Abstract is missing.
- 'TSUPDOOD?: Repackaged problems for you and MMIRebecca G. Bace, Marvin Schaefer. 2-10 [doi]
- Security for infinite networksRuth Nelson, Hilary H. Hosmer. 11-19 [doi]
- Research issues in authorization models for hypertext systemsElisa Bertino, Pierangela Samarati. 22-28 [doi]
- Unhelpfulness as a security policy: or it's about timeRuth Nelson. 29-32 [doi]
- QuARC: expressive security mechanismsJohn D. Yesberg, Mark S. Anderson. 34-40 [doi]
- Administration in a multiple policy/domain environment: the administration and melding of disparate policiesWilliam R. Ford. 42-52 [doi]
- Virtual enterprises and the enterprise security architectureTom Haigh. 53-64 [doi]
- Software system risk management and assuranceSharon K. Fletcher, Roxana M. Jansma, Judy J. Lim, Ron Halbgewachs, Martin D. Murphy, Gregory D. Wyss. 66-74 [doi]
- Applying the dependability paradigm to computer securityCatherine Meadows. 75-79 [doi]
- Pretty good assuranceJeffrey R. Williams, Marv Schaefer, Douglas J. Landoll. 82-89 [doi]
- Credentials for privacy and interoperationVicki Ellen Jones, Neil Ching, Marianne Winslett. 92-100 [doi]