Abstract is missing.
- Secure dynamic adaptive traffic maskingBrenda Timmerman. 13-24 [doi]
- Security architecture-based system designEdward A. Schneider. 25-31 [doi]
- Survivability - a new technical and business perspective on securityHoward F. Lipson, David A. Fisher. 33-39 [doi]
- Optimistic security: a new access control paradigmDean Povey. 40-45 [doi]
- Discussion: strike back: offensive actions in information warfareDonald J. Welch, Nathan Buchheit, Anthony Ruocco. 47-52 [doi]
- Security service level agreements: quantifiable security for the enterprise?Ronda R. Henning. 54-60 [doi]
- A cursory examination of market forces driving the use of protection profilesKenneth G. Olthoff. 61-66 [doi]
- Report on the discussion of "A cursory examination of market forces driving the common criteria"Kenneth G. Olthoff. 67-68 [doi]
- Paradigm shifts in protocol analysisSusan Pancho. 70-79 [doi]
- Secure group management in large distributed systems: what is a group and what does it do?John McHugh, James Bret Michael. 80-85 [doi]
- SASI enforcement of security policies: a retrospectiveÚlfar Erlingsson, Fred B. Schneider. 87-95 [doi]
- Security modeling in the COTS environmentTom Markham, Dwight Colby, Mary Denz. 96-102 [doi]
- On the functional relation between security and dependability impairmentsErland Jonsson, Lars Strömberg, Stefan Lindskog. 104-111 [doi]
- Securing information transmission by redundancyJun Li, Peter L. Reiher, Gerald J. Popek. 112-117 [doi]
- The high assurance brake job - a cautionary tale in five scenesKenneth G. Olthoff. 118-140 [doi]