Abstract is missing.
- How to Cheat at the Lottery (or, Massively Parallel Requirements Engineering)Ross J. Anderson. 1 [doi]
- Modular Fair Exchange Protocols for Electronic CommerceHolger Vogt, Henning Pagnia, Felix C. Gärtner. 3-11 [doi]
- Trustworthy Access Control with Untrustworthy Web ServersTim Wilkinson, Dave Hearn, Simon R. Wiseman. 12-21 [doi]
- A Language for Modeling Secure Business TransactionsAlexander W. Röhm, Gaby Herrmann, Günther Pernul. 22 [doi]
- Safe Areas of Computation for Secure Computing with Insecure ApplicationsAndré L. M. dos Santos, Richard A. Kemmerer. 35-44 [doi]
- Architecture and Concepts of the ARGuE GuardJeremy Epstein. 45-54 [doi]
- Using Abuse Case Models for Security Requirements AnalysisJohn P. McDermott, Chris Fox. 55 [doi]
- A Parallel Packet Screen for High Speed NetworksCarsten Benecke. 67-74 [doi]
- An Asynchronous Distributed Access Control Architecture for IP over ATM NetworksOlivier Paul, Maryline Laurent, Sylvain Gombault. 75-83 [doi]
- Secure Communications in ATM NetworksMaryline Laurent, Ahmed Bouabdallah, Christophe Delahaye, Herbert Leitold, Reinhard Posch, Enrique Areizaga, Juàn Manuel Mateos. 84 [doi]
- Using Checkable Types in Automatic Protocol AnalysisStephen H. Brackin. 99-108 [doi]
- SCR: A Practical Approach to Building a High Assurance COMSEC SystemJames Kirby, Myla Archer, Constance L. Heitmeyer. 109-118 [doi]
- Application-Level Isolation Using Data Inconsistency DetectionAmgad Fayad, Sushil Jajodia, Catherine D. McCollum. 119 [doi]
- A Prototype Secure Workflow ServerDouglas L. Long, Julie Baker, Francis Fung. 129-133 [doi]
- Napoleon: A Recipe for WorkflowCharles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O Brien. 134-142 [doi]
- Tools to Support Secure Enterprise ComputingMyong H. Kang, Brian J. Eppinger, Judith N. Froscher. 143 [doi]
- An Effective Defense Against First Party Attacks in Public-Key AlgorithmsStephen M. Matyas, Allen Roginsky. 155-160 [doi]
- Towards a Practical, Secure, and Very Large Scale Online ElectionJared Karro, Jie Wang. 161-169 [doi]
- Design of LAN-Lock, A System for Securing Wireless NetworksRichard E. Newman, Mark V. Hoyt, Tim Swanson, Phillipe Broccard, Mark Sanders, Joe Winner. 170 [doi]
- Toward a Taxonomy and Costing Method for Security ServicesCynthia E. Irvine, Timothy E. Levin. 183-188 [doi]
- TrustedBox: A Kernel-Level Integrity CheckerPietro Iglio. 189-198 [doi]
- Adding Availability to Log Services of Untrusted MachinesArianna Arona, Danilo Bruschi, Emilia Rosti. 199 [doi]
- Policy-Based Management: Bridging the GapSusan Hinrichs. 209-218 [doi]
- Security Policy Coordination for Heterogeneous Information SystemsJohn Hale, Pablo Galiasso, Mauricio Papa, Sujeet Shenoi. 219-228 [doi]
- The ARBAC99 Model for Administration of RolesRavi S. Sandhu, Qamar Munawer. 229 [doi]
- A Distributed Certificate Management System (DCMS) Supporting Group-Based Access ControlsRolf Oppliger, Andreas Greulich, Peter Trachsel. 241-248 [doi]
- Fast Checking of Individual Certificate Revocation on Small SystemsSelwyn Russell. 249-255 [doi]
- A Model of Certificate RevocationDavid A. Cooper. 256 [doi]
- Information Security Education for the Next Millennium: Building the Next Generation of Practitioners (Forum)Blaine Burnham, Cynthia E. Irvine, Charles Reynolds, Ravi S. Sandhu, Rayford B. Vaughn. 265 [doi]
- Generic Support for PKIX Certificate Management in CDSAShabnam Erfani, C. Sekar Chandersekaran. 269-275 [doi]
- Efficient Certificate Status Handling Within PKIs: An Application to Public Administration ServicesMarco Prandini. 276 [doi]
- User Authentication and Authorization in the Java(tm) PlatformCharlie Lai, Li Gong, Larry Koved, Anthony J. Nadalin, Roland Schemers. 285-290 [doi]
- Transactions in Java CardMarcus Oestreicher. 291 [doi]
- Legal and Technical Responses to Protecting the U. S. Critical Infrastructures (Panel)Scott Charney, Ellie Padgett, Mark Rasch, John Thomas. 299 [doi]
- A Middleware Approach to Asynchronous and Backward Compatible Detection and Prevention of ARP Cache PoisoningMahesh V. Tripunitara, Partha Dutta. 303-309 [doi]
- A Resource Access Decision Service for CORBA-Based Distributed SystemsKonstantin Beznosov, Yi Deng, Bob Blakley, C. Burt, John F. Barkley. 310-319 [doi]
- Non-repudiation Evidence Generation for CORBA using XMLMichael Wichert, David B. Ingham, Steve J. Caughey. 320 [doi]
- Security Relevancy Analysis on the Registry of Windows NT 4.0Wenliang Du, Praerit Garg, Aditya P. Mathur. 331-340 [doi]
- Security Architecture Development and Results for a Distributed Modeling and Simulation System Richard B. Neely. 341-348 [doi]
- SecurSight: An Architecture for Secure Information AccessJohn G. Brainard. 349 [doi]
- SAM: Security Adaptation Manager Heather M. Hinton, Crispin Cowan, Lois M. L. Delcambre, Shawn Bowers. 361-370 [doi]
- An Application of Machine Learning to Network Intrusion DetectionChris Sinclair, Lyn Pierce, Sara Matzner. 371-377 [doi]
- A Process State-Transition Analysis and Its Application to Intrusion DetectionNittida Nuansri, Samar Singh, Tharam S. Dillon. 378-388 [doi]