Abstract is missing.
- The SeaView Secure Database System: A Progress ReportTeresa F. Lunt, Donovan Hsieh. 3-13
- Relational Database GranularityKioumars Yazdanian. 15-20
- Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database SystemsUdo Kelter. 23-31
- A General Framework for Database SecurityJoachim Biskup. 35-41
- A General Mechanism for Access Control: Its Relationship to Secure System ConceptsR. W. Jones. 45-50
- An Object-Oriented Architecture to Support System Reliability and SecurityJörg Kaiser. 51-60
- Authentication and Access Control in a Distributed SystemG. Hoffmann, S. Lechner, M. Leclerc, F. Steiner. 71-84
- A Security Reclassifier for a Local Area NetworkIan F. Akyildiz, Glenn S. Benson. 85-95
- An Intrusion-Tolerant Security Server for an Open Distributed SystemLaurent Blain, Yves Deswarte. 97-104
- An Architecture for a Trusted NetworkE. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm. 105-113
- Using Deducibility in Secure Network ModellingBrian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis. 117-123
- CHIMÆRA: A Network Security ModelAnas Tarah, Christian Huitema. 127-132
- An Epistemic and Deontic Logic for Reasoning about Computer SecurityFrédéric Cuppens. 135-145
- A Calculus of Information FlowColin O Halloran. 147-159
- Better Login Protocols for Computer NetworksDominique de Waleffe, Jean-Jacques Quisquater. 163-172
- An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key ExchangeMarc Girault, Jean Claude Pailles. 173-184
- Pseudorandom Permutations Based on the D.E.S. SchemeJacques Patarin. 185-187
- Towards an Object Oriented Development Environment for Secure ApplicationsErnest S. Hocking, John A. McDermid. 191-200
- A Case Study in the Formal Refinement of a Distributed Secure SystemGill Randell. 201-208
- Epistemic Verification of Cryptographic ProtocolsPierre Bieber. 211-221
- Methodology Minerve Security - Evaluation Process of Software SecurityEric Deberdt, Sylvain Martin. 223-231
- Managing Computer Security: How Can Research Help?D. J. Bailey. 235-241
- Harmonised Criteria for the Security Evaluation of IT Systems and ProductsP. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen. 243-249