Abstract is missing.
- Computational paradigms and protectionSimon N. Foley, John P. Morrison. 3-11 [doi]
- Secure multi-party computation problems and their applications: a review and open problemsWenliang Du, Mikhail J. Atallah. 13-22 [doi]
- Model-Carrying Code (MCC): a new paradigm for mobile-code securityR. Sekar, C. R. Ramakrishnan, I. V. Ramakrishnan, Scott A. Smolka. 23-30 [doi]
- Heterogeneous networking: a new survivability paradigmYongguang Zhang, Harrick M. Vin, Lorenzo Alvisi, Wenke Lee, Son K. Dao. 33-39 [doi]
- Safe and sound: a safety-critical approach to securitySacha Brostoff, Martina Angela Sasse. 41-50 [doi]
- Ontology in information security: a useful theoretical foundation and methodological toolVictor Raskin, Christian Hempelmann, Katrina E. Triezenberg, Sergei Nirenburg. 53-59 [doi]
- AngeL: a tool to disarm computer systemsDanilo Bruschi, Emilia Rosti. 63-69 [doi]
- Survival by defense-enablingPartha Pratim Pal, Franklin Webber, Richard E. Schantz. 71-78 [doi]
- A trusted process to digitally sign a documentBoris Balacheff, Liqun Chen, David Plaquin, Graeme Proudler. 79-86 [doi]
- Information security is information risk managementBob Blakley, Ellen McDermott, Daniel E. Geer Jr.. 97-104 [doi]
- The New Security Paradigms Workshop - boom or bust?: a panelSteven J. Greenwald. 107-111 [doi]
- Position statement for ::::New Security Paradigms Workshop - boom or bust?::::: neither boom nor bustHilary H. Hosmer. 113 [doi]
- Tracking influence through citation index comparisons and preliminary case studies panel position statementMary Ellen Zurko. 115-117 [doi]
- The New Security Paradigms Workshop - boom or bust?: thinking in an age of instant communication; communicating in a time of reflective thoughtMarvin Schaefer. 119-123 [doi]
- A note on proactive password checkingJianxin Jeff Yan. 127-135 [doi]
- Pretty good persuasion: a first step towards effective password security in the real worldDirk Weirich, Martina Angela Sasse. 137-143 [doi]