Abstract is missing.
- An Augmented Capability Architecture to Support Lattice Security and Traceability of AccessPaul A. Karger, A. J. Herbert. 2-12
- KVM/37O in RetrospectB. D. Gold, R. Linde, P. F. Cudney. 13-23
- Hardware Requirements for Secure Computer Systems: A FrameworkCarl E. Landwehr, John M. Carroll. 34-40
- Toward an Understanding of Extensible Architectures for Evaluated Trusted Computer System ProductsM. Schaefer, Roger R. Schell. 41-51
- Cryptographic Checksums for Multilevel Database SecurityDorothy E. Denning. 52-61
- The Integrity-Lock Approach to Secure Database ManagementRichard D. Graubart. 62-74
- Unwinding and Inference ControlJoseph A. Goguen, José Meseguer. 75-87
- Searching for Public-Key CryptosystemsNeal R. Wagner. 91-98
- A New Paradigm for Individuals in the Information AgeDavid Chaum. 99-106
- Practical Experience with an Ada-Based Formal Specification/Language on a Large ProjectLawrence Yelowitz. 111-113
- Ottawa Euclid and EVES: A Status ReportDan Craigen. 114-124
- Analysis of a Kernel VerificationTerry Benzel. 125-133
- The Interrogator: A Tool for Cryptographic Protocol SecurityJonathan K. Millen. 134-141
- Executable Logic Specifications: A New Approach to Computer SecurityDeepinder P. Sidhu. 142-153
- Multi-Level Security Based on Physical DistributionGlenn H. MacEwen, B. Burwell, Z.-J. Lu. 167-179
- Attacks on Computers: Congressional Hearings and Pending LegislationD. Bailey. 180-187
- A Formal Statement of the MMS Security ModelJohn D. McLean, Carl E. Landwehr, Constance L. Heitmeyer. 188-194
- Comparison Paper between the Bell and LaPadula Model and the SRI ModelT. Taylor. 195-203
- Design Experiences from the Multilevel Secure MCF Operating SystemJ. O. Neilson, F. E. Wuebker. 204-208
- Formal Specification of a Multi-Level Secure Operating SystemTanya Korelsky, David Sutherland. 209-218
- Multinet Gateway-Towards A1 CertificationGeorge W. Dinolt, Richard B. Neely, P. C. Baker, J. Freeman. 226-226