Abstract is missing.
- Certificate-based Access Control for Widely Distributed ResourcesMary R. Thompson, William E. Johnston, Srilekha Mudumbai, Gary Hoo, Keith R. Jackson, Abdelilah Essiari. [doi]
- Offline DelegationArne Helme, Tage Stabell-Kulø. [doi]
- The Design and Analysis of Graphical PasswordsIan Jermyn, Alain J. Mayer, Fabian Monrose, Michael K. Reiter, Aviel D. Rubin. [doi]
- Antigone: A Flexible Framework for Secure Group CommunicationPatrick McDaniel, Atul Prakash, Peter Honeyman. [doi]
- A Study in Using Neural Networks for Anomaly and Misuse DetectionAnup K. Ghosh, Aaron Schwartzbard. [doi]
- The Flask Security Architecture: System Support for Diverse Security PoliciesRay Spencer, Stephen Smalley, Peter Loscocco, Mike Hibler, Dave Andersen, Jay Lepreau. [doi]
- The Design of a Cryptographic Security ArchitecturePeter Gutmann. [doi]
- Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level SpecificationsR. Sekar, Prem Uppuluri. [doi]
- Hand-Held Computers Can Be Better Smart CardsDirk Balfanz, Edward W. Felten. [doi]
- Scalable Access Control for Distributed Object SystemsDaniel F. Sterne, Gregg Tally, C. Durward McDonell, David L. Sherman, David Sames, Pierre X. Pasturel, E. John Sebes. [doi]
- A Secure Station for Network Monitoring and ControlVassilis Prevelakis. [doi]
- Digital-Ticket-Controlled Digital Ticket CirculationKo Fujimura, Hiroshi Kuno, Masayuki Terada, Kazuo Matsuyama, Yasunao Mizuno, Jun Sekine. [doi]
- Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard LaboratoriesTse Huong Choo. [doi]
- Brute Force Attack on UNIX Passwords with SIMD ComputerGershon Kedem, Yuriko Ishihara. [doi]
- Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0Alma Whitten, J. Doug Tygar. [doi]
- Building Intrusion-Tolerant ApplicationsThomas D. Wu, Michael Malkin, Dan Boneh. [doi]
- Jonah: Experience Implementing PKIX Reference FreewareMary Ellen Zurko, John Wray, Ian Morrison, Mike Shanzer, Mike Crane, Pat Booth, Ellen McDermott, Warren Macek, Ann Graham, Jim Wade, Tom Sandlin. [doi]
- Enforcing Well-Formed and Partially-Formed Transactions for UNIXDean Povey. [doi]