Abstract is missing.
- IntruDetector: A Software Platform for Testing Network Intrusion Detection AlgorithmsTao Wan, Xue Dong Yang. 3-11 [doi]
- Mining Alarm Clusters to Improve Alarm Handling EfficiencyKlaus Julisch. 12-21 [doi]
- Managing Alerts in a Multi-Intrusion Detection EnvironmenFrédéric Cuppens. 22-31 [doi]
- Implementing the Intrusion Detection Exchange ProtocolTim Buchheim, Michael Erlinger, Ben Feinstein, Greg Matthews, Roy Pollock, Joseph Betser, Andy Walther. 32-44 [doi]
- Information Flow Analysis of Component-Structured ApplicationsPeter Herrmann. 45-54 [doi]
- Security Policy Enforcement at the File System Level in the Windows NT Operating System FamilyStephen D. Wolthusen. 55-63 [doi]
- Java Security Extensions for a Java Server in a Hostile EnvironmentDavid M. Wheeler, Adam Conyers, Jane Luo, Alex Xiong. 64-73 [doi]
- Genoa TIE, Advanced Boundary Controller ExperimentEric Monteith. 74-84 [doi]
- A JCA-Based Implementation Framework for Threshold CryptographyYih Huang, David Rine, Xunhua Wang. 85-91 [doi]
- The Performance Measurement of Cryptographic Primitives on Palm DevicesDuncan S. Wong, Hector Ho Fuentes, Agnes Hui Chan. 92-101 [doi]
- Privacy-Preserving Cooperative Statistical AnalysisWenliang Du, Mikhail J. Atallah. 102-112 [doi]
- Experiences Implementing a Common Format for IDS AlertsBen Feinstein, Greg Matthews, Stuart Staniford, Andy Walther. 113-116 [doi]
- Detecting Conflicts in a Role-Based Delegation ModelAndreas Schaad. 117-126 [doi]
- Engineering of Role/Permission AssignmentsPete Epstein, Ravi S. Sandhu. 127-136 [doi]
- A Framework for Multiple Authorization Types in a Healthcare Application SystemRamaswamy Chandramouli. 137-148 [doi]
- Determining Privileges of Mobile AgentsWayne A. Jansen. 149-160 [doi]
- Introduction to Classic PapersDan Thomsen. 161 [doi]
- Building Reliable Secure Computing Systems out of Unreliable Insecure ComponentsJohn E. Dobson, Brian Randell. 162-173 [doi]
- A Security Model for Military Message Systems: RetrospectiveCarl E. Landwehr, Constance L. Heitmeyer, John D. McLean. 174-190 [doi]
- An Information Flow Tool for GypsyJohn McHugh. 191-204 [doi]
- Information Security: Science, Pseudoscience, and Flying PigsRoger R. Schell. 205-218 [doi]
- DAIS: A Real-Time Data Attack Isolation System for Commercial Database ApplicationsPeng Liu. 219-229 [doi]
- Watcher: The Missing Piece of the Security PuzzleJohn C. Munson, Scott Wimer. 230-239 [doi]
- eXpert-BSM: A Host-Based Intrusion Detection Solution for Sun SolarisUlf Lindqvist, Phillip A. Porras. 240-251 [doi]
- Temporal Signatures for Intrusion DetectionAnita Jones, Song Li. 252-264 [doi]
- Securing Web Servers against Insider Attack Shan Jiang, Sean Smith, Kazuhiro Minami. 265-276 [doi]
- Enabling Hierarchical and Bulk-Distribution for Watermarked ContentGermano Caronni, Christoph L. Schuba. 277-285 [doi]
- CONSEPP: CONvenient and Secure Electronic Payment Protocol Based on X9.59Albert Levi, Çetin Kaya Koç. 286-295 [doi]
- Wired versus Wireless Security: The Internet, WAP and iMode for E-CommercePaul Ashley, Heather M. Hinton, Mark Vandenwauver. 296-308 [doi]
- A Component-Based Architecture for Secure Data PublicationPiero A. Bonatti, Ernesto Damiani, Sabrina De Capitani di Vimercati, Pierangela Samarati. 309-318 [doi]
- The Authorization Service of Tivoli Policy DirectorGünter Karjoth. 319-328 [doi]
- Architecture and Applications for a Distributed Embedded FirewallCharles Payne, Tom Markham. 329-338 [doi]
- How Useful is Software Fault Injection for Evaluating the Security of COTS Products?Matt Bishop, Anup K. Ghosh, James A. Whittaker. 339-342 [doi]
- Security Vendor CTOs: Perspectives, Opinions, and Lessons LearnedRon Gula, Gene Kim, Chris Klaus, Paul Proctor. 343-346 [doi]
- Practical Automated Filter Generation to Explicitly Enforce Implicit Input AssumptionsValentin Razmov, Daniel R. Simon. 347-357 [doi]
- Why Information Security is Hard-An Economic PerspectiveRoss J. Anderson. 358-365 [doi]
- Abuse-Case-Based Assurance ArgumentsJohn P. McDermott. 366-376 [doi]
- A Regulated Approach to Certificate ManagementVictoria Ungureanu. 377-385 [doi]
- Restricting Access with Certificate Attributes in Multiple Root Environments-A Recipe for Certificate MasqueradingJames M. Hayes. 386-390 [doi]
- Secure Blue: An Architecture for a Scalable, Reliable, High Volume SSL Internet ServerRonald Mraz. 391-400 [doi]
- Secure Anonymous Group Infrastructure for Common and Future Internet ApplicationsNathalie Weiler. 401-410 [doi]
- Mitigating Distributed Denial of Service Attacks with Dynamic Resource PricingDavid Mankins, Rajesh Krishnan, Ceilyn Boyd, John Zao, Michael Frentz. 411-421 [doi]
- Requirements for a General Framework for Response to Distributed Denial-of-ServiceD. W. Gresty, Qi Shi, Madjid Merabti. 422-432 [doi]
- Trustworthiness in Distributed Electronic Healthcare Records-Basis for Shared CareBernd Blobel. 433-441 [doi]
- Application Intrusion Detection using Language Library CallsAnita K. Jones, Yu Lin. 442-449 [doi]
- Verifiable Identifiers in Middleware SecurityUlrich Lang, Dieter Gollmann, Rudolf Schreiner. 450-462 [doi]
- Computing Without Wires (Or Even a Net): The Pitfalls, Potentials, and Practicality of Wireless NetworkingAnna Entrichel, James Bergman, Jason Willis, Herb Little. 463-464 [doi]