Abstract is missing.
- Towards Security in an Open Systems FederationJohn A. Bull, Li Gong, Karen R. Sollins. 3-20 [doi]
- Type-Level Access Controls for Distributed Structurally Object-Oriented Database SystemsUdo Kelter. 21-40 [doi]
- On the Chinese Wall ModelVolker Kessler. 41-54 [doi]
- Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source CodeJingsha He, Virgil D. Gligor. 57-76 [doi]
- Separating the Specification and Implementation Phases in CryptologyMarie-Jeanne Toussaint. 77-102 [doi]
- Formal Specification of Security Requirements using the Theory of Normative PositionsAndrew J. I. Jones, Marek J. Sergot. 103-121 [doi]
- Breaking the Traditional Computer Security BarriersYvo Desmedt. 125-138 [doi]
- Verification and Modelling of Authentication ProtocolsRalf C. Hauser, E. Stewart Lee. 141-154 [doi]
- KryptoKnight Authentication and Key Distribution SystemRefik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti. 155-174 [doi]
- Associating Metrics to Certification PathsAnas Tarah, Christian Huitema. 175-189 [doi]
- An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed SystemsJean-Charles Fabre, Brian Randell. 193-208 [doi]
- The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed SystemMichael Wang, Andrzej M. Goscinski. 209-228 [doi]
- Policy Enforcement in Stub Autonomous DomainsGene Tsudik. 229-257 [doi]
- Freshness Assurance of Authentication ProtocolsKwok-Yan Lam, Dieter Gollmann. 261-272 [doi]
- A Formal Framework for AuthenticationColin Boyd. 273-292 [doi]
- Timely Authentication in Distributed SystemsKwok-Yan Lam, Thomas Beth. 293-303 [doi]
- Polyinstantation for Cover StoriesRavi S. Sandhu, Sushil Jajodia. 307-328 [doi]
- On Transaction Processing for Multilevel Secure Replicated DatabasesIwen E. Kang, Thomas F. Keefe. 329-348 [doi]
- Security Constraint Processing in Multilevel Secure AMAC SchemataGünther Pernul. 349-370 [doi]
- M:::2:::S: A Machine for Multilevel SecurityBruno d Ausbourg, Jean-Henri Llareus. 373-392 [doi]
- GDoM: a Multilevel Document ManagerChristel Calas. 393-408 [doi]
- UEPS - A Second Generation Electronic WalletRoss J. Anderson. 411-418 [doi]
- A Hardware Design Model for Cryptographic AlgorithmsJoan Daemen, René Govaerts, Joos Vandewalle. 419-434 [doi]
- ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail AnalysisNaji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu. 435-450 [doi]