Abstract is missing.
- Using Views in a Multilevel Secure Database Management SystemBilly G. Claybrook. 4-17
- FingerprintingNeal R. Wagner. 18-22
- The Many-Time Pad: Theme and VariationsDorothy E. Denning. 23-32
- Message Authentication with Manipulation Detection CodeRobert R. Jueneman, Stephen M. Matyas, Carl H. Meyer. 33-54
- Joint Encryption and Error-Correction CodingSubhash C. Kak. 55-60
- Verification of Treaty Compliance RevisitedGustavus J. Simmons. 61-66
- Recent Advances in the Design and Implementation of Large Integer Factorization AlgorithmsMarvin C. Wunderlich. 67-71
- New Key Generation Algorithms for Multilevel SecurityStephen J. MacKinnon, Selim G. Akl. 72-78
- Modified Architecture for the Sub-Keys ModelK. A. Omar, David L. Wells. 79-88
- Evaluating Security Properties of Computer SystemsRoger R. Schell. 89-95
- Security Enhancement through Product EvaluationPaul Woodie. 96-101
- An Approach to Indentification of Minimum TCB Requirements for Various Threat/Risk EnvironmentsJames P. Anderson. 102-106
- The Channel Assignment ProblemBahaa W. Fam, Jonathan K. Millen. 107-112
- SDC Secure Release Terminal ProjectThomas H. Hinke, Jose Althouse, Richard A. Kemmerer. 113-119
- Processor-per-Domain Guard ArchitectureThomas A. Berson, Richard J. Feiertag, R. Kenneth Bauer. 120
- The Provision of Security for User Data on Packet Switched NetworksD. Barnes. 121-126
- A Distributed Secure SystemJohn M. Rushby, Brian Randell. 127-135
- Securing Networks: End-to-End Encrpytion vs. Link Encryption and Trusted SystemsWhitfield Diffie. 136-138
- A Note on the Denial-of-Service ProblemVirgil D. Gligor. 139-149
- The VERUS Design Verification SystemBrian Marick. 150-160
- Secure Computer Systems: A RetrospectiveD. E. Bell. 161-162