Abstract is missing.
- Toward a Secure System Engineering MethodolgyChris Slater, O. Sami Saydjari, Bruce Schneier, Jim Wallner. 2-10 [doi]
- Security Engineering in an Evolutionary Acquisition EnvironmentMarshall D. Abrams. 11-20 [doi]
- Meta Objects for Access Control: a Formal Model for Role-Based PrincipalsThomas Riechmann, Franz J. Hauck. 30-38 [doi]
- Evaluating System IntegritySimon N. Foley. 40-47 [doi]
- Death, Taxes, and Imperfact Software: Surviving the InevitableCrispin Cowan, Calton Pu. 54-70 [doi]
- A Graph-based System for Network-vulnerability AnalysisCynthia A. Phillips, Laura Painton Swiler. 71-79 [doi]
- Parsimonious Downgrading and Decision Trees Applied to the Inference ProblemLiWu Chang, Ira S. Moskowitz. 82-89 [doi]
- Server-Assisted CryptographyDonald Beaver. 92-106 [doi]
- Discussion Topic: What is the Old Security Paradigm?Steven J. Greenwald. 107-118 [doi]
- A New Model for Availability in the Face of Self-Propagating AttacksMeng-Jang Lin, Aleta Ricciardi, Keith Marzullo. 134-137 [doi]