Abstract is missing.
- Hardening COTS Software with Generic Software WrappersTimothy Fraser, Lee Badger, Mark Feldman. 2-16 [doi]
- Firmato: A Novel Firewall Management ToolkitYair Bartal, Alain J. Mayer, Kobbi Nissim, Avishai Wool. 17-31 [doi]
- Flexible Policy-Directed Code SafetyDavid Evans, Andrew Twyman. 32-45 [doi]
- A User-Centered, Modular Authorization Service Built on an RBAC FoundationMary Ellen Zurko, Richard Simon, Tom Sanfilippo. 57-71 [doi]
- Secure Communications Processing for Distributed LanguagesMartín Abadi, Cédric Fournet, Georges Gonthier. 74-88 [doi]
- Verification of Control Flow based Security PropertiesThomas P. Jensen, Daniel Le Métayer, Tommy Thorn. 89-103 [doi]
- Twenty Years of Cryptography in the Open LiteratureG. R. Blakley. 106-107 [doi]
- 20 Years of Operating Systems SecurityVirgil D. Gligor. 108-110 [doi]
- Twenty Years of Formal MethodsJohn McLean. 115-116 [doi]
- Network Security: Then and Now, or, 20 Years in 10 MinutesStephen T. Kent. 117 [doi]
- A Data Mining Framework for Building Intrusion Detection ModelsWenke Lee, Salvatore J. Stolfo, Kui W. Mok. 120-132 [doi]
- Detecting Intrusions using System Calls: Alternative Data ModelsChristina Warrender, Stephanie Forrest, Barak A. Pearlmutter. 133-145 [doi]
- A Multi-Threading Architecture for Multilevel Secure Transaction ProcessingHaruna R. Isa, William R. Shockley, Cynthia E. Irvine. 166-180 [doi]
- Specification and Enforcement of Classification and Inference ConstraintsSteven Dawson, Sabrina De Capitani di Vimercati, Pierangela Samarati. 181-195 [doi]
- Software Smart Cards via Cryptographic CamouflageDouglas N. Hoover, B. N. Kausik. 208-215 [doi]
- How Computers Will Be Used Differently in the Next Twenty YearsMark Weiser. 234-235 [doi]
- The Hardware EnvironmentRoger M. Needham. 236 [doi]
- Software Technology of the FutureHoward E. Shrobe. 237-238 [doi]
- Twenty Year Time Capsule Panel: The Future of NetworkingHilarie K. Orman. 239 [doi]
- The Future Is Not Assured - But It Should BeBrian D. Snow. 240-241 [doi]