Abstract is missing.
- Message from the Program Chairs [doi]
- Conference Committee [doi]
- Is the Trusted Computing Base Concept Fundamentally Flawed?John D. McLean. 2 [doi]
- Some weaknesses of the TCB modelBob Blakley, Darrell M. Kienzle. 3-5 [doi]
- Is the Reference Monitor Concept Fatally Flawed? The Case for the NegativeWilliam R. Shockley, James P. Downey. 6-7 [doi]
- Toward Acceptable Metrics of AuthenticationMichael K. Reiter, Stuart G. Stubblebine. 10-20 [doi]
- An Authorization Scheme For Distributed Object SystemsVincent Nicomette, Yves Deswarte. 21-30 [doi]
- A Logical Language for Expressing AuthorizationsSushil Jajodia, Pierangela Samarati, V. S. Subrahmanian. 31-42 [doi]
- Anonymous Connections and Onion RoutingPaul F. Syverson, David M. Goldschlag, Michael G. Reed. 44-54 [doi]
- The Design and Implementation of a Multilevel Secure Log ManagerV. R. Pesati, T. E. Keefe, S. Pal. 55-64 [doi]
- A Secure and Reliable Bootstrap ArchitectureWilliam A. Arbaugh, David J. Farber, Jonathan M. Smith. 65-71 [doi]
- An MBone Proxy for an Application Gateway FirewallKelly Djahandari, Daniel F. Sterne. 72-81 [doi]
- Secure Software ArchitecturesMark Moriconi, Xiaolei Qian, Robert A. Riemenschneider, Li Gong. 84-93 [doi]
- A General Theory of Security PropertiesAris Zakinthinos, E. Stewart Lee. 94-102 [doi]
- Analyzing Consistency of Security PoliciesLaurence Cholvy, Frédéric Cuppens. 103-112 [doi]
- Ensuring Assurance in Mobile ComputingMarvin Schaefer, Sylvan Pinsky, Drew Dean, Li Gong, Jim Roskind, Barbara Fox. 114-118 [doi]
- Filtering Postures: Local Enforcement for Global PoliciesJoshua D. Guttman. 120-129 [doi]
- Providing flexibility in information flow control for object oriented systemsElena Ferrari, Pierangela Samarati, Elisa Bertino, Sushil Jajodia. 130-140 [doi]
- Automated analysis of cryptographic protocols using Mur-phiJohn C. Mitchell, Mark Mitchell, Ulrich Stern. 141-151 [doi]
- How to Systematically Classify Computer Security IntrusionsUlf Lindqvist, Erland Jonsson. 154-163 [doi]
- Surviving information warfare attacks on databasesPaul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein. 164-174 [doi]
- Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based ApproachCalvin Ko, Manfred Ruschitzka, Karl N. Levitt. 175-187 [doi]
- Catalytic Inference Analysis: Detecting Inference Threats due to Knowledge DiscoveryJohn Hale, Sujeet Shenoi. 188-199 [doi]
- Security in Innovative New Operating SystemsCynthia E. Irvine. 202-203 [doi]
- Research on Proof-Carrying Code for Untrusted-Code SecurityGeorge C. Necula, Peter Lee. 204 [doi]
- Access Control for the SPIN Extensible Operating SystemRobert Grimm, Brian N. Bershad. 205 [doi]
- Escort: Securing Scout PathsOliver Spatscheck, Larry L. Peterson. 206 [doi]
- Analysis of a Denial of Service Attack on TCPChristoph L. Schuba, Ivan Krsul, Markus G. Kuhn, Eugene H. Spafford, Aurobindo Sundaram, Diego Zamboni. 208-223 [doi]
- Deniable Password Snatching: On the Possibility of Evasive Electronic EspionageAdam Young, Moti Yung. 224-235 [doi]
- Number Theoretic Attacks on Secure Password SchemesSarvar Patel. 236-247 [doi]