System Build': lessons learnedMary M. Bernstein, Terry C. Vickers Benzel. 130-136 [doi]
- Modeling constructs for describing a complex system-of-systemsDeborah J. Bodeau, Frederick N. Chase. 140-148 [doi]
- On the shortest path to network securityJohn A. Fitch III, Lance J. Hoffman. 149-158 [doi]
- A rigorous approach to determining objectsDaniel P. Faigin, Joseph Donndelinger, J. R. Jones. 159-168 [doi]
- The rationale behind the Canadian criteriaE. M. Bacic, A. Robison. 170-179 [doi]
- Expressive power of the single-object typed access matrix modelRavi S. Sandhu, Srinivas Ganta. 184-194 [doi]
- Representation of mental health application access policy in a monotonic modelClaudio Calvelli, Vijay Varadharajan. 195-209 [doi]
- Applying noninterference to composition of systems: a more practical approachQi Shi, John A. McDermid, Jonathan D. Moffett. 210-220 [doi]
- MultiView model for object-oriented databaseNora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian. 222-231 [doi]
- Database design and MLS DBMSs: an unhappy alliance?Sharon R. Lewis, Simon R. Wiseman. 232-243 [doi]
- The deductive filter approach to MLS database prototypingGünther Pernul, Werner Winiwarter, A Min Tjoa. 244-253 [doi]
- User interface for a high assurance, windowing systemJeremy Epstein, Rita Pascale. 256-264 [doi]
- C2 auditing in the X Display ManagerJ. DeMeester. 265-271 [doi]
- Improved password mechanisms through expert system technologyWillem G. de Ru, Jan H. P. Eloff. 272-280 [doi]