Abstract is missing.
- On Analyzing the Bus-Contention Channel Under Fuzzy TimeJames W. Gray III. 3-9
- The Concurrency Control and Recovery Problem for Multilevel Update Transactions in MLS SystemAmit G. Mathur, Thomas F. Keefe. 10-23
- Modeling Restrictive Processes that Involve Blocking RequestsDavid Rosenthal. 27-38
- Information Flow Control in a Parallel Language FrameworkJean-Pierre Banâtre, Ciarán Bryce. 39-52
- A Logical Formalization of SecrecyFrédéric Cuppens. 53-62
- A Lattice of InformationJaisook Landauer, Timothy Redmond. 65-70
- Automated Support for External ConsistencyJames G. Williams, Leonard J. LaPadula. 71-81
- Panel: What are the Foundations of Computer Security?Mary Ellen Zurko. 85-95
- A Petri Net Representation of the Take-Grant ModelMarc Dacier. 99-108
- On Testing for Absence of Rights in Access Control ModelsRavi S. Sandhu, Srinivas Ganta. 109-118
- A Variation on the Themes of Message Freshness and Replay or, the Difficulty in Devising Formal Methods to Analyze Cryptographic ProtocolsLi Gong. 131-136
- Abstract Machines for Communication SecurityPierre Bieber, Nora Boulahia-Cuppens, T. Lehmann, E. van Wickeren. 137-146
- Towards Formal Analysis of Security ProtocolsWenbo Mao, Colin Boyd. 147-158
- Panel: Cryptographic Protocol Models and RequirementsPaul F. Syverson. 161