Abstract is missing.
- Conference Committee [doi]
- Message from the Program Chairs [doi]
- An Analysis of the Timed Z-channelIra S. Moskowitz, Steven J. Greenwald, Myong H. Kang. 2-11 [doi]
- Defining Noninterference in the Temporal Logic of ActionsTodd Fine. 12-21 [doi]
- Goals for Computer Security EducationCynthia E. Irvine. 24-25 [doi]
- Computer Security Training and Education: A Needs AnalysisStephen F. Burnett. 26-27 [doi]
- A Security Policy Model for Clinical Information SystemsRoss J. Anderson. 30-43 [doi]
- What do We Mean by Entity Authentication?Dieter Gollmann. 46-54 [doi]
- A Fair Non-repudiation ProtocolJianying Zhou, Dieter Gollmann. 55-61 [doi]
- Limitations on Design Principles for Public Key ProtocolsPaul F. Syverson. 62-72 [doi]
- Ensuring Atomicity of Multilevel TransactionsPaul Ammann, Sushil Jajodia, Indrakshi Ray. 74-84 [doi]
- View-Based Access Control with High AssuranceXiaolei Qian. 85-93 [doi]
- Supporting Multiple Access Control Policies in Database SystemsElisa Bertino, Sushil Jajodia, Pierangela Samarati. 94-107 [doi]
- An Immunological Approach to Change Detection: Algorithms, Analysis and ImplicationsPatrik D haeseleer, Stephanie Forrest, Paul Helman. 110-119 [doi]
- A Sense of Self for Unix ProcessesStephanie Forrest, Steven A. Hofmeyr, Anil Somayaji, Thomas A. Longstaff. 120-128 [doi]
- Cryptovirology: Extortion-Based Security Threats and CountermeasuresAdam Young, Moti Yung. 129-140 [doi]
- A Security Model of Dynamic Labeling Providing a Tiered Approach to VerificationSimon N. Foley, Li Gong, Xiaolei Qian. 142-153 [doi]
- A Communication Agreement Framework for Access/Action ControlMartin Röscheisen, Terry Winograd. 154-163 [doi]
- Decentralized Trust ManagementMatt Blaze, Joan Feigenbaum, Jack Lacy. 164-173 [doi]
- Security Properties and CSPSteve Schneider. 174-187 [doi]
- Java Security: From HotJava to Netscape and BeyondDrew Dean, Edward W. Felten, Dan S. Wallach. 190-200 [doi]
- On two Proposals for On-line Bankcard Payments using Open Networks: Problems and SolutionsWenbo Mao. 201-210 [doi]
- Secure Network ObjectsLeendert van Doorn, MartÃn Abadi, Michael Burrows, Edward Wobber. 211-221 [doi]
- Run-Time Security Evaluation (RTSE) for Distributed ApplicationsCristina Serban, Bruce M. McMillin. 222-237 [doi]