Abstract is missing.
- Non-Discretionery Controls for Commercial ApplicationsSteven B. Lipner. 2-10 [doi]
- Security Policies and Security ModelsJoseph A. Goguen, José Meseguer. 11-20 [doi]
- A Preliminary Neval Surveillance OBMS SacurityRichard D. Graubart, John P. L. Woodward. 21-37 [doi]
- Memoryless Inference Controls for Statistical DatabasesDorothy E. Denning, Jan Schlörer, Elisabeth Wehrle. 38-45 [doi]
- Protection in the OSKAR Opereting System: Goals, Concepts, ConseqeuencesKlaus R. Dittrich, Karlheinz Hug, Peter Kammerer, Dieter Lienert, Hans Mau, Klaus Wachsmuth. 46-56 [doi]
- Kernel Isolation for the PDP-11/70Jonathan K. Millen. 57-65 [doi]
- A Practical Approach to Identifying Storage and Timing ChannelsRichard A. Kemmerer. 66-73 [doi]
- Precise Information Flow Analysis by Program VerificationChristopher Landauer, Stephen Crocker. 74-80 [doi]
- Specification-to-Code CorrelationJane Solomon. 81-85 [doi]
- Privacy Protection in the 1980sRein Turn. 86-89 [doi]
- Specification of Key Distribution Protocols for NetworksDeepinder P. Sidhu. 90 [doi]
- Accelerating Computer Security InnovationJames P. Anderson. 91-98 [doi]
- A Software Protection SchemeGeorge B. Purdy, Gustavus J. Simmons, James Studier. 99-103 [doi]
- Shared Database Access using Composed Encryption FunctionsNeal R. Wagner. 104-110 [doi]
- Cryptographic Relational AlgebraGeorge I. Davida, Yi-Shiung Yeh. 111-116 [doi]
- Forward Search as a Cryptanalytic Tool Against a Public KeyGustavus J. Simmons, Diane B. Holdridge. 117-128 [doi]
- Digital Signitures with Blindfolded Arbitrators Who Cannot Form AlliancesSelim G. Akl. 129-136 [doi]
- A Multilevel Secure Local Area NetworkDeepinder P. Sidhu, Morrie Gasser. 137-143 [doi]
- A Practical Executive for Secure CommunicationsGary Grossman. 144-155 [doi]
- Pooling, Splitting, and Restituting Information to Overcome Total Failure of Some Channels of CommunicationC. A. Asmuth, G. R. Blakley. 156 [doi]