| 622 | -- | 627 | Harold Joseph Highland. Random bits & bytes |
| 628 | -- | 636 | Jon Ølnes. Development of security policies |
| 637 | -- | 645 | Ken Lindup. The cyberpunk age |
| 647 | -- | 650 | Francesco Gentile, Luigi Giuri, Franco Guida, Emilio Montolivo, Michele Volpe. Security evaluation in information technology standards |
| 661 | -- | 671 | Imtiaz Mohammed, David M. Dilts. Design for dynamic user-role-based security |
| 673 | -- | 680 | Sebastiaan H. von Solms, Isak van der Merwe. The management of computer security profiles using a role-oriented approach |
| 681 | -- | 686 | Chin-Chen Chang, Jao-Ji Shen, Tzong-Chen Wu. Access control with binary keys |
| 687 | -- | 697 | Helen Gustafson, Edward P. Dawson, Lauren Nielsen, William J. Caelli. A computer package for measuring the strength of encryption algorithms |