Abstract is missing.
- Panel - Security and the World Wide WebG. Winfield Treese.
- Experimental Results of Covert Channel Limitation in One-Way Communication SystemsNick Ogurtsov, Hilarie K. Orman, Richard Schroeppel, Sean W. O Malley, Oliver Spatscheck. 2-15
- Blocking Java Applets at the FirewallDavid M. Martin Jr., Sivaramakrishnan Rajagopalan, Aviel D. Rubin. 16-26 [doi]
- Continuous Assessment of a Unix Configuration: Integrating Intrusion Detection and Configuration AnalysisAbdelaziz Mounji, Baudouin Le Charlier. 27-37 [doi]
- An Interface Specification Language for Automatically Analyzing Cryptographic ProtocolsStephen H. Brackin. 40-51 [doi]
- Probable Plaintext Cryptanalysis of the IP Security ProtocolsSteven M. Bellovin. 52-59 [doi]
- Misplaced Trust: Kerberos 4 Session KeysBryn Dole, Steven W. Lodin, Eugene H. Spafford. 60-71 [doi]
- Securing the Nimrod Routing ArchitectureKaren E. Sirois, Stephen T. Kent. 74-84 [doi]
- Securing Distance-Vector Routing ProtocolsBradley R. Smith, Shree Murthy, J. J. Garcia-Luna-Aceves. 85-92 [doi]
- Reducing the Cost of Security in Link-State RoutingRalf C. Hauser, Tony Przygienda, Gene Tsudik. 93-101 [doi]
- Securing Web Access with DCEBrian C. Schimpf. 102-108 [doi]
- Hierarchical Organization of Certification Authorities for Secure EnvironmentsLourdes López Santidrián, Justo Carracedo Gallardo. 112-121 [doi]
- Trust Models in ICE-TELAndrew J. Young, Nada Kapidzic Cicovic, David W. Chadwick. 122-133 [doi]
- Distributed Authentication in Kerberos Using Public Key CryptographyMarvin A. Sirbu, John C.-I. Chuang. 134-143