Abstract is missing.
- An Analysis of Covert Timing ChannelsJ. C. Wray. 2-7
- Toward a Mathematical Foundation for Information Flow SecurityJames W. Gray III. 21-35
- Covert Flow Trees: A Technique for Identifying and Analyzing Covert Storage ChannelsPhillip A. Porras, Richard A. Kemmerer. 36-51
- Storage Channels in Disk Arm OptimizationPaul A. Karger, J. C. Wray. 52-63
- Modeling Nondisclosure in Terms of the Subject-Instruction StreamJ. G. Williams. 64-77
- A Separation Model for Virtual Machine MonitorsN. L. Kelem, Richard J. Feiertag. 78-86
- Safety Analysis for the Extended Schematic Protection ModelPaul Ammann, Ravi S. Sandhu. 87-97
- A Taxonomy for Information Flow Policies and ModelsSimon N. Foley. 98-109
- Intrusion Tolerance in Distributed Computing SystemsYves Deswarte, Laurent Blain, Jean-Charles Fabre. 110-121
- Verification of Secure Distributed Systems in Higher Order Logic: A Modular Approach Using Generic ComponentsJim Alves-Foss, Karl N. Levitt. 122-135
- Applying a Theory of Modules and Interfaces to Security VerificationSimon S. Lam, A. Udaya Shankar, Thomas Y. C. Woo. 136-155
- The Use of Logic in the Analysis of Cryptographic ProtocolsPaul F. Syverson. 156-170
- Exploring the BAN Approach to Protocol AnalysisEinar Snekkenes. 171-181
- Toward an Approach to Measuring Software TrustEdward Amoroso, T. Nguyen, Jonathan Weiss, John Watson, P. Lapiska, T. Starr. 198-218
- On the Buzzword Security Policy Daniel F. Sterne. 219-231
- SPX: Global Authentication Using Public Key CertificatesJoseph Tardo, K. Alagappan. 232-244
- An Analysis of the Proxy Problem in Distributed SystemsVijay Varadharajan, Phillip Allen, Stewart Black. 255-277
- Microdata Disclosure Limitation in Statistical Databases: Query Size and Random Sample Query ControlGeorge T. Duncan, Sumitra Mukherjee. 278-287
- Discretionary Access Controls in a High-Performance Object Management SystemUdo Kelter. 288-299
- A Novel Decomposition of Multilevel Relations into Single-Level RelationsSushil Jajodia, Ravi S. Sandhu. 300-315
- A Pattern-Oriented Intrusion-Detection Model and Its ApplicationsShiuh-Pyng Shieh, Virgil D. Gligor. 327-342
- Directed-Graph Epidemiological Models of Computer VirusesJeffrey O. Kephart, Steve R. White. 343-361
- Variable Noise Effects Upon a Simple Timing ChannelIra S. Moskowitz. 362-372