AT&T Technical Journal

Cover image for AT&T Technical Journal

May-June 1988

Volume 67, Issue 3

Pages 2–71

Currently known as: Bell Labs Technical Journal

  1. Original Article

    1. Top of page
    2. Original Article
    1. Information Security: An Overview (pages 2–8)

      Alf L. Andreassen, William J. Leighton III and David F. Schreiber

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00625.x

    2. Security Standards—Government and Commercial (pages 9–18)

      L. Kirk Barker and Larry D. Nelson

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00626.x

    3. The Secure Data Network System (pages 19–27)

      Bennett C. Karp, L. Kirk Barker and Larry D. Nelson

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00627.x

    4. A Security Methodology for Computer Networks (pages 28–36)

      Lyndon G. Pierson and Edward L. Witzke

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00628.x

    5. Sandia's Terminal Switching Network and Fiber Optic Loop (pages 37–43)

      Lawrence F. Tolendino, Spencer D. Nelson and Steven A. Gossage

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00629.x

    6. Design of a Certifiable One-Way Data-Flow Device (pages 44–52)

      Ronald L. Sharp

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00630.x

    7. System V/MLS Labeling and Mandatory Policy Alternatives (pages 53–64)

      Charles W. Flink II and Jonathan D. Weiss

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00631.x

    8. Report: Quest—A Security Auditing Tool (pages 65–71)

      Sharon A. Kapilow and Mikhail Cherepov

      Version of Record online: 29 JUL 2013 | DOI: 10.1002/j.1538-7305.1988.tb00632.x

SEARCH

SEARCH BY CITATION