Abstract is missing.
- Managing complexity in secure networksDavid Bailey. 2-6 [doi]
- New security paradigms: what other concepts do we need as well?John Dobson. 7-18 [doi]
- The multipolicy paradigm for trusted systemsHilary H. Hosmer. 19-32 [doi]
- An outline of a taxonomy of computer security research and developmentCatherine Meadows. 33-35 [doi]
- A new paradigm for trusted systemsDorothy E. Denning. 36-41 [doi]
- New paradigms for high assurance softwareJohn McLean. 42-47 [doi]
- Confidentiality, integrity, assured service: tying security all togetherGrace L. Hammonds. 48-52 [doi]
- Information system security engineering: a spiral approach to revolutionDonald M. Howe. 53-56 [doi]
- A shift in security modeling paradigmsJames G. Williams. 57-61 [doi]
- Prospect on security paradigmsLeonard J. LaPadula. 62-68 [doi]
- Integration of formal and heuristic reasoning as a basis for testing and debugging computer security policyJames Bret Michael, Edgar H. Sibley, David C. Littman. 69-75 [doi]
- Secure computing with the actor paradigmBhavani M. Thuraisingham. 76-81 [doi]
- Bell and LaPadula axioms: a "new" paradigm for an "old" modelT. Y. Lin. 82-93 [doi]
- Concurrent automata, database computers, and security: a "new" security paradigm for secure parallel processingT. Y. Lin. 94-104 [doi]
- Application level security using an object-oriented graphical user interfaceTerry Rooker. 105-108 [doi]
- The no-policy paradigm: towards a policy-free protocol supporting a secure X Window SystemMark Smith. 109-117 [doi]
- We need to think about the foundations of computer securityMarvin Schaefer. 120-125 [doi]
- The evolved threat paradigm: look who's wearing the black hats!Dixie B. Baker. 126-130 [doi]
- External consistency in a network environmentLeonard J. LaPadula, James G. Williams. 131-137 [doi]
- Towards a task-based paradigm for flexible and adaptable access control in distributed applicationsR. K. Thomas, R. S. Sandhu. 138-142 [doi]
- How responsibility modelling leads to security requirementsRos Strens, John E. Dobson. 143-149 [doi]
- Neighborhood data and database securityKioumars Yazdanian, Frédéric Cuppens. 150-154 [doi]
- Security in an object-oriented databaseJames M. Slack. 155-159 [doi]
- Computer security by redefining what a computer isYvo Desmedt. 160-166 [doi]
- Modelling multidomain securityJosé de J. Vázquez-Gómez. 167-174 [doi]
- Security is fuzzy!: applying the fuzzy logic paradigm to the multipolicy paradigmHilary H. Hosmer. 175-184 [doi]
- Identification and authentication when users have multiple accountsW. R. Shockley. 185-191 [doi]
- The reference monitor: an idea whose time has comeTerry Rooker. 192-197 [doi]