Abstract is missing.
- Structuring Systems for Formal VerificationRichard B. Neely, James W. Freeman. 2-13 [doi]
- Trusted Software Verification: A Case StudyTerry C. Vickers Benzel, Deborah A. Tavilla. 14-31 [doi]
- Analysis of the Hardware Verification of the Honeywell SCOMPVirgil D. Gligor. 32-45 [doi]
- An Information Flow Tool for GypsyJohn McHugh, Donald L. Good. 46-48 [doi]
- The Restricted Access Processor An Example of Formal VerificationNorman Proctor. 49-55 [doi]
- Non-Discretionary Controls for Inter-Organization NetworksDeborah Estrin. 56-61 [doi]
- Network Security OverviewStephen T. Walker. 62-76 [doi]
- A Unification of Computer and Network Security ConceptsJames P. Anderson. 77-91 [doi]
- Cryptographic Protocol for Trustable Match MakingRobert W. Baldwin, Wayne Gramlich. 92-100 [doi]
- Polonium: An Identity Authentication SystemRaymond Wong, Thomas A. Berson, Richard J. Feiertag. 101-107 [doi]
- How to (Selectively) Broadcast A SecretGustavus J. Simmons. 108-115 [doi]
- A Database Encryption Scheme Which Allows the Computation of Statistics Using Encrypted DataG. R. Blakley, Catherine Meadows. 116-122 [doi]
- A Fast Signature Scheme Based on Quadratic InequalitiesTatsuski Okamoto, Akira Shibaishi. 123-133 [doi]
- Commutative Filters for Reducing Inference Threats in Multilevel Database SystemsDorothy E. Denning. 134-146 [doi]
- Design Overview for Retrofitting Integrity-Lock Architecture onto a Commercial DBMSRichard D. Graubart, Kevin J. Duffy. 147-159 [doi]
- Rounding and Inference Controlin Conceptual Models for Statistical DatabasesGultekin Özsoyoglu, Tzong-An Su. 160-175 [doi]
- Secure Ada Target: Issues, System Design, and VerificationW. E. Boebert, R. Y. Kaln, William D. Young, S. A. Hansohn. 176-183 [doi]
- Ada's Suitability for Trusted Computer SystemsE. R. Anderson. 184-189 [doi]
- Negotiated Access ControlKishore S. Swaminathan. 190-196 [doi]
- Analysis of Acyclic Attenuating Systems for the SSR Protection ModelRavinderpal Singh Sandhu. 197-207 [doi]
- Issues in Discretionary Access ControlDeborah Downs, Jerzy R. Rub, Kenneth C. Kung, Carole S. Jordan. 208-218 [doi]
- Computer Privacy in America: Conflicting Practices and Policy ChoicesBen G. Matley. 219-223 [doi]
- Security Considerations for Autonomous RobotsDouglas M. Gage. 224-229 [doi]
- The Implementation of Secure Entity-Relationship DatabasesBurton H. Patkau, David L. Tennenhouse. 230-236 [doi]
- Labeling Screen OutputMindy Rudell. 237 [doi]