Abstract is missing.
- A VMM Security Kernel for the VAX ArchitecturePaul A. Karger, Mary Ellen Zurko, Douglas W. Bonin, Andrew H. Mason, Clifford E. Kahn. 2-19
- An Architecture for Practical Delegation in a Distributed SystemMorrie Gasser, E. McDermott. 20-30
- Practical Authentication for Distributed ComputingJ. Linn. 31-40
- Specification and Verification of the ASOS KernelBenedetto L. DiVito, P. H. Palmquist, E. R. Anderson, M. L. Johnston. 61-75
- Integrating an Object-Oriented Data Model with Multilevel SecuritySushil Jajodia, Boris Kogan. 76-85
- A Little Knowledge Goes a Long Way: Faster Detection of Compromised Data in 2-D TablesDan Gusfield. 86-94
- Polyinstantiation Integrity in Multilevel RelationsSushil Jajodia, Ravi S. Sandhu. 104-115
- Referential SecrecyRae K. Burns. 133-143
- Information Flow in Nondeterministic SystemsJ. Todd Wittbold, Dale M. Johnson. 144-161
- Probabilistic InterferenceJames W. Gray III. 170-179
- Security Models and Information FlowJohn McLean. 180-189
- Beyond the Pale of MAC and DAC-Defining New Forms of Access ControlCatherine D. McCollum, J. R. Messing, LouAnna Notargiacomo. 190-200
- The Role of Trust in Protected MailM. Branstad, W. C. Barker, P. Cochrane. 210-215
- On the Formal Specification and Verification of a Multiparty Session ProtocolP.-C. Cheng, Virgil D. Gligor. 216-233
- Reasoning about Belief in Cryptographic ProtocolsLi Gong, Roger M. Needham, Raphael Yahalom. 234-248
- A Security Architecture and Mechanism for Data Confidentiality in TCP/IP ProtocolsR. Ramaswamy. 249-261
- Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential PatternsH. S. Teng, K. Chen, S. C. Y. Lu. 278-284
- Auditing the Use of Covert Storage Channels in Secure SystemsShiuh-Pyng Shieh, Virgil D. Gligor. 285-295
- A Network Security MonitorL. Todd Herberlein, Gihan V. Dias, Karl N. Levitt, Biswanath Mukherjee, Jeff Wood, David Wolber. 296-305
- The Deductive Theory Manager: A Knowledge Based System for Formal VerificationBenedetto L. DiVito, Cristi Garvey, D. Kwong, A. Murray, Jane Solomon, Amy Wu. 306-318
- Verifying a Hardware Security ArchitectureJoshua D. Guttman, H.-P. Ko. 333-344
- A Hierarchical Methodology for Verifying Microprogrammed MicroprocessorsPhillip J. Windley. 345-359
- Transaction Processing in Multilevel-Secure Databases Using Replicated ArchitectureSushil Jajodia, Boris Kogan. 360-368
- Multiversion Concurrency Control for Multilevel Secure Database SystemsThomas F. Keefe, Wei-Tek Tsai. 369-383
- Modeling Security-Relevant Data SemanticsGary W. Smith. 384-393
- Information Privacy Issues for the 1990sRein Turn. 394-400