Abstract is missing.
- Internet instability and disturbance: goal or menace?Richard Ford, Mark Bush, Alex Boulatov. 3-8 [doi]
- Diversity as a computer defense mechanismCarol Taylor, Jim Alves-Foss. 11-14 [doi]
- Diversity: the biological perspective position statementCarol Taylor. 15-16 [doi]
- "Diversity as a computer defense mechanism"Bev Littlewood. 17-18 [doi]
- use of diversity as a defense mechanismJohn McHugh. 19-20 [doi]
- Use of diversity as a defense mechanismRoy A. Maxion. 21-22 [doi]
- Average case vs. worst case: margins of safety in system designChristian W. Probst, Andreas Gal, Michael Franz. 25-32 [doi]
- Divide and conquer: the role of trust and assurance in the design of secure socio-technical systemsIvan Flechais, Jens Riegelsberger, Martina Angela Sasse. 33-41 [doi]
- Pass-thoughts: authenticating with our mindsJulie Thorpe, Paul C. van Oorschot, Anil Somayaji. 45-56 [doi]
- Message authentication by integrity with public corroborationPaul C. van Oorschot. 57-63 [doi]
- Flooding and recycling authorizationsKonstantin Beznosov. 67-72 [doi]
- The insider problem revisitedMatt Bishop. 75-76 [doi]
- Position: "insider" is relativeMatt Bishop. 77-78 [doi]
- Position paperIrene Schwarting. 79-81 [doi]
- Principles-driven forensic analysisSean Peisert, Sidney Karin, Matt Bishop, Keith Marzullo. 85-93 [doi]
- Visual security protocol modelingJohn P. McDermott. 97-109 [doi]
- Empirical privilege profilingCarla Marceau, Rob Joyce. 111-118 [doi]
- Speculative virtual verification: policy-constrained speculative executionMichael E. Locasto, Stelios Sidiroglou, Angelos D. Keromytis. 119-124 [doi]