Abstract is missing.
- Extending Ina Jo with Temporal LogicJeannette M. Wing, Mark R. Nixon. 2-13
- An Experience Using Two Covert Channel Analysis Techniques on a Real System DesignJ. Thomas Haigh, Richard A. Kemmerer, John McHugh, William D. Young. 14-24
- Muse : A Computer Assisted Verification SystemJ. Daniel Halpern, Sam Owre, Norman Proctor, William F. Wilson. 25-33
- A Security Policy and Formal Top Level Specification for a Multi-Level Secure Local Area NetworkJohn McHugh, Andrew P. Moore. 34-39
- A New Security Testing Method and Its Application to the Secure Xenix KernelVirgil D. Gligor, C. Sekar Chandersekaran, W. Cheng, Wen-Der Jiang, Abhai Johri, Gary L. Luckenbaugh, L. Edward Reich. 40-59
- Extending the Non-Interference Version of MLS for SATJ. Thomas Haigh, William D. Young. 60-60
- Security in KeyKOSS. A. Rajunas, Norman Hardy, Allen C. Bomberger, William S. Frantz, Charles R. Landau. 78-85
- A Secure Capability Computer SystemSimon R. Wiseman. 86-94
- On the Design and the Implementation of Secure Xenix WorkstationsVirgil D. Gligor, E. L. Burch, C. Sekar Chandersekaran, Robert S. Chapman, Leslie J. Dotterer, Matthew S. Hecht, Wen-Der Jiang, Gary L. Luckenbaugh, N. Vasudevan. 102-117
- An Intrusion-Detection ModelDorothy E. Denning. 118-133
- A More Efficient Cryptographic Matchmaking Protocol for Use in the Absence of a Continuously Available Third PartyCatherine Meadows. 134-137
- A Hierarchical Key Management Scheme for End-to-End Encryption in Internet EnvironmentsWen-Pai Lu, Malur K. Sundareshan. 138-147
- Encrypted Database Design: Specialized ApproachesNeal R. Wagner, Paul Putter, Marianne R. Cain. 148-155
- Views for Multilevel Database SecurityDorothy E. Denning, Selim G. Akl, Matthew Morgenstern, Peter G. Neumann, Roger R. Schell, Mark Heckman. 156-172
- Another Look at the Use of Noise Addition for Database SecurityNorman S. Matloff. 173-181
- The Trusted Domain Machine: A Secure Communication Device for Security Guard ApplicationsR. A. Carlson, Teresa F. Lunt. 182-186
- Building Reliable Secure Computing Systems out of Unreliable Insecure ComponentsJohn E. Dobson, Brian Randell. 187-193
- Intrusion-Tolerance Using Fine-Grain Fragmentation-ScatteringJ.-M. Fray, Yves Deswarte, David Powell. 194-203
- Factors Affecting Distributed System SecurityDan M. Nessett. 204-222
- A Global Authentication Service without Global TrustAndrew Birrell, Butler W. Lampson, Roger M. Needham, Michael D. Schroeder. 223-230