Abstract is missing.
- Compartimented Mode Workstation: Results Through PrototypingPaul T. Cummings, D. A. Fullam, M. J. Goldstein, M. J. Gosselin, Jeffrey Picciotto, John P. L. Woodward, J. Wynn. 2-12
- The Design of an Effective Auditing SubsystemJeffrey Picciotto. 13-22
- Exploiting the Dual Nature of Sensitivity LabelsJohn P. L. Woodward. 23-31
- Limiting the Damage Potential of Discretionary Trojan HorsesPaul A. Karger. 32-37
- ABYSS: A Trusted Architecture for Software ProtectionSteve R. White, Liam Comerford. 38-51
- Covert Channel CapacityJonathan K. Millen. 60-66
- A Formal Method for the Identification of Covert Storage Channels in Source CodeChii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran. 74-87
- Graph Homomorphisms and the Design of Secure Computer SystemsLouise E. Moser. 88-96
- A Graph-Theoretic Formulation of Multilevel Secure Distributed Systems: An OverviewJ. C. Williams, George W. Dinolt. 97-105
- Toward Verified Execution EnvironmentsWilliam R. Bevier, Warren A. Hunt Jr., William D. Young. 106-115
- A Universal Theory of Information FlowSimon N. Foley. 116-122
- Reasoning About Security ModelsJohn McLean. 123-133
- Using Formal Verification Techniques to Analyze Encryption ProtocolsRichard A. Kemmerer. 134-139
- Coding for a Believable Specification to Implementation MappingWilliam D. Young, John McHugh. 140-149
- A Model for Multilevel Security Based on Operator NetsGlenn H. MacEwen, V. W. W. Poon, Janice I. Glasgow. 150-160
- A Basis for Secure Communication in Large Distributed SystemsDavid P. Anderson, P. Venkat Rangan. 167-173
- Visa Scheme for Inter-Organization Network SecurityDeborah Estrin, Gene Tsudik. 174-183
- A Comparison of Commercial and Military Computer Security PoliciesD. D. Clark, D. R. Wilson. 184-195
- Checking Classification Constraints for Consistency and CompletenessSelim G. Akl, Dorothy E. Denning. 196-201
- Data Dependencies and Inference Control in Multilevel Relational Database SystemsTzong-An Su, Gultekin Özsoyoglu. 202-211
- The Integrity Lock Architecture and Its Application to Message Systems: Reducing Covert ChannelsCatherine Meadows. 212-219
- A Multilevel Relational Data ModelDorothy E. Denning, Teresa F. Lunt, Roger R. Schell, Mark Heckman, William R. Shockley. 220-234