Abstract is missing.
- The composability of non-interference [system security]Aris Zakinthinos, E. Stewart Lee. 2-8 [doi]
- Composing and decomposing systems under security propertiesA. W. Roscoe, L. Wulf. 9-15 [doi]
- Algebraic properties of system composition in the LORAL, Ulysses and McLean trace modelsAlfred P. Maneki. 16 [doi]
- Optimal authentication protocols resistant to password guessing attacksLi Gong. 24-29 [doi]
- Key distribution without individual trusted authentification serversLiqun Chen, Dieter Gollmann, Chris J. Mitchell. 30 [doi]
- Towards a classification of key agreement protocolsColin Boyd. 38-43 [doi]
- An augmentation of BAN-like logicsWenbo Mao. 44 [doi]
- The security checker: a semantics-based tool for the verification of security propertiesRiccardo Focardi, Roberto Gorrieri, V. Panini. 60-69 [doi]
- Implementation of a discretionary access control model for script-based systemsTrent Jaeger, Atul Prakash. 70-84 [doi]
- Building higher resolution synthetic clocks for signaling in covert timing channelsJohn V. A. Janeri, Daylan B. Darby, Daniel D. Schnackenberg. 85 [doi]
- Modelling and verifying key-exchange protocols using CSP and FDRA. W. Roscoe. 98-107 [doi]
- Using temporal logic to specify and verify cryptographic protocolsJames W. Gray III, John McLean. 108 [doi]
- Concurrency control for federated multilevel secure database systemsIwen E. Kang, Thomas F. Keefe. 118-135 [doi]
- Specifying security for CSCW systemsSimon N. Foley, Jeremy Jacob. 136 [doi]
- The epistemic representation of information flow security in probabilistic systemsPaul F. Syverson, James W. Gray III. 152-166 [doi]
- Connection policies and controlled interferenceWilliam R. Bevier, Richard M. Cohen, William D. Young. 167-176 [doi]