Abstract is missing.
- Integrating formalism and pragmatism: architectural securityRuth Nelson. 1-4 [doi]
- A practical approach to security assessmentDarrell M. Kienzle, William A. Wulf. 5-16 [doi]
- Meta objects for access control: extending capability-based securityThomas Riechmann, Franz J. Hauck. 17-22 [doi]
- A tentative approach to constructing tamper-resistant softwareMasahiro Mambo, Takanori Murayama, Eiji Okamoto. 23-33 [doi]
- Three paradigms in computer securityCatherine Meadows. 34-37 [doi]
- Patterns of trust and policyDaniel J. Essin. 38-47 [doi]
- A distributed trust modelAlfarez Abdul-Rahman, Stephen Hailes. 48-60 [doi]
- An insecurity flow modelIra S. Moskowitz, Myong H. Kang. 61-74 [doi]
- Principles of a computer immune systemAnil Somayaji, Steven A. Hofmeyr, Stephanie Forrest. 75-82 [doi]
- Under-specification, composition and emergent propertiesHeather M. Hinton. 83-93 [doi]
- Protecting routing infrastructures from denial of service using cooperative intrusion detectionSteven Cheung, Karl N. Levitt. 94-106 [doi]
- A security model for dynamic adaptive traffic maskingBrenda Timmerman. 107-116 [doi]