Abstract is missing.
- A classical Automata Approach to Noninterference Type ProblemsIra S. Moskowitz, Oliver Costich. 2-8
- Unwinding and the LOCK Proof Referees StudySandra Rawlings Murphy, Stephen Crocker, Timothy Redmond. 9-21
- Some Laws of Non-InterferenceJohn Graham-Cumming. 22-33
- An Algebraic Approach to Non-InterferenceSylvan Pinsky. 34-47
- Panel: Fundamental Questions about Formal MethodsCatherine Meadows. 52
- Causal SecurityMiranda Mowbray. 54-62
- Secure Dependencies with Dynamic Level AssignmentsPierre Bieber, Frédéric Cuppens. 63-75
- Inference Working Group Kickoff: The Inference Problem for Computer SecurityThomas D. Garvey. 78-81
- Partial Belief and Probabilistic Reasoning in the Analysis of Secure ProtocolsE. A. Campbell, Reihaneh Safavi-Naini, P. A. Pleasants. 84-91
- An Analysis of some Delegation Protocols for Distributed SystemsClaudio Calvelli, Vijay Varadharajan. 92-110
- Panel: Use of Formal Methods in the Analysis of Cryptographic ProtocolsJoshua D. Guttman. 112
- Foundations of Intrusion DetectionPaul Helman, Gunar E. Liepins, Wynette Richards. 114-120
- On Requirements and Security in a CCISColin O Halloran. 121-134
- A Non-monotonic Typed Multilevel Logic for Multilevel Secure Data/Knowledge - IIBhavani M. Thuraisingham. 135-146
- The Expressive Power of Multi-Parent Creation in a Monotonic Access Control ModelPaul Ammann, Richard J. Lipton, Ravi S. Sandhu. 148-156
- A Framework for Composition of Security ModelsJaisook Landauer, Timothy Redmond. 157-166
- Realization of the Bell-LaPadula Security Policy in an OSI-Distributed System using Asymmetric and Symmetric Cryptographic AlgorithmsJan Verschuren, René Govaerts, Joos Vandewalle. 168-178
- Attribute Support for Inter-Domain UseMary Ellen Zurko. 179-188