Abstract is missing.
- A Definition of Secure Dependencies Using the Logic of SecurityPierre Bieber, Frédéric Cuppens. 2-11
- Quantitative Evaluation of Confidentiality by Entropy CalculationGilles Trouessin. 12-21
- Multiple Trojan Horse Systems and Covert Channel AnalysisJonathan T. Trostle. 22-33
- On the Refinement of Non-InterferenceJohn Graham-Cumming, Jeff W. Sanders. 35-42
- On Information Flow Security ModelsJames W. Gray III. 55-60
- Towards a Theory of Penetration-Resistant Systems and its ApplicationsSarbari Gupta, Virgil D. Gligor. 62-78
- Separation of Duty using High Water MarksSimon N. Foley. 79-88
- The Basic Integrity TheoremJeremy Jacob. 89-97
- Handling Infeasible Specifications fo Cryptographic ProtocolsLi Gong. 99-102
- On Belief Evolution in Authentication ProtocolsRajashekar Kailar, Virgil D. Gligor. 103-116
- Abductive and Approximate Reasoning Models for Characterizing Inference ChannelsThomas D. Garvey, Teresa F. Lunt, Mark E. Stickel. 118-126
- A Nonmonotonic Typed Multilevel Logic for Multilevel Secure Database/Knowledge-Based Management SystemsBhavani M. Thuraisingham. 127-138
- A Secure Kernelized Architecture for Multiple Object-Oriented DatabasesRavi S. Sandhu, Roshan K. Thomas, Sushil Jajodia. 139-152
- Hook-Up Property of Information Flow Secure NetsVijay Varadharajan. 154-175
- A Proof of Secrecy for a Network Security ModelGlenn H. MacEwen, Janice I. Glasgow. 176-181
- Implicit Discretionary Access Propagation: A new Interpretation of DACE. John Sebes, Richard J. Feiertag. 183-187
- A Formal Model of Security Dependency for Analysis and Testing of Secure SystemsJohn A. McDermid, Qi Shi. 188-200
- Analysis of a Storage Channel in the Two-Phase Commit ProtocolOliver Costich, Ira S. Moskowitz. 201-208
- Protection against Covert Storage and Timing ChannelsP. M. Melliar-Smith, Louise E. Moser. 209-214
- Toward a Universal Integrity ModelLeonard J. LaPadula, James G. Williams. 216-218
- Logics for Cryptographic Protocols - Virtues and LimitationsVirgil D. Gligor, Rajashekar Kailar, Stuart G. Stubblebine, Li Gong. 219-226
- The NRL Protocol Analysis Tool: A Position PaperCatherine Meadows. 227
- Complexity Theoretic Analysis of Crypto-Protcols - OverviewYacov Yacobi. 230-233
- Panel Discussion on the Polyinstantiation Problem: A Position PaperSushil Jajodia. 235
- Polyinstantiation: An Inevitable Part of a Multilevel WorldTeresa F. Lunt. 236-238
- The LDV Approach to PolyinstantiationDick O Brien. 239-240
- The Conflict Between Confidentiality and IntegritySimon R. Wiseman. 241-242