Abstract is missing.
- Development of a Secure Electronic Marketplace for EuropeMichael Waidner. 1-14 [doi]
- Light-Weight Micro-cash Payment for the InternetWenbo Mao. 15-32 [doi]
- Digital Payment Systems with Passive Anonymity-Revoking TrusteesJan Camenisch, Ueli M. Maurer, Markus Stadler. 33-43 [doi]
- An Authorization Model for WorkflowsVijayalakshmi Atluri, Wei-kuang Huang. 44-64 [doi]
- Role Hierarchies and Constraints for Lattice-Based Access ControlsRavi S. Sandhu. 65-79 [doi]
- A Multilevel Security Model for Distributed Object SystemsVincent Nicomette, Yves Deswarte. 80-98 [doi]
- An Authorization Model for Federated SystemsSabrina De Capitani di Vimercati, Pierangela Samarati. 99-117 [doi]
- Security for Mobile Agents: Authentication and State AppraisalWilliam M. Farmer, Joshua D. Guttman, Vipin Swarup. 118-130 [doi]
- Server-Supported SignaturesN. Asokan, Gene Tsudik, Michael Waidner. 131-143 [doi]
- Limitations of the Approach of Solving a Network s Security Problem with a FirewallStefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth. 144-145 [doi]
- Sleepy Network-Layer Authentication Service for IPSECShyhtsun Felix Wu. 146-159 [doi]
- Certified Electronic MailJianying Zhou, Dieter Gollmann. 160-171 [doi]
- Distributed ProctoringBruce Schneier, John Kelsey, Jay Walker. 172-182 [doi]
- Merging Heterogeneous Security OrderingsPiero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian. 183-197 [doi]
- CSP and AnonymitySteve Schneider, Abraham Sidiropoulos. 198-218 [doi]
- Formal Semantics for Authentication LogicsGabriele Wedel, Volker Kessler. 219-241 [doi]
- Threat Scenarios as a Means to Formally Develop Secure SystemsVolkmar Lotz. 242-265 [doi]
- The Impact of Multilevel Security on Database Buffer ManagementAndrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal. 266-289 [doi]
- Enhancing the Controlled Disclosure of Sensitive InformationDonald G. Marks, Amihai Motro, Sushil Jajodia. 290-303 [doi]
- Secure Concurrency Control in MLS Databases with Two Versions of DataLuigi V. Mancini, Indrajit Ray. 304-323 [doi]
- Authors Rights and Copyright ProtectionGĂ©rard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater. 324 [doi]
- Modelling a Public-Key InfrastructureUeli M. Maurer. 325-350 [doi]
- Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two ApproachesCatherine Meadows. 351-364 [doi]