Abstract is missing.
- The algebra of securityJohn McLean. 2-7 [doi]
- Concerning 'modeling' of computer securityDavid Elliott Bell. 8-13 [doi]
- Security specificationsJeremy Jacob. 14-23 [doi]
- A secure distributed operating systemThomas A. Casey Jr., Stephen T. Vinter, D. G. Weber, Rammohan Varadarajan, David Rosenthal. 27-38 [doi]
- Extended discretionary access controlsStephen T. Vinter. 39-49 [doi]
- A fault tolerance approach to computer virusesMark K. Joseph, Algirdas Avizienis. 52-58 [doi]
- A prototype real-time intrusion-detection expert systemTeresa F. Lunt, R. Jagannathan. 59-66 [doi]
- Views as the security objects in a multilevel secure relational database management systemJackson Wilson. 70-84 [doi]
- ASDViews [relational databases]Cristi Garvey, Amy Wu. 85-95 [doi]
- Inference aggregation detection in database management systemsThomas H. Hinke. 96-106 [doi]
- A bandwidth computation model for covert storage channels and its applicationsChii-Ren Tsai, Virgil D. Gligor. 108-121 [doi]
- Reasoning about knowledge in multilevel secure distributed systemsJanice I. Glasgow, Glenn H. MacEwen. 122-128 [doi]
- Implementing commercial data integrity with secure capabilitiesPaul A. Karger. 130-139 [doi]
- Using mandatory integrity to enforce 'commercial' securityTheodore M. P. Lee. 140-146 [doi]
- The trusted path between SMITE and the userSimon R. Wiseman, Phil Terry, Andrew Wood, Clare Harrold. 146-155 [doi]
- Cascaded authenticationKaren R. Sollins. 156-163 [doi]
- Reverification of a microprocessorStephen D. Crocker, Eve Cohen, Sue Landauer, Hilarie Orman. 166-176 [doi]
- Noninterference and the composability of security propertiesDaryl McCullough. 177-186 [doi]
- A formal specification and verification method for the prevention of denial of serviceChe-Fu Yu, Virgil D. Gligor. 187-202 [doi]
- An axiomatic basis of trust in distributed systemsP. Venkat Rangan. 204-211 [doi]
- Security policy modeling for the next-generation packet switchDavid Elliott Bell. 212-216 [doi]
- The SeaView security modelDorothy E. Denning, Teresa F. Lunt, Roger R. Schell, William R. Shockley, Mark Heckman. 218-233 [doi]
- A near-term design for the SeaView multilevel database systemTeresa F. Lunt, Roger R. Schell, William R. Shockley, Mark Heckman, Dan Warren. 234-244 [doi]
- Controlling logical inference in multilevel database systemsMatthew Morgenstern. 245-255 [doi]